Ethical Hacking Discussion

Mar 29th, 2015
Steve1995
Category:
Computer Science
Price: $10 USD

Question description

Can someone help me with the below:

Required Work: Please respond to the two questions with your own perspective.

- min 100 words each question

1.) 

Rootkit is an application (or set of applications), that hides its presence or presence of another application (virus, spyware, etc.) on the computer, using some of the lower layers of the operating system (API function redirection, using of undocumented OS functions, etc.), which makes them almost undetectable by common anti-malware software.

Rootkits generally go much deeper than the average virus. They may even infect your BIOS – the part of your computer that’s independent of the Operating System – making them harder to remove. And they may not even be Windows-specific, even Linux or Apple machines could be affected. In fact, the first rootkit ever written was for Unix.Possibly the most famous case so far was in 2005, when CDs sold by Sony BMG installed rootkits without user permission that allowed any user logged in at the computer to access the administrator mode. The purpose of that rootkit was to enforce copy protection (called “Digital Rights Management” or DRM) on the CDs, but it compromised the computer it was installed on. This process could easily be hijacked for malicious purposes.

http://www.guidingtech.com/8888/difference-between-malware-virus-rootkits-trojans-worm-spyware/


2.)

Pent testing results are the innards' and ski nerds' of a network. They can (and should) reveal all of the weaknesses that a network has which can make that document very valuable in the wrong hands. This document can be hand delivered to the client and or shown as part of an overall presentation making it accessible to more than the client originally intended. Thus ensuring that the document is encrypted, printed on copy proof paper and or only stored in specific places can prevent some of the risk associated with exposure. Other steps could include a clause with the pen tester that any and all documentation created during the evaluation are destroyed when complete.


Tutor Answer

(Top Tutor) Daniel C.
(997)
School: University of Virginia
PREMIUM TUTOR

Studypool has helped 1,244,100 students

8 Reviews


Summary
Quality
Communication
On Time
Value
pmallory
Dec 10th, 2016
" Totally impressed with results!! :-) "
mixedballz
Dec 1st, 2016
" excellent work as always thanks for the help "
Five Star Tutor
Nov 26th, 2016
" Outstanding Job!!!! "
kiln82
Nov 18th, 2016
" awesome work thanks "
darnay
Nov 9th, 2016
" The best tutor out there!!!! "
likeplum4
Nov 4th, 2016
" Excellent work as usual "
kpcutie
Oct 13th, 2016
" Excellent job "
Joemoe
Oct 4th, 2016
" <3 it, thanks for saving me time. "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1819 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors