19 Jun Viruses, Trojan Horses, and Worms
Viruses, Trojan Horses, and Worms
Prior to beginning work on this discussion, read Chapter 4 in the text, watch the Technology in 10: Malware, Viruses, Worms, and More (Links to an external site.) video, and review the Cisco What Is the Difference: Viruses, Worms, Trojan Horses, and Bots? (Links to an external site.) article.
Computer viruses are considered to be the oldest form of malware that can infect a system. These types of viruses have been around since the inception of the personal computer. The modern landscape of computing has given rise to a number of newer and more sophisticated viruses, Trojan horses, and worms that can infiltrate a computer system, opening the user to heightened risks of being victimized by cyber criminals. Individual computer users are not the only targets of these malware programs; computer criminals and hackers now target governmental and corporate computer systems on a regular basis.
Required Resources
Text
Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.). Retrieved from https://www.vitalsource.com/
- Chapter 4: Malware and Automated Computer Attacks
- Chapter 5: Digital Piracy and Intellectual Property Theft
Article
CISCO. (n.d.). What is the difference: Viruses, worms, trojan horses, and bots? (Links to an external site.) Retrieved from http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html
- This online resource, by Cisco Systems, contains detailed explanations of computer viruses, worms, Trojan horses, and bots. It will assist you in the development of this week’s discussion posts.
Accessibility Statement is not available
Privacy Policy (Links to an external site.)
Multimedia
Larkin, D. [Dom Larkin]. (2014, June 8). Digital Piracy (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=RMaXj1Kjis8
- This video is a screencast presentation of the many aspects of digital piracy. The video will assist you in the development of this week’s written assignment.
Accessibility Statement
(Links to an external site.)Privacy Policy (Links to an external site.)
IgnorantPCFanboys. (2011, September 22).
Steve Wozniak: Digital piracy (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=jJRSjFqu-8Q
- This video is an interview with Steve Wozniak on the early culture surrounding digital piracy. The video will assist you in the development of this week’s written assignment.
Accessibility Statement
(Links to an external site.)Privacy Policy (Links to an external site.)
Mr. Ford’s Class. (2014, January 21).
Technology in 10: Malware, Viruses, Worms, and More (Season 1 – Episode 3) (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=29LOaxPwPPU
- This video is a lecture style analysis of malware, viruses, and worms. It will assist you in the development of this week’s discussion post.
Accessibility Statement
(Links to an external site.)Privacy Policy (Links to an external site.)
Recommended Resources
Dissertation
Lough, D. L. (2001). A taxonomy of computer attacks with applications to wireless networks (Links to an external site.) (Doctoral dissertation, Virginia Polytechnic Institute and State University). Retrieved from https://theses.lib.vt.edu/theses/available/etd-04252001-234145/unrestricted/lough.dissertation.pdf
- This dissertation examines in detail the variety of attacks that can be levied at computers and provides a taxonomy of such criminal activity. Special attention is given to attacks vie wireless networks.
Article
Hinduja, S. (2003). Trends and patterns among online software pirates (Links to an external site.). Ethics and Information Technology, 5(1), 49-61. Retrieved from http://www.springer.com/computer/swe/journal/10676
- The full-text version of this article is available through the ProQuest database in the University of Arizona Global Campus Library. This article provides information on the trends and patterns of software pirates working on a university campus. It may assist you in the development of this week’s activities.
Multimedia
arXter. (2009, January 8). HARDtalk: The music industry – Digital music & piracy (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=rnpntZLnF7w
- This video is a British news style discussion of global digital piracy and the variety of methods governments can utilized to help combat digital piracy.
Accessibility Statement
(Links to an external site.)Privacy Policy (Links to an external site.)
Imperva. (2014, January 30).
Automated hacking tools – Meet the new rock stars in the cyber underground (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=TE21JrVWlHU
- This video is a webinar discussing automated computer hacking, firewall applications, and various methods that can be utilized to protect data.
Accessibility Statement
(Links to an external site.)Privacy Policy (Links to an external site.)
Websites
MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com)
- This resource site will provide assistance in researching additional sources for the assessments within this course.
In your initial post define the terms computer virus, Trojan horse, and worm. Explain how each malware type functions once installed on a computer or computer system. Identify at least one computer virus, Trojan horse, or worm in operation today and describe its specific effects on systems once installed. In addition, you must evaluate the legal issues that arise as officials strive to prevent and detect each of these types of malicious programs. Examine the methods of analyzing malware attacks with regard to determining their source.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
Do you need help with this question?
Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.
WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.
With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Chat with us today! We are always waiting to answer all your questions.