Research Papers Hub

Research Papers Hub

iruses, Trojan Horses, and Worms

Share on facebook
Facebook
Share on google
Google+
Share on twitter
Twitter
Share on linkedin
LinkedIn

 Viruses, Trojan Horses, and Worms

Prior to beginning work on this discussion, read Chapter 4 in the text, watch the Technology in 10: Malware, Viruses, Worms, and More (Links to an external site.) video, and review the Cisco What Is the Difference: Viruses, Worms, Trojan Horses, and Bots? (Links to an external site.) article.

Computer viruses are considered to be the oldest form of malware that can infect a system. These types of viruses have been around since the inception of the personal computer. The modern landscape of computing has given rise to a number of newer and more sophisticated viruses, Trojan horses, and worms that can infiltrate a computer system, opening the user to heightened risks of being victimized by cyber criminals. Individual computer users are not the only targets of these malware programs; computer criminals and hackers now target governmental and corporate computer systems on a regular basis.

Required Resources

Text

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.).  Retrieved from https://www.vitalsource.com/

  • Chapter 4: Malware and Automated Computer Attacks
  • Chapter 5: Digital Piracy and Intellectual Property Theft

Article

CISCO. (n.d.). What is the difference: Viruses, worms, trojan horses, and bots?  (Links to an external site.) Retrieved from http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html

  • This online resource, by Cisco Systems, contains detailed explanations of computer viruses, worms, Trojan horses, and bots. It will assist you in the development of this week’s discussion posts.
    Accessibility Statement is not available
    Privacy Policy (Links to an external site.)

Multimedia

Larkin, D. [Dom Larkin]. (2014, June 8). Digital Piracy (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=RMaXj1Kjis8

IgnorantPCFanboys. (2011, September 22).

Steve Wozniak: Digital piracy (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=jJRSjFqu-8Q

Mr. Ford’s Class. (2014, January 21).

Technology in 10: Malware, Viruses, Worms, and More (Season 1 – Episode 3) (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=29LOaxPwPPU

Recommended Resources

Dissertation

Lough, D. L. (2001). A taxonomy of computer attacks with applications to wireless networks (Links to an external site.) (Doctoral dissertation, Virginia Polytechnic Institute and State University). Retrieved from https://theses.lib.vt.edu/theses/available/etd-04252001-234145/unrestricted/lough.dissertation.pdf

  • This dissertation examines in detail the variety of attacks that can be levied at computers and provides a taxonomy of such criminal activity. Special attention is given to attacks vie wireless networks.

Article

Hinduja, S. (2003). Trends and patterns among online software pirates (Links to an external site.)Ethics and Information Technology5(1), 49-61. Retrieved from http://www.springer.com/computer/swe/journal/10676

  • The full-text version of this article is available through the ProQuest database in the University of Arizona Global Campus Library. This article provides information on the trends and patterns of software pirates working on a university campus. It may assist you in the development of this week’s activities.

Multimedia

arXter. (2009, January 8). HARDtalk: The music industry – Digital music & piracy (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=rnpntZLnF7w

Imperva. (2014, January 30).

Automated hacking tools – Meet the new rock stars in the cyber underground (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=TE21JrVWlHU

Websites

MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.

In your initial post define the terms computer virusTrojan horse, and worm. Explain how each malware type functions once installed on a computer or computer system. Identify at least one computer virus, Trojan horse, or worm in operation today and describe its specific effects on systems once installed. In addition, you must evaluate the legal issues that arise as officials strive to prevent and detect each of these types of malicious programs. Examine the methods of analyzing malware attacks with regard to determining their source.

More to explorer

CLIMATE CHANGE

Define the topic of Climate effect, that impact on future and future societies (could be based on recent news, challenges etc)Integrate research

essays

Essay Topics #3 includes 2 essays – Essay Topic 3–1 and Essay Topic 3–2. This assignment concerns the course materials (https://we.tl/t-E0DqyHlu5p). On

Answer:

Title: iruses, Trojan Horses, and Worms

This question has been Solved!

Click the button below to order this solution.

Leave a Reply

Your email address will not be published. Required fields are marked *

error: Content is protected !!