Malware and Vulnerability

User Generated

anffre529

Computer Science

Description

Assignment Details:

In an essay, answer the following questions based on the readings from this module:

  • How do you determine the type and location of malware present on the computer or device? Explain your rationale.
  • In your opinion, do you think that the vulnerabilities can be minimized in the future? Why or why not?

Provide information from your readings to support your statements.

Deliverables:
Your essay should be two or three pages in length, incorporating at least two academic resources from the Library in addition to your assigned readings. Cite all sources using academic writing standards and APA style guidelines, citing references as appropriate.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: MALWARE AND VULNERABILITY

Malware and Vulnerability
Institution Affiliation
Date

1

MALWARE AND VULNERABILITY
Computer systems are at a high risk of being infected by malware if their security is
vulnerable. Malware or malicious software compromises computer data. They can steal
information, prevent access controls or can even crush a computer. When devices and computers
are vulnerable they allow attackers to easily gain access to their systems because they lack or
have low-security measures for protecting them.
They type of malware and the location can be determined if only one gets to know the
different types of malware. They can be in the form of adware, bugs, rootkits, bots, spyware,
Trojan horses, worms and viruses (Elisan, 2012). One can determine that a computer is infected
by a certain malware when it slows down the operating system and applications. They also slow
down the internet speed. Pop-up windows are a sign of malware which may be in form of
spyware. Unwant...


Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags