Perform some type of illegal activity on another computer

Assignment Help Basic Computer Science
Reference no: EM131717467

LAB Assignment: Scanning for Malware

Malicious Software, referred to as malware, is a program written by a person to perform some type of illegal activity on another computer. The person who creates malware is referred to as a hacker. Hackers send malware to other computers over a network-usually the Internet.

The purpose of this assignment is to prevent you from being a victim of a malware attack by helping you learn about malware and how it can get installed on your computer.

NOTE: Depending on the size of your hard drive and the number of files, this exercise could take half an hour to several hours to complete.

Instructions:

- Create a Word document and name it YourLastName Scan Results
- Completeness of your answers as well as quality, spelling and grammar are part of your score.
- When you have finished, save and close your Word document and submit your file at the class Web site.
- Evaluation will be based on:

Word document, screen print (step 5 & 6), answers to questions in step 10.

Part 1: Scanning for Malware

1) The most common type of malware is a virus. Every computer that connects to the Internet should have antivirus software installed on it. If your computer has an antivirus program, you can use it for this assignment.
If your computer has an antivirus program skip to step 4.

2) If your computer does not have an antivirus program, you will need to download a free antivirus program from the Internet. Some popular options include AVG, Avast and Microsoft Security Essentials.

Note: if you have a Macintosh computer, you will need to download a program that is Macintosh compatible.

3) Using Google, type "free antivirus program" into the search box. Click on the link to the antivirus program you want to download and then follow the instructions from the Web site to download and install the antivirus program you have chosen to your computer.

4) Using the antivirus program installed on your computer perform a virus scan. Some scanner programs give you the option of performing a "Quick Scan" or "Full Scan". A quick scan, which normally takes a few minutes, is not as thorough as a full scan. A full scan scans your entire hard drive in an attempt to identify any malware that may be on your computer. For this assignment you are to perform a full scan. Depending upon how much data you have on your hard drive, a full scan may take between 1-6 hours.

5) When the scanner is finished it will display a report listing the malware it found on your computer. Make a screen print of this report (even if the scanner found no malware). Ensure the results window is maximized (fills the monitor window).

To copy an image of your computer screen press the ALT + Print Screen keys at the same time. NOTE: If you have a Macintosh computer, you will need to find out how to perform a screen print on your computer.

6) Open a word processing document. Type your name in the top left corner of the document. Space down two lines and then copy the screen image from step 5 to that document (paste). Make sure the screen image is large enough that the instructor can read the scan results (including the names of any malware that was found). << Click and drag the image until it fills a page of the Word document.

7) Once the image has been pasted into the Word document, press Enter a couple of times.

8) Name the document "YourLastName Scan Results".

9) Follow the antivirus program instructions to delete the identified malware from your computer.

Part 2: Learning about malware

10) Use information provided in chapter 9 and on the Internet to answer the below questions. Type the question number and your answer under the screen image on the document you created in step 6.

1) What is a virus?
2) List two symptoms that may indicate that your computer has a virus
3) List two ways that viruses get installed on computers
4) List two ways to protect your computer from getting a virus
5) A virus is one type of malware. Name and explain/describe three other types of malware.

Reference no: EM131717467

Questions Cloud

What are the primary information needs of each manager : Tenrack is a fairly large manufacturing company located in the southern United States. What are the primary information needs of each manager
Determine the tax management efficiency ratio : Wilmindtom hills state bank has just submitted its report of condition and report of income to its principal supervisory agency.
Demonstrate caring in your current professional practice : Take a moment to reflect on how you demonstrate caring in your current professional practice - Create an artistic representation of your perception on caring
Develop metabolic acidosis : Explain at the cellular level, about cellular aerobic (an anaerobic) respiration, and why this patient will soon develop metabolic acidosis.
Perform some type of illegal activity on another computer : Malicious Software, referred to as malware, is a program written by a person to perform some type of illegal activity on another computer.
Compare growth rate in assets and deposits of several banks : You have been asked to compare the growth rate in assets and deposits of several banks that are regarded as takeover targets for your growth-oriented company.
What is your initial focus for disease control : what do you decide to do? Why? Be sure to justify your decision. What is your initial focus for disease control? What other healthcare disciplines would y
Prepare journal entries for the transactions above : Presented below are selected transactions of Molina Company. Prepare journal entries for the transactions above
How to check the claims out on the web : A guest speaker visiting your class contends that Bank of America is one of the most profitable banks of its size in the United States.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd