Free Essay

It 240 Week 8

In: Computers and Technology

Submitted By rychbankz
Words 644
Pages 3
Define each of the following terms in your own words:

Boot sector
Trojan horse
E-mail worms
Instant messaging worms
IRC worms
File-sharing networks worms
Internet worms *
Explain how each virus or worm functions and spreads.
Determine in which category the threat you researched in Week Seven belongs. Your response must be between 200 and 300 words.

A boot sector threat is a type of virus that infects host computers by writing the malicious code to the boot sector of the drive that’s infecting. This method of infiltration ensures that whenever the infected volume attempts to boot, the virus will boot first.

File threats are virii that attach themselves to executable program files such as .exe files. After being run, the virus then effects other programs as they attempt to run, or infect the entire directory or volume in which they’ve been introduced.

A multipartite threat is a threat with attributes of both boot sector and file viruses. These types of threats can spread from the MBR or boot sector to infect executable programs, or spread from a single file to infect the boot sector.

A macro is a type of formula language used in complex tasks in software such as Microsoft word or excel. These threats are capable of assigning multiple key commands to one action . Macros infect systems through a document file type and infect he host once the file is accessed.

A Trojan Horse threat is a threat that presents itself as a legitimate piece of software. After it has been installed the software can then perform a variety of actions such as sending sensitive information back to a remote computer via a keylogging to executing commands to erase or format the host computers hard drive.

An email worm is a malicious threat coded as an executable file that can replicate itself in order to spread to other computers. Unlike a Trojan however it doesn’t need to attach itself to another program. The primary means of spreading a worm is through email and computer networks. Some worms are coded in order to deliver a payload.

Instant messaging Worm is a worm that uses instant messaging networkd in order to spread to other computers. It does this upon infecting a host by accessing the hosts address book and often sending infected messages as a means to infect the host computer.

IRC worms are worms that spread through internet relay chat lines. It is a single executable file that replicates and infects other computers connected to the irc channel by modifying script files in order to perform the infection of all connected computers.

File sharing network worms Are worms that utilize file sharing networks in order to spread. The worm will disguise itself as a harmless file in a users shared folder. Mp3s and pornographic materials are commonly imitated by these worms. The file will then be created in the users shared folder, ready to be downloaded by other p2p users.

Internet Worms target low level TCP/IP ports to spread its malicious code to other computers. Upon infecting a host the program will then attack other computers on the network or random computers on the public internet at a specific port in order to infect the connected computer.

The threat the I listed during week seven is categorized as a remote access Trojan. It attaches itself to another file such as an email attachment, or executable file. Once this file is accessed the Trojan then installs itself. Upon installing itself the threat will then carry out the malicious actions it may have been designed for. In the case of Trojan:Win32/Koutodoor.F
The program would modifies internet explorer registry keys to prevent internet access. Upon completing that action the Trojan then attempts to communicate with a remote computer . The current purpose for this communication is unknown.…...

Similar Documents

Premium Essay

Hsm 240 Week 9 a+

...Creating a Social Program HSM 240 2012 Creating a Social Program Drugs Intervention & Prevention Program The mission is to provide service to all clients seeking relief from drugs and related addictions. We will provide the best care at the least amount of cost to our clients. The caring staff is here to help the client re-enter society free from drug dependency. Drugs Intervention & Prevention program Introduction Drugs have been around for thousands of years. Humans always search for ways to make themselves feel better. The problem with wanting to feel better is this is costing people their lives. Addiction to drug is one of the most serious social problems that exist today. People are abusing illegal drugs and prescription medication, they are overdosing on both. Drugs are dangerous, although taken as prescribed they can produce exceptional results in curing diseases. The inefficiency and deficiency of drug prevention programs has resulted in wide spread involvement in drug use. The problem has gotten so bad that the United States have declared war on drugs. According to the former President he stated the drug problem in the United States is (public enemy number one Nixon, 1971). The Drugs Intervention & Prevention Program will assess the problems leading to drug dependency. This organization will provide various levels of prevention and intervention methods through individual and family counseling. This facility will......

Words: 2093 - Pages: 9

Premium Essay

Week 8 Psy 240

...Assignment Week 8 Psychiatric Disorders, Diseases, and Drugs Christina Schwartz Schizophrenia disorder is a serious mental disorder that is easily misdiagnosed with other disorders that have similar symptoms. These symptoms usually occur around early adolescent ages and continue into adulthood. The symptoms of this disorder include hallucinations, delusions, goal directed behavior, and emotional expressions. (Andreasen, 1995) The symptoms can also be categorized into positive and negative symptoms. Positive symptoms are those that represent an excess or distortion of normal function, whereas negative symptoms are those that make reduce the ability to function normally. An example of a positive symptom would be not having the ability to react with the proper emotion to positive or negative events. An example of a negative symptom would be the loss of motivation, or being unable to experience pleasure. (Pinel, 2011) Statistics show that although only 1% of American’s are diagnosed with the disorder it is shown that that chances of inheriting the disorder rise in twins (identical) and even in an adopted child who is brought into a healthy family atmosphere shortly after birth. The belief according to (Pinel, 2011) is that some people inherit the potential for schizophrenia however; experiences may or may not activate it. Chlorpromazine is the first medication that was prescribed to those with schizophrenia disorder. The medication was actually found by complete...

Words: 1061 - Pages: 5

Premium Essay

Week 8-Hsm/240 Assignment (Finances)

...Finances HSM/240 November 24, 2013 These past few weeks, the organization that I have focused my time and effort on would be the Department of Human Services (DHS). This is an organization in Michigan that focuses purely on helping the communities around it. They have many different programs to fit many different needs such as cash assistance, medical assistance, food assistance, even assistance with child support. They strive to reach and help all those that are in need in the area, no matter what the person needs help with. The DHS stretches to help a lot of people as often as it can, so it’s safe to say that they go through a lot of money each month, and this leads back to the question of where the funding comes from. The DHS is a state agency, so it is government funded. They are given an allowance, or budget, from the government. This budget is split up between the programs so that each program is able to thrive and move properly. This agency’s funding comes from what I would consider to be a pretty reliable source. The government sends out the money to the company so unless it was voted that the organization wasn’t needed and didn’t need the funding, the money automatically goes to them. The next question that was asked of us to include the answer to in this paper was regarding the funds. The question was whether or not the organization implemented financial accountability measures to ensure that funds were being used properly. This is a tough one, I spent......

Words: 730 - Pages: 3

Premium Essay

Hsm 240 Week 8

...Private Funds Danielle Bryant HSM/240 December 11, 2013 Lori Moon Private Funds As I researched different privately funded agency’s I came across The Family Services Association, which is a privately funded agency. Family Service Association of San Antonio has been building strong families since 1903. It is the oldest human service agency in San Antonio dedicated to helping children, seniors, and families in need. I chose this agency because they have so many programs that they offer to their community that address so many different issues and problems. At The Family Services Association, they offer many different programs to the community that address social issues. I chose to write about their Early Childhood Well-Being program. The Early Childhood Well-Being Program was initiated in January 2011. This program is to identify gaps in the areas of medical and mental health services for young children and their families. The program will then collaboratively build strategies to effectively meet the needs of young children and families with the intended outcome of maximizing their healthy development and successful educational achievement, and establishing a healthy foundation for lifetime success. Developing and mentoring infrastructure of professionals and services that are accessible to families that effectively address early childhood development issues. This program also educates trains and mentors early education/health staff and administrators. Health providers......

Words: 356 - Pages: 2

Premium Essay

The Brain Week 2 Psy 240

...The Brain Week 2 Psy 240 Biopsychology The human brain is ultimately responsible for all thought and movement that the body produces and is one of the largest and most complex organs in the human body composed of trillions of connections that work together called synapses. The brain weighs approximately three pounds and is made up of nerve cells which interact with the rest of the body through the spinal cord and nervous system. It contains about 75 percent water along with 100 billion neurons. Neuroscientists estimate that there are 100 trillion connections among the neurons, and nearly an infinite number of paths that neural signals can travel through parts of the brain called the morass. These nerve cells transfer information back to the center of the brain where information is processed, generated and appropriately reacted upon. The human brain gives us the ability to move, generate information, to speak and understand language, to interact with the environment, to interact with inanimate objects and to communicate with others. The brain can be divided into three basic units: the forebrain, the midbrain and the hindbrain. However, there are also five major structures of the brain. The Myelencephalon, Metencephalon, Mesencephalon, Deincephalon and Telencephalon. These five major structures of the brain shed some light on the complexity of how it is structured and how the human brain works. The Myelencephalon, also called medulla, is the division of the......

Words: 874 - Pages: 4

Premium Essay

Week 8

...Week 8 Assignment Rubric Written Assignment Grading Form for Good Business Sense Paper, Due in Week Eight |Content and Development |Points Possible |Points Earned |Comments | |70 Points |70 | | | | | | | | |All key elements of the assignment are covered in a substantive way. |30 | | | |The paper answer Questions 1–4 from the Developing Good Business | | | | |Sense activity on p. 394 of the text. | | | | |The paper is 700 to 1,050 words. | | | | |The content is comprehensive, accurate, and/or persuasive. |10 | | | |The paper develops a central theme or idea directed toward the | | | | |appropriate audience. | ...

Words: 264 - Pages: 2

Premium Essay

Hca 240 Week 8 Mental Illness Paper ( a+Material )

...HCA 240 Week 8 Mental Illness Paper ( A+Material ) Get Tutorial by Clicking on the link below or Copy Paste Link in Your Browser For More Courses and Exams use this form ( ) Feel Free to Search your Class through Our Product Categories or From Our Search Bar ( ) Mental Illness Paper Anorexia nervosa is not really about food. It is an unhealthy way of trying to cope with emotional problems. Anorexia nervosa is a mental illness that causes people to obsess about their weight and the food they eat. The individual diagnosed with anorexia nervosa does not want to maintain even the minimal weight considered normal for his or her age and height. The disorder is recognized by insufficient weight along with an intense fear of gaining weight and often-misunderstood awareness of his or her body weight and shape (Anorexia Nervosa, 2011). Anorexia nervosa is diagnosed by four different criteria. These criteria consist of the refusal to uphold a normal weight evidenced by failure to maintain a weight equal to 85% of that expected for his or her height and age. Criteria B include the extreme fear of weight gain or of becoming fat although the individual is obviously underweight. Criteria C is met when the individual exhibits denial about their condition, has troubled perceptions about his or her weight or look or has an obsession with regard......

Words: 7267 - Pages: 30

Premium Essay

Bus 519 Week 8 Bus519 Week 8

...Link for the Answer: BUS 519 Week 1 Discussion "What is Risk?"  Please respond to the following: * There are three (3) schools of thought regarding risk. The first considers the positive and negative aspects of risk, but sees them as separate. The second group believes that there are benefits from treating threats and opportunities together, while the third school does not label uncertainties, but addresses uncertainty as part of “doing the job.” Argue the value of having a risk strategy despite the cost associated with it. Include an example to support your response. Provide a rationale for your selection and determine how this approach helps a project to be successful. BUS 519 Week 2 Discussion "Need for Risk Management" Please respond to the following: * There are four (4) critical success factors that are important for effective risk management: supportive organization; competent people; appropriate methods, tools and techniques; and simple, scalable process. Determine three (3) obstacles for an organization to manage risk effectively. Suggest strategies from the perspective of a project manager to avoid the obstacles. BUS 519 Week 3 Discussion "Project Initiation" Please respond to the following: * Using the “Stakeholder Analysis Template” (Appendix B2 in the Hillson and Simon text) for a company that you......

Words: 2422 - Pages: 10

Premium Essay

Week 8

...Week 8 Project You are a portfolio manager for the XYZ investment fund. The objective for the fund is to maximize your portfolio returns from the investments on four alternatives. The investments include (1) stocks, (2) real estate, (3) bonds, and (4) certificate of deposit (CD). Your total investment portfolio is $1,000,000. Investment Returns Based on the returns from the past five years, you concluded that the investment annual returns on stocks are 10%, on real estates are 7% on bonds are 4% and on CD is 1%. Risk Constraints However, you also have to analyze the risks associate with each investment category. A wildly used risk measurement parameter is called Value at Risk (VaR). (Note: VaR measures the risk of loss on a specific portfolio of financial assets.) For example, given a million dollar stock investment, if a portfolio of stocks has a one-day 4% VaR, there is a 5% probability that the stock portfolio will fall in value by more than 1,000,000 * 0.04 = $40,000 over a one day period. In the portfolio, the VaR for stock investments is 6%. Similarly, the VaR for real estate investment is 2% and the VaR for bond investment is 1% and the VaR for investment in CD is 0%. To manage the portfolio, you decided that at 5% probability, your VaR for stocks cannot exceed $25,000, VaR for real estate cannot exceed $15,000, VaR for bonds cannot exceed $2,500 and the VaR for CD investment is $0. Diversification and Liquidity Constraints As a diversified......

Words: 392 - Pages: 2

Premium Essay

Week 8

...Axia College Material Appendix E Asian Americans According to the U.S. Census Bureau Part I Organize statistics from the U.S. Census Bureau on Asian American diversity using the matrix below and the Asian/Pacific American Heritage Month: May 2010 document. Use the following directions to locate the document: • Go to the homepage of the U.S. Census Bureau website: • Scroll down to Newsroom. • Click on Facts for Features. • Under the 2010 heading, select the document: March 2: Facts for Features: Asian/Pacific American Heritage Month: May 2010 | PDF Version - 130K. You may also locate the document under the Week 8 Materials tab on your student website. Statistic 1 of the Cultural Makeup column is provided for your reference. Note: you will find only two statistics to place in the Financial row. | |Statistic 1 |Statistic 2 |Statistic 3 | |Cultural Makeup |15.5 million U.S. residents are |In Hawaii, Asians made up the |In the Us in 2008, Chinese | | |Asian or Asian in combination |highest proportion of the total |Americans were the largest Asian | | |with other races. |population 54% |group | |Income | |11.8% Poverty rate for......

Words: 872 - Pages: 4

Premium Essay

Week 4 Assignment It 240

...8. C The explanation that I came up with is that the network address is which is originally assigned as a class B. So it has a default subnet mask of Then you want to divide the network into seven different subnets and only the network address is the one that provides enough networks because it will provide 14 subnets. 9. C The explanation for this one that I came up with is that the network address is originally assigned as a class C address because it has a default subnet mask of You would need to divide this address space into four subnets and maximize the number of host addresses per subnet. You would do this by using which would give you 6 subnets. Each subnet will have 30 host addresses available. The other answers to this question do not provide enough subnets and do not have 30 or more host addresses. 23. A The ping uses ICMP echo packets to send to a host that reports if an echo reply is received or not. If indeed the echo reply is received then the host is working and operating correctly on the network. The other answers to this question are not correct because ARP resolves MAC addresses to IP addresses. This is done through the use of broadcasts which are not publicized across the Internet. DNS is used to resolve a domain name to an IP address and it does not send communication directly to a network host. WINS does not support the most Unix machines and provides windows to a......

Words: 357 - Pages: 2

Premium Essay

Psy 240 Week 6

...Week Six Sleeping and Dreaming PSY/240 Sleeping and Dreaming Sleep is considered a natural state in which there is reduced consciousness, reduced sensory activity, and inactivity of all muscles. Sleep is needed for the body to recharge, grow, and is essential for health and well-being. There are three standard psychophysiological measures of sleep and they define the stages of sleep. They are the electroencephalogram (EEG), the electrooculogram (EOG), and the neck electromyogram (EMG). There are four different stages of EEG sleep. Stage 1 EEG is a low-voltage, high-frequency signal slower than being awake. When going from stage to stage the EEG voltage increases and the EEG frequency decreases. Once a person goes from stage 1 to stage 4, the cycles of sleep go back and forth throughout the stages while a person is sleeping. Each cycle is about 90 minutes long. REM sleep is associated with stage 1 EEG while NREM sleep is a combination of all other stages. Stages 3 and 4 are considered slow-wave sleep or SWS due to the delta waves. During REM sleep people have rapid eye movements. Dreaming occurs during the REM stage of sleep. Some people believe that external stimuli can affect their dreams. Some people believe dreams are quick and only last a few minutes, while research suggests they last as long as the person is dreaming. Some people say they do not have any dreams, but more than likely they just do not remember their dreams. Penile......

Words: 416 - Pages: 2

Premium Essay

Week 8

... | | | |Prediction Interval Lower Limit |28.74738 | | | |Prediction Interval Upper Limit |45.98115 | | | 7. The business problem facing the director of broadcasting operations for a television station was the issue of standby hours (i.e., hours in which unionized graphic artists at the station are paid but are not actually involved in any activity) and what factors were related to standby hours. The study included the following variables: Standby hours (Y), Total number of standby hours in a week Total staff present (X1), Weekly total of people –days Remote hours (X2), Total number of hours worked by employees at locations away from the central plant Data was collected for 26 weeks; this is organized and stored in the attached spreadsheet Standby. |  |Coefficients |Standard Error |t Stat |P-value | |Intercept |-330.675 |116.4802 |-2.83889 |0.009299 | |Total Staff |1.764865 |0.379036 |4.656194 |0.00011 | |Remote |-0.13897 |0.058798 |-2.36347 |0.026932 | a. State the multiple regression equation Standby hours =-330.675 +1.76485*Total Staff -0.13897*Remote b. Interpret the meaning of the slopes b1 and b2, in this problem. ...

Words: 4991 - Pages: 20

Premium Essay

It/240 Week 4

...8. Your company is assigned the network address You need to create seven subnets on the network. A router on one of the subnets will connect the network to the Internet. All computers on the network will need access to the Internet. What is the correct subnet mask for the network? The answer would be C, It would require seven subnets in order for every computer with an IP address. To reach the seven subnets an individual should mask the initial four or the last 16 bits to allow a maximum of 14 subnets. 9. A company with the network ID occupies four floors of a building. You create a subnet for each floor. You want to allow for the largest possible number of host IDs on each subnet. Which subnet mask should you choose? The correct answer for this scenario is, for a total of six subnets and the minimum that is required is four. The host ID’s will utilize a subnet mask that allow a few subnets. This allows the biggest quantity of host. 23. Several users are complaining that they cannot access one of your Windows NT file servers, which has an IP address that is accessible from the Internet. When you get pages, you are not in the server room, Instead you are at another company in a friend’s office that only has a UNIX workstation available, which also has internet access. What can you do to see id the file server is still functioning on the network? To see is the file server is still functioning on the network I......

Words: 439 - Pages: 2

Premium Essay

It 240 Week 5 Discussion Questions

...IT 240 / Week 5 / Discussion Questions ASSIGNMENTS 1. Read the “Storage Area Network” section through the “DNS Server” section in Ch. 8, “Network Operating System Fundamentals,” of Guide to Networking Essentials. 2. Read the “Managing User and Group Accounts” section through “User Profiles,” section in Ch. 9, “Server Management and Administration,” of Guide to Networking Essentials. 3. Read Ch. 4, “The Internet,” of Business Data Communications. 4. Read section 20.3 in Ch. 20, “Network Management,” of Business Data Communications. Discussion Question 1 Due Date: Day 4 [Main] forum. Post your response to the following: What is DNS? How do users benefit from it? Provide a brief description of the DNS process to resolve a URL to its IP address. DNS stands for Domain Name System and essentially operates like a phone book. It keeps a list of computer names and IP addresses. Instead of typing a numerical address into his or her web browsers address bar, a user can input the name of the computer (www. hotmail. com). The request is forwarded to the users computers DNS client, and from there to the DNS server, which then forwards the user to that specific address. For users who are not mathematically inclined, it is easier to remember and input the name of a computer than it is to remember and input all of the numbers and decimals in an IP address. Also, there is no reason for DNS to rely on TCp because usually, only a single data packet is used to send......

Words: 530 - Pages: 3