Perform some type of illegal activity on another computer

Assignment Help Basic Computer Science
Reference no: EM131717467

LAB Assignment: Scanning for Malware

Malicious Software, referred to as malware, is a program written by a person to perform some type of illegal activity on another computer. The person who creates malware is referred to as a hacker. Hackers send malware to other computers over a network-usually the Internet.

The purpose of this assignment is to prevent you from being a victim of a malware attack by helping you learn about malware and how it can get installed on your computer.

NOTE: Depending on the size of your hard drive and the number of files, this exercise could take half an hour to several hours to complete.

Instructions:

- Create a Word document and name it YourLastName Scan Results
- Completeness of your answers as well as quality, spelling and grammar are part of your score.
- When you have finished, save and close your Word document and submit your file at the class Web site.
- Evaluation will be based on:

Word document, screen print (step 5 & 6), answers to questions in step 10.

Part 1: Scanning for Malware

1) The most common type of malware is a virus. Every computer that connects to the Internet should have antivirus software installed on it. If your computer has an antivirus program, you can use it for this assignment.
If your computer has an antivirus program skip to step 4.

2) If your computer does not have an antivirus program, you will need to download a free antivirus program from the Internet. Some popular options include AVG, Avast and Microsoft Security Essentials.

Note: if you have a Macintosh computer, you will need to download a program that is Macintosh compatible.

3) Using Google, type "free antivirus program" into the search box. Click on the link to the antivirus program you want to download and then follow the instructions from the Web site to download and install the antivirus program you have chosen to your computer.

4) Using the antivirus program installed on your computer perform a virus scan. Some scanner programs give you the option of performing a "Quick Scan" or "Full Scan". A quick scan, which normally takes a few minutes, is not as thorough as a full scan. A full scan scans your entire hard drive in an attempt to identify any malware that may be on your computer. For this assignment you are to perform a full scan. Depending upon how much data you have on your hard drive, a full scan may take between 1-6 hours.

5) When the scanner is finished it will display a report listing the malware it found on your computer. Make a screen print of this report (even if the scanner found no malware). Ensure the results window is maximized (fills the monitor window).

To copy an image of your computer screen press the ALT + Print Screen keys at the same time. NOTE: If you have a Macintosh computer, you will need to find out how to perform a screen print on your computer.

6) Open a word processing document. Type your name in the top left corner of the document. Space down two lines and then copy the screen image from step 5 to that document (paste). Make sure the screen image is large enough that the instructor can read the scan results (including the names of any malware that was found). << Click and drag the image until it fills a page of the Word document.

7) Once the image has been pasted into the Word document, press Enter a couple of times.

8) Name the document "YourLastName Scan Results".

9) Follow the antivirus program instructions to delete the identified malware from your computer.

Part 2: Learning about malware

10) Use information provided in chapter 9 and on the Internet to answer the below questions. Type the question number and your answer under the screen image on the document you created in step 6.

1) What is a virus?
2) List two symptoms that may indicate that your computer has a virus
3) List two ways that viruses get installed on computers
4) List two ways to protect your computer from getting a virus
5) A virus is one type of malware. Name and explain/describe three other types of malware.

Reference no: EM131717467

Questions Cloud

What are the primary information needs of each manager : Tenrack is a fairly large manufacturing company located in the southern United States. What are the primary information needs of each manager
Determine the tax management efficiency ratio : Wilmindtom hills state bank has just submitted its report of condition and report of income to its principal supervisory agency.
Demonstrate caring in your current professional practice : Take a moment to reflect on how you demonstrate caring in your current professional practice - Create an artistic representation of your perception on caring
Develop metabolic acidosis : Explain at the cellular level, about cellular aerobic (an anaerobic) respiration, and why this patient will soon develop metabolic acidosis.
Perform some type of illegal activity on another computer : Malicious Software, referred to as malware, is a program written by a person to perform some type of illegal activity on another computer.
Compare growth rate in assets and deposits of several banks : You have been asked to compare the growth rate in assets and deposits of several banks that are regarded as takeover targets for your growth-oriented company.
What is your initial focus for disease control : what do you decide to do? Why? Be sure to justify your decision. What is your initial focus for disease control? What other healthcare disciplines would y
Prepare journal entries for the transactions above : Presented below are selected transactions of Molina Company. Prepare journal entries for the transactions above
How to check the claims out on the web : A guest speaker visiting your class contends that Bank of America is one of the most profitable banks of its size in the United States.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How many miles of road are there in the united states

On average, how many times would you have to flip open the Manhattan phone book at random in order to find a specific name?

  Advantage to process the data

You can write your program to next the loops in either direction, that is, process row by row or column by column. Explain which way you would choose to process the data. What is the advantage?

  Explain the operation of the approximate dynamic programming

Correspondingly Table P12.16 presents a summary of the approximate Q-learning algorithm. Explain the operation of the approximate dynamic programming scheme of Fig. P12.20 to justify the summary presented in Table P12.16.

  Use map to define convert-euro converts list of us dollars

Use map to define the following functions: convert-euro, which converts a list of U.S. dollar amounts into a list of euro amounts based on an exchange rate of 1.22 euro for each dollar.

  Is there any limit to the number of neuron input signals

Does a neuron having all negative input values always generate a negative output signal? Is there any limit to the number of neuron input signals?

  Select all columns and all rows from the employees table

Select all columns and all rows from the Employees table, but display an additional column called 'Raise to' which will be the current salary multiplied.

  Personnel comprise the remainder of the organization

Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. Mostly software developers and a relati..

  Large number of possible responders

Online questionnaires enable companies to gather data from a large number of possible responders. For a web-based questionnaire, determine which response format would be the most effective. Provide a rationale for your response.

  Derive the obd procedure as a special case of the optimal

Using this approximation, derive the OBD procedure as a special case of the optimal-brain-surgeon (OBS) algorithm, studied in Section 4.14.

  Assume you are the it manager for an organization tasked wit

Assume you are the IT manager for an organization tasked with evaluating whether or not to deploy internal wireless access for employees. Discussing the advantages and disadvantages of deploying a WLAN in an organization. Compare the benefits and ris..

  Determine the internet addresses

1. Determine the Internet addresses that describe each of the 3 subnets using FLSM 2. Determine the Internet addresses that describe each of the 3 subnets using

  Shortest tenure in the executive suite

Why do you think the CSO position is usually the one with the shortest tenure in the Executive Suite?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd