I need Help ASAP

User Generated

znyuhznvqv

Computer Science

Description

Malware has been around for a long time. You are asked to investigate a particular malware and answering the following questions (in complete sentences) based on Internet research:

The malware you should write about is "GameOver Zeus"

  1. What is the common name and any pseudonyms or variant names?
  2. What type of malware (virus, worm, etc)?
  3. When was the malware released and, if known, by whom?
  4. How was the malware distributed?
  5. What type of computers were vulnerable (hardware, operating system, etc)?
  6. What was the vulnerability that was exploited?
  7. How extensive was the attack (location, number of computers, etc)
  8. What is zero-day attack? Was it a zero-day exploit? Why or why not?
  9. What was the motive for the virus?
  10. List some security solutions that could have taken to prevent the distribution of the malware?

Include at least three resources (or links) as the references. The rubric is included with this assignment. Your malware is assigned as below:

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

hello buddy, here you go, please remember to review me

Running Head: THE GAMEOVER ZEUS VIRUS

The GameOver Zeus Virus
Name:
Institution:
Course:
Tutor:
Date:

1

THE GAMEOVER ZEUS VIRUS

2
The GameOver Zeus Virus

For a very long period now, malware attacks have been the key source of disaster in
every computer component be it online or offline. These malware programs include viruses and
worms. They attach themselves to computer programs and alter the behavior of the computer to
make it behave as desired by the malware program. An effort to eradicate these programs from
the computers has not been successful and even instead of eradicating the programs the
malicious codes have even spread to other devices like mobile phones and any other
computerized device including televisions, memory cards, flash disks as long as there are files in
the drive where the malicious codes can hide. The biggest challenge is that these programs are
growing in complexity every day the main reason being that the companies or partners that have
come together to form or develop a protection measure for this malicious software have not even
got a clear understanding of the codes and thus ...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags