Malware and ransomware threats

Assignment Help Basic Computer Science
Reference no: EM131527458

For this assignment, research the latest malware and ransomware threats. Use an Internet search engine to research the latest threats, for example, you can search for anti-virus vendors, such as McAfee or Symantec.

Instructions

Part 1 Instructions: 

Synthesize the researched information you found, the assigned readings for this unit, and assigned lectures for this unit.

Based on your synthesis, provide the following information in a 1 to 2 page Word document:

  • List five of latest malware and ransomware threats.
  • Define and describe each threat in detail (what type, how it spreads, how it is used, etc.)
  • List five techniques that you may use to defend against different types of threats.
  • How would backup and recovery mitigate the risk of ransomware and other threats?
  • Provide the links used in your research.

Part 2 Instructions:

Strong passwords are the first line of security. It is important to understand what is meant by a strong password.  

Complete the below instructions Part 2 of this assignment: 

  • Go to pctools.com/guides/password (Links to an external site.)Links to an external site. (or use an Internet search engine and search for password generator).
  • From your chosen site, follow the directions to generate a password.
  • List the password rules you set and the password given to you by the generator.
  • Briefly explain (in 1 to 2 paragraphs) why it is important to use strong passwords. Use supporting details to explain your reasons.

Compile Part 1 and Part 2 in a single Word document. Remember to cite any references using APA formatting.

Reference no: EM131527458

Questions Cloud

Discuss the qualitative factors that the company will need : discuss the qualitative factors that company will need to take into consideration before accepting special order of supplying 100 thousand units to customer.
What are some common troubleshooting steps : What are some common troubleshooting steps? What is the boot process of a typical computer?
Evaluate the cost of merchandise purchased and for sale : What is the difference between the cost of merchandise purchased and the cost of merchandise available for sale? Can they be the same amount? Explain.
Aggressive approach for maintaining working capital : Considering that some companies follow the conservative approach and some follow the aggressive approach for maintaining working capital
Malware and ransomware threats : Use an Internet search engine to research the latest threats, for example, you can search for anti-virus vendors, such as McAfee or Symantec.
Define the black-figure technique : Compare the Eleusis Amphora to the illustrations on the Dyplon Vase. Define the "black-figure" technique
What are the negative implications of freely posting : What protection does the Personal Information Protection and Electronic Documents Act (PIPEDA) offer to Canadian citizens using online services such as social media networks?
Explain short term financial policies of the business : Explain Business Overview, Risk, Short Term Financial Policies of the business, Current Capital Structure and Current Dividend Policy.
Differenciate between adjusting entries and closing entries : Identify each of the following accounts of Haifa Services Co. as asset, liability, stockholders' equity, revenue, or expense, and state in each case.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd