SlideShare a Scribd company logo
1 of 2
1.
Cybercriminals use many different types of malware to attack
systems. Select one common type of malware listed in this
article link and using your own words, explain how to defend
yourself against it.
https://www.esecurityplanet.com/malware/malware-
types.html#maliciousmobileapp
Post must be between 250-300 words
2.
Using the following link as your reference, select TWO and
explain the differences
(viruses, worms, trojans, and bots).
https://tools.cisco.com/security/center/resources/virus_differenc
es
Post must be between 250-300 words
3.
Describe two cryptographic applications and how they are used
in Information System Security.
Post must be between 250-300 words
1.Cybercriminals use many different types of malware to attack s.docx

More Related Content

More from braycarissa250

1.Being sure that one has the resources necessary to accomplish the .docx
1.Being sure that one has the resources necessary to accomplish the .docx1.Being sure that one has the resources necessary to accomplish the .docx
1.Being sure that one has the resources necessary to accomplish the .docxbraycarissa250
 
1.Based on how you will evaluate your EBP project, which indepen.docx
1.Based on how you will evaluate your EBP project, which indepen.docx1.Based on how you will evaluate your EBP project, which indepen.docx
1.Based on how you will evaluate your EBP project, which indepen.docxbraycarissa250
 
1.Be organized. 2.   Spend less time doing a summary, but more o.docx
1.Be organized. 2.   Spend less time doing a summary, but more o.docx1.Be organized. 2.   Spend less time doing a summary, but more o.docx
1.Be organized. 2.   Spend less time doing a summary, but more o.docxbraycarissa250
 
1.After discussion with your preceptor, name one financial aspec.docx
1.After discussion with your preceptor, name one financial aspec.docx1.After discussion with your preceptor, name one financial aspec.docx
1.After discussion with your preceptor, name one financial aspec.docxbraycarissa250
 
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
1.A 52-year-old obese Caucasian male presents to the clinic wit.docxbraycarissa250
 
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docxbraycarissa250
 
1.4 Participate in health care policy development to influence nursi.docx
1.4 Participate in health care policy development to influence nursi.docx1.4 Participate in health care policy development to influence nursi.docx
1.4 Participate in health care policy development to influence nursi.docxbraycarissa250
 
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docxbraycarissa250
 
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
1.5 Pages on the following topics Diversity, Race and Gender Equity.docxbraycarissa250
 
1.0. Introduction Effective project management is consid.docx
1.0. Introduction Effective project management is consid.docx1.0. Introduction Effective project management is consid.docx
1.0. Introduction Effective project management is consid.docxbraycarissa250
 
1.1 What is the OSI security architecture1.2 What is the differ.docx
1.1 What is the OSI security architecture1.2 What is the differ.docx1.1 What is the OSI security architecture1.2 What is the differ.docx
1.1 What is the OSI security architecture1.2 What is the differ.docxbraycarissa250
 
1.1 What is the OSI security architecture      1.2 What is th.docx
1.1 What is the OSI security architecture      1.2 What is th.docx1.1 What is the OSI security architecture      1.2 What is th.docx
1.1 What is the OSI security architecture      1.2 What is th.docxbraycarissa250
 
1..the Term Great Recession suggests that the continual decline with.docx
1..the Term Great Recession suggests that the continual decline with.docx1..the Term Great Recession suggests that the continual decline with.docx
1..the Term Great Recession suggests that the continual decline with.docxbraycarissa250
 
1.1 What is the OSI security architecture1.2 What is the di.docx
1.1 What is the OSI security architecture1.2 What is the di.docx1.1 What is the OSI security architecture1.2 What is the di.docx
1.1 What is the OSI security architecture1.2 What is the di.docxbraycarissa250
 
1.)  In 500 words or more, compare DNS failover and cloud failov.docx
1.)  In 500 words or more, compare DNS failover and cloud failov.docx1.)  In 500 words or more, compare DNS failover and cloud failov.docx
1.)  In 500 words or more, compare DNS failover and cloud failov.docxbraycarissa250
 
1.  your thoughts  Do incentives carry an ethical risk If so how .docx
1.  your thoughts   Do incentives carry an ethical risk If so how .docx1.  your thoughts   Do incentives carry an ethical risk If so how .docx
1.  your thoughts  Do incentives carry an ethical risk If so how .docxbraycarissa250
 
1.  Where is the Parthenon located To whom was it dedicated Why E.docx
1.  Where is the Parthenon located To whom was it dedicated Why E.docx1.  Where is the Parthenon located To whom was it dedicated Why E.docx
1.  Where is the Parthenon located To whom was it dedicated Why E.docxbraycarissa250
 
1.  The short-run Phillips Curve is a curve that shows the relat.docx
1.  The short-run Phillips Curve is a curve that shows the relat.docx1.  The short-run Phillips Curve is a curve that shows the relat.docx
1.  The short-run Phillips Curve is a curve that shows the relat.docxbraycarissa250
 
1.(200 words response)  Detail the components of state bureaucra.docx
1.(200 words response)  Detail the components of state bureaucra.docx1.(200 words response)  Detail the components of state bureaucra.docx
1.(200 words response)  Detail the components of state bureaucra.docxbraycarissa250
 
1.) Define Project Charter (per PMBOK 6th Edition and course text bo.docx
1.) Define Project Charter (per PMBOK 6th Edition and course text bo.docx1.) Define Project Charter (per PMBOK 6th Edition and course text bo.docx
1.) Define Project Charter (per PMBOK 6th Edition and course text bo.docxbraycarissa250
 

More from braycarissa250 (20)

1.Being sure that one has the resources necessary to accomplish the .docx
1.Being sure that one has the resources necessary to accomplish the .docx1.Being sure that one has the resources necessary to accomplish the .docx
1.Being sure that one has the resources necessary to accomplish the .docx
 
1.Based on how you will evaluate your EBP project, which indepen.docx
1.Based on how you will evaluate your EBP project, which indepen.docx1.Based on how you will evaluate your EBP project, which indepen.docx
1.Based on how you will evaluate your EBP project, which indepen.docx
 
1.Be organized. 2.   Spend less time doing a summary, but more o.docx
1.Be organized. 2.   Spend less time doing a summary, but more o.docx1.Be organized. 2.   Spend less time doing a summary, but more o.docx
1.Be organized. 2.   Spend less time doing a summary, but more o.docx
 
1.After discussion with your preceptor, name one financial aspec.docx
1.After discussion with your preceptor, name one financial aspec.docx1.After discussion with your preceptor, name one financial aspec.docx
1.After discussion with your preceptor, name one financial aspec.docx
 
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
 
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
 
1.4 Participate in health care policy development to influence nursi.docx
1.4 Participate in health care policy development to influence nursi.docx1.4 Participate in health care policy development to influence nursi.docx
1.4 Participate in health care policy development to influence nursi.docx
 
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
 
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
 
1.0. Introduction Effective project management is consid.docx
1.0. Introduction Effective project management is consid.docx1.0. Introduction Effective project management is consid.docx
1.0. Introduction Effective project management is consid.docx
 
1.1 What is the OSI security architecture1.2 What is the differ.docx
1.1 What is the OSI security architecture1.2 What is the differ.docx1.1 What is the OSI security architecture1.2 What is the differ.docx
1.1 What is the OSI security architecture1.2 What is the differ.docx
 
1.1 What is the OSI security architecture      1.2 What is th.docx
1.1 What is the OSI security architecture      1.2 What is th.docx1.1 What is the OSI security architecture      1.2 What is th.docx
1.1 What is the OSI security architecture      1.2 What is th.docx
 
1..the Term Great Recession suggests that the continual decline with.docx
1..the Term Great Recession suggests that the continual decline with.docx1..the Term Great Recession suggests that the continual decline with.docx
1..the Term Great Recession suggests that the continual decline with.docx
 
1.1 What is the OSI security architecture1.2 What is the di.docx
1.1 What is the OSI security architecture1.2 What is the di.docx1.1 What is the OSI security architecture1.2 What is the di.docx
1.1 What is the OSI security architecture1.2 What is the di.docx
 
1.)  In 500 words or more, compare DNS failover and cloud failov.docx
1.)  In 500 words or more, compare DNS failover and cloud failov.docx1.)  In 500 words or more, compare DNS failover and cloud failov.docx
1.)  In 500 words or more, compare DNS failover and cloud failov.docx
 
1.  your thoughts  Do incentives carry an ethical risk If so how .docx
1.  your thoughts   Do incentives carry an ethical risk If so how .docx1.  your thoughts   Do incentives carry an ethical risk If so how .docx
1.  your thoughts  Do incentives carry an ethical risk If so how .docx
 
1.  Where is the Parthenon located To whom was it dedicated Why E.docx
1.  Where is the Parthenon located To whom was it dedicated Why E.docx1.  Where is the Parthenon located To whom was it dedicated Why E.docx
1.  Where is the Parthenon located To whom was it dedicated Why E.docx
 
1.  The short-run Phillips Curve is a curve that shows the relat.docx
1.  The short-run Phillips Curve is a curve that shows the relat.docx1.  The short-run Phillips Curve is a curve that shows the relat.docx
1.  The short-run Phillips Curve is a curve that shows the relat.docx
 
1.(200 words response)  Detail the components of state bureaucra.docx
1.(200 words response)  Detail the components of state bureaucra.docx1.(200 words response)  Detail the components of state bureaucra.docx
1.(200 words response)  Detail the components of state bureaucra.docx
 
1.) Define Project Charter (per PMBOK 6th Edition and course text bo.docx
1.) Define Project Charter (per PMBOK 6th Edition and course text bo.docx1.) Define Project Charter (per PMBOK 6th Edition and course text bo.docx
1.) Define Project Charter (per PMBOK 6th Edition and course text bo.docx
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

1.Cybercriminals use many different types of malware to attack s.docx

  • 1. 1. Cybercriminals use many different types of malware to attack systems. Select one common type of malware listed in this article link and using your own words, explain how to defend yourself against it. https://www.esecurityplanet.com/malware/malware- types.html#maliciousmobileapp Post must be between 250-300 words 2. Using the following link as your reference, select TWO and explain the differences (viruses, worms, trojans, and bots). https://tools.cisco.com/security/center/resources/virus_differenc es Post must be between 250-300 words 3. Describe two cryptographic applications and how they are used in Information System Security. Post must be between 250-300 words