(Solved Homework): can you help me with the following…

can you help me with the following

:What is the purpose of malware? Follow-up by briefly describing each of the following types of malware: virus, spyware, adware, Trojans, worms, and macro virus. How can an organization provide a defense against attacks both logically and physically? Directions: Your completed assignment should be at least 2 FULL double-spaced page(s) in length. Proofread your completed essay to ensure proper spelling, grammar, capitalization, punctuation, and sentence structure. Include at least one Herzing library or appropriate web reference in addition to your text and/or supplemental material provided that is presented in proper APA format that supports your submission. (60 points) Assignment Objectives: 1. Discuss possible security issues within an organization. 2. Evaluate the different types of malicious software and what damage they can do. 3. Describe methods of protecting against malware attacks. 4. Define physical security attacks and vulnerabilities. • Week 2 Assignment 2 (W2A2): Key Assessment for Learning Objective #1 Use Internet search engines to gather information on U.S. Code, Title 18, Sec. 1030, which covers fraud and related activity in connection with computers. — Write a one page summary explaining how this law can affect ethical hackers and security testers.

Don't use plagiarized sources. Get Your Custom Essay on
(Solved Homework): can you help me with the following…
Get an essay WRITTEN FOR YOU, Plagiarism free, and by an EXPERT!
Order Essay

Task 1: The summary must mention at least one law and discuss

Task 2: Alexander Rocco Corporation, a large real estate management company in Maui, Hawaii, has contracted your computer consulting company to perform a penetration test on its computer network. The company owns property that houses a five-star hotel, golf courses, tennis courts, and restaurants. ClaudiaMae, the vice president, is your only contact at the company. To avoid undermining the tests you’re conducting, you won’t be introduced to any IT staff or employees. Claudia wants to determine what you can find out about the company’s network infrastructure, network topology, and any discovered vulnerabilities. Research the laws applying to the state where the company is located, and be sure to reference any federal laws that might apply to what you have been asked to do.without any assistance from her or company personnel. Research the laws applying to the state where the company is located, and be sure to reference any federal laws that might apply to what you have been asked to do. Based on this information, write a one-two page report outlining the steps you should take before beginning penetration tests of the Alexander Rocco Corporation.

Task 3: Statement of work must be included

Task 4: Verify any contractual agreements and Laws

Expert Answer


Malware is the shortened form of malicious software.Since 1980’s personal computer users have been annoyed with Malware.As the wild world wide use of broadband internet, the potential to make money with Malware has become unlimited.Many organisations have realised this and are taking the opportunity while the majority of end users are apparent to the risk.

Virus: A virus is a endemic program that attaches itself to another piece of software, and then reproduces itself when that software is run. Most often this is spread by sharing software or files between computers.

Spyware: This is used to collect personal information about the end user without knowing to them, such as credit card numbers, email addresses and web surfing habits for marketing purposes. Some side effects of spyware infection can be a changed homepage address, slowed internet performance, pop-up advertisements.

Adware: Adware is a word formed from combining Advertising and Software.Adware is advertising-supported software. These advertisements are often in the form of pop-ups and help making revenue for the software author. Adware is more annoying than harmful on its own, but often times Adware comes bundled with other unwanted software such as Spyware.

Trojan: software that one guesses was going to be one thing, but turns out to be something bad. Named for the fabled Trojan Horse that appeared to be a gift but in fact carried a dangerous payload.

Worms:Worms usually show up via email and instant messages, and often confine themselves their activities to what they can accomplish inside the application that moves them. They use a computer network to spread, relying on security failures on the target computer in order to access it, and delete data.

Macre viruses:These viruses are the ones that run inside specific applications that allow macro programs in order to extend the capabilities of a given software. Viruses that targeted Microsoft Office were widespread a few years back, though the threat of macro viruses has also declined in recent times as unsigned macros are automatically disabled in Office and are not allowed to run.

The protection against malware has two parts: Personal vigilance, and protective tools. One of the most popular ways to spread malware is by email, which may be disguised to look as if it is from a familiar company such as a bank, or a personal email from a friend.Personal vigilance is the first layer of protection against malware. Because business security is not perfect, even downloads from legitimate sites can sometimes have malware attached. Which means that even the most prudent user is at risk, unless you take additional measures.

No organization can do without antivirus and anti-spyware software. New threats are emerging all the time, so one should always download up-to-date definitions from your software provider. While nothing is a guarantee against infection, antivirus and anti-spyware software can go a long way towards helping protect your organization.Finally, using antivirus and anti-spyware software is only part of a comprehensive security plan.

Homework Ocean
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.


Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.


Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.


Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.


Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.

× Contact Live Agents