Kindly check the attached word document file. Thank you for using my service, i look forward to working with you on your other assignments.
Running head: NETWORK SECURITY
What are three broad mechanisms that malware can use to propagate?
The three mechanisms that are used by malwares to upgrade are: first is that they infect the
existing executable or interpreted content by viruses, then they exploit software vulnerability be
it locally, drive by downloads or over the networks by worms (Koret& Bachaalany, 2015). And
finally, through the use of social engineering attacks that lead the users into bypassing their
security mechanisms to either respond to phishing attacks or install trojans.
What are four broad categories of payloads that malware may carry?
The four payload categories carried by malware are: first is the theft of from the network or
system, this goes mostly to log in, passwords or other key login details by the use of spyware
programs(Koret& Bachaalany, 2015). Then there is corruption of data or system files; this
revolves the theft of the services with the aim of making the system be a zombie agent of the
attacks which is part of a botnet and finally stealthing where the malwares are hiding from the
systems on the presence of the systems from the various attempts to have it detected and
What are typical phases of operation of a virus or worm?
Propagation phase: at this phase, the virus normally copies itself into certain areas in the disk or
Dormant phase: at this phase the virus is idle, it is waiting to be reactivated by some particular
event such as another program or date.
Triggering phase: this is a phase where the virus is now activated to perform the function that it
was intended to in the first place. As seen in the dormant phase, this phase can be triggered by
the use of a va...