Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Give your opinion, whether you agree or not. Explain. The first technique I would introduce is to be familiar with your computer and how it

Give your opinion, whether you agree or not. Explain.

The first technique I would introduce is to be familiar with your computer and how it operates. Most of us work on the same computer day in and day out. You know when it is operating slowly, and you generally know what programs/applications are running to possibly slow it down. If you are generally utilizing the same applications and notice a large contrast from day to day operations, this might trigger your to run your anti-virus software to scan and hopefully find any malicious software. If detected, it would be a good idea to disconnect the computer from transmitting over the internet in case the malware has been collecting any data from your computer. After you have found the malware and disconnected the internet, it would behoove you to backup any and all critical system files, in essence, to creat a restore point. Once you have completed these actions you can remove the malware from your computer, if you are utilizing a trial version, do not be surprised if the antivirus program "quarantines" the malware and then asks you to purchase it in order to permanently delete the threat. The next question posed this week was to discuss the vulnerabilities associated with computer memory and computer process that malware can take advantage of. One type that comes to mind is fileless malware. Due to that, it is file-based, rather than memory-based, it operates within other software applications, it is difficult to scan with antivirus software. This allows the malware to collect more data as you run through your applications throughout the day.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Principles of Auditing and Other Assurance Services

Authors: Ray Whittington, Kurt Pany

19th edition

978-0077804770, 78025613, 77804775, 978-0078025617

More Books

Students also viewed these Computer Network questions

Question

What is a verb?

Answered: 1 week ago

Question

In Exercises find dy/dx by implicit differentiation. xy - y = x

Answered: 1 week ago