1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maxonik [38]
3 years ago
10

The students assume the role of a networking intern at Richman Investments, a mid-level financial investment and consulting firm

. In this assignment, the students will research malicious code attacks and select one that occurred within the last year. They must write a summary report explaining what kind of malicious attack it was, how it spread and attacked other devices, and how it was mitigated. They must also explain how they would prevent the attack from recurring on a network under their control.
Computers and Technology
2 answers:
cestrela7 [59]3 years ago
7 0

Answer:

Malicious code: Trojan

Explanation:

Trojan

A Trojan is malicious code that, unlike viruses and worms, cannot reproduce itself and infect files. It is usually in the form of an executable file (.exe, .com) and does not contain any other elements, except for the Trojan's own code. For this reason the only solution is to remove it.

It has several functions -from acting as keyloggers (connecting and transmitting the actions performed on the keyboard) and deleting files to formatting disks. Some contain special functionality that installs Trojan programs, a client-server application that guarantees the developer remote access to your computer. Unlike many (legitimate) programs with similar functions, they are installed without user consent.

fredd [130]3 years ago
5 0

Answer:

Malicious code : Spyware

Explanation:

The kind of malicious attack on the the intern in making a research on is Spyware

Spyware gathers information about a users and it activities without them knowing and also without their permission or consent. Type of user information we talking about here are pins, passwords, unstructured messages and payment information.

Spyware attack does only affect desktop browser, it also operate on different platform like a mobile phone having a critical application.

How to prevent spyware.

1.Update your system. Make sure you update your browser and device often.

Give attention to the type of things you download.

2. Using anti-spyware software. The software is the obstruction between you and an attacker.

3. Always be watching your email

4.Always avoid pop-ups.

You might be interested in
Question 4 True or false: The same plaintext encrypted using the same algorithm and same encryption key would result in differen
Cloud [144]

Answer:

False

Explanation:

7 0
2 years ago
Douglas Engelbart is credited with the invention of _____
kicyunya [14]
He created computer mouse
6 0
4 years ago
Why should you keep lines of code short?
Nataly [62]

The programmers should keep lines of code short because It makes the code more readable by other programmers.

<h3>Short lines of Code</h3>

Normally, a shorter lines of code are more efficient than spreading the code over several lines

Also, If a programmer have more lines of code, there are more places for bugs to hide and finding them might be more of a hassle.

So, the fewer lines of code can achieve the same results or much better than many lines of code

Hence, the programmers should keep lines of code short because It makes the code more readable by other programmers.

Therefore, the Option A is correct.

Read more about Short lines of Code

<em>brainly.com/question/20475581</em>

3 0
2 years ago
Why are tariffs and other trade barriers economically harmful when they save some jobs
Dmitry [639]
Tariffs economically harmful save they save some jobs because higher prices are forced upon the people by the tariffs will cost more jobs than they save.

7 0
3 years ago
Is a location on your computer screen where you type text entries to communicate with the computer’s operating system?
goldfiish [28.3K]
Command line. hope this helps
4 0
3 years ago
Other questions:
  • Consider a file system that uses inodes to represent files. Disk blocks are 2KB in size and a pointer to a disk block requires 4
    13·1 answer
  • Drag each connector name to match the connector type shown.
    14·1 answer
  • Bitnet, one of the predecessors of the internet was launched in 1981. what does bitnet stand for?
    12·1 answer
  • 17) you need to locate an article that (1) is published by a university or proffessional association(2) is authored by clearly d
    6·1 answer
  • How to be like Elon Musk who achieved more in his 46 years than we will ever achieve in ten lifetimes?
    13·1 answer
  • Implement a sublinear running time complexity recursive function in Java public static long exponentiation (long x, int n) to ca
    14·1 answer
  • A mobile device user has tried to install a new app numerous times without success. She hasclosed all unused apps, disabled live
    12·1 answer
  • How do we make a acount
    15·2 answers
  • Create a class called Circle, which has (i) an attribute radius, (ii) a method that returns the current radius of a circle objec
    6·1 answer
  • Which software development method uses highly skilled programmers to shorten the development process while producing quality sof
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!