Reinforcement R-4.3 Viruses that perform no explicit malicious behaviors are called bacteria or rabbits. Explain how such seemingly benign viruses can still have negative impacts on computer systems. R-4.5 Describe the main differences between a virus, a worm, and a Trojan Horse. How are these types of malware similar? R-4.14 XYZ Company has just designed a new web browser and they are initiating a major marketing campaign to get this browser to become the exclusive browser used by everyone on the Internet. Why would you expect a reduction in Internet security if this marketing campaign succeeds? Creativity C-4.7 Discuss how you would handle the following situations: 1. You are a system administrator who needs to defend against selfpropagating worms. What are the things you can do to make your users safer? 2. You have a suspected polymorphic virus. What are some steps you can take to correctly identify when you are being infected or propagating it? 3. You suspect you may have a rootlet installed on your system that is telling the music company whether or not you are violating copyright with an audio CD you recently bought. How might you detect this intrusion without using outside tools? 4. If you are a virus writer, name four techniques you would use to make your virus more difficult to detect..