Answer:
Explanation is given below
Explanation:
A set of instructions runs on a system to do some actions that an attacker wants to do without the owners informed consent. It may be in the form of a virus, Backdoor, Trojan Horse, Rootkit, Scareware, Adware, and Worm.
1. This incident may occur due to:
sharing the file folders using USB's
propagation of e-mails
fake ant viruses
fake codec
through your browser
visiting infected web sites
installing infected software's and so on.
2. The worst that could occur with this incident are:
keylogger: software that can capture and record user keystrokes
backdoor: hidden method for bypassing normal computer authentication systems
zombie: computer attached to the Internet that has been compromised
denial-of-service attack (DoS attack): attempt to make a computer resource unavailable
3.
It steals the personal information such as email addresses, phone numbers, bank account numbers and so on.
It deletes or modifies the files.
Steals the software serial numbers and use our computers as relay.
4.
Usage of up-to-date antivirus which continuously analyze the behavior of your system.
Build a perfect malware detector
analyze program behavior
detect changes by using checksum methods
do the sandbox analysis.
change your passwords as you change your underwear.
Do not open unexpected e-mail attachments
Be wary of pop-up windows that ask you to install something (like anti-virus software) if you are just surfing the web.
Keep your system up-to-date. Newer systems automatically update.
firewall: software which inspects network traffic passing through it, and denies or permits passage based on a set of rules.
5. Outline of key points:
Circumstances related to Malware.
Insights about risks, threats, and/or vulnerabilities
Potential outcomes and possible exposure of intellectual property
countermeasures to detect vulnerabilities