Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

For this assignment, consider the following list of malware types: 1) Trojan Horse 2) Warm 3) Ransomware 4) Spyware 5) Adware For each of the

image text in transcribed
For this assignment, consider the following list of malware types: 1) Trojan Horse 2) Warm 3) Ransomware 4) Spyware 5) Adware For each of the above items, define what it is, then find a real world example from the past 10 years (2010 - present) and describe it. That is, I want you to write its name, what it did, what it exploited, the date of discovery, the damage done etc. If you cannot find a proper name for it try providing me with a CVE ID for the exploit you are describing (for example, WannaCry used an exploit with the ID CVE-2017-0144). Do not write about malware I mentioned in the lab presentation. The purpose of this assignment is to learn about other modern real-world examples of the malware we discussed. Submit your assignment as a Word or PDF document. Bonus: If you can find examples for at least 3 of the 5 malware types required for this assignment related to the COVID- 19 pandemic, you can earn 1 bonus point. Of course, I will be checking them to make sure they fit the criteria. ASSIGNMENT SUBMISSION

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Driven Web Sites

Authors: Joline Morrison, Mike Morrison

2nd Edition

? 061906448X, 978-0619064488

More Books

Students also viewed these Databases questions