Question

briefly explain the effects of malice software and the steps taking by operation systems to prevent...

briefly explain the effects of malice software and the steps taking by operation systems to prevent them. try to keep the two main catigories parasitic and independant software.

Homework Answers

Answer #1

Malice software (malware) can be generally defined as “a set of instructions that run on your computer and make your system do something that allows an attacker to make it do what he wants it to do”. Steps taken to prevent against malacious software:

1. Install and maintain antivirus software.

2. Back up data.

3. Install or enable a firewall

4. Use anti-spyware tools.

2. Two main categories are parasatic and independent:

1. fragments of programs that cannot exist independently of some actual application program, utility, or system program viruses, logic bombs, and backdoors are examples

2. self-contained programs that can be scheduled and run by the operating system worms and botprograms are examples

------------------------------------------------------Please Upvote--------------------------------------------------------------------------------------

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Briefly explain two of the examples of positive and desirable characteristics of capitalist systems put forward...
Briefly explain two of the examples of positive and desirable characteristics of capitalist systems put forward by their supporters.
Sandel writes, Medical intervention to cure or prevent illness or restore the injured to health does...
Sandel writes, Medical intervention to cure or prevent illness or restore the injured to health does not desecrate nature but honors it. Healing sickness or injury does not override a child’s natural capacities but permits them to flourish. (p.13) However, Kamm thinks this is a bad distinction between treatment and enhancement. Explain Kamm’s main reason(s). It’s okay not to mention all the reasons.) Try to defend Sandel’s original point from Kamm’s objection. If you agree with Kamm, then briefly explain...
.a. Explain the term Security Attacks b. An active attack is a network exploit in which...
.a. Explain the term Security Attacks b. An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. They are quite difficult to prevent active attacks absolutely because of the wide variety of potential physical, software, and network vulnerabilities. Briefly discuss three of such attacks. c. What is an antivirus? d.As a user, you may have come across systems with antivirus installed on them...
State whether each of the following are true or false. Write the number of the question...
State whether each of the following are true or false. Write the number of the question and the answer, e.g. 1.11. True 1.1 A TPS uses simple procedures to record and store day-to-day transactions. 1.2 Contemporary information systems are interfacing with customers and suppliers using electronic commerce technology, CRM, and SCM over the internet. 1.3 Processes represent the data acquired from an information system. 1.4 All stakeholders of an information system share the same perspective of the system. 1.5 An...
This case assignment draws from the Business Information Systems and the Systems Acquisition and Development modules...
This case assignment draws from the Business Information Systems and the Systems Acquisition and Development modules (Chapters 5 to 8). Its purpose is to provide you with experience in analyzing organizational information systems, making recommendations to improve these systems, and formulating a plan to execute on your recommendations. 1. Recommend one of your alternatives that is the best solution to the main issue and justify your recommendation. Your justification should be based on the key decision criteria and you must...
Introduction Purpose Your goal is to create a design for a software interface. You will experience...
Introduction Purpose Your goal is to create a design for a software interface. You will experience the scope of the design process from brainstorming ideas and gathering information about users’ needs to storyboarding, prototyping, and finally, testing and refining your product. As you work on the software interface, you will demonstrate your ability to apply fundamental Human-Computer Interaction principles to interface analysis, design, and implementation. You will be responsible for delivering project components to your professor at several points during...
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside...
Project 1 Explain how your organisational systems, policies or procedures can support the development of effective...
Project 1 Explain how your organisational systems, policies or procedures can support the development of effective work relationships focusing on communications, consultation, feedback, cultural and social sensitivity, and issue & conflict resolution. Ensure you include in your discussion the following points: communicating information to support others to achieve work responsibilities facilitating employees' contributions to consultation on work issues providing feedback on the outcomes of consultations resolution of issues raised or referral to relevant personnel establish and/or implement policies to ensure...
Complete this in C++ and explain what is being done. 1      Introduction The functions in the...
Complete this in C++ and explain what is being done. 1      Introduction The functions in the following subsections can all go in one big file called pointerpractice.cpp. 1.1     Basics Write a function, int square 1(int∗ p), that takes a pointer to an int and returns the square of the int that it points to. Write a function, void square 2(int∗ p), that takes a pointer to an int and replaces that int (the one pointed to by p) with its...
summarize a Business Report Presentation about the opening a Cafe next to a college or opening...
summarize a Business Report Presentation about the opening a Cafe next to a college or opening a Boutique for women's fashions. encouraged to be as creative as possible. Use graphics, logos, photos, etc. The minimum section of your presentation are: Problem: Describe the pain that you’re taking away. The goal is to get everyone nodding and “buying in.” Try to personalize the problem. Example: “If you go to five travel sites, you will be presented with 5 completely different offers....
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT