Cyber weapons responses | Computer Science homework help

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

This week we are tasked with researching different malware attacks that are notorious and talk about one. I have chosen to talk about the Zeus trojan virus that was first seen in 2007. Zeus is a malware that is a trojan virus and is also known as ZBOT. Zeus targets Microsoft windows operating systems. Since 2007 Zeus has infected more than 3.6 million computers in the United States alone not including other countries. There are two main ways Zeus targets a computer one is through spam messages. The other way that Zeus targets computers is trough drive-by downloads. While Zeus can do many things if it is infecting a computer there are two major functions that most hackers use it for. One is to setup botnets and the other is to steal financial information form infected devices. The way it steals financial information is by keystroke logging and monitoring bank websites for credentials. Botnets are used to control a huge amount of computers in order to carry out large attacks. One attack I can think of that a Botnet would be useful for is a DDOS (Distributed Denial of Service Attack) attack. A man named Hamza Bendelladj was responsible for creating Zeus and he was arrested in 2013 and charged with 15 years of prison time. This also include millions of dollars in fines that he was also given for his many accounts of cyber crimes he committed.

Jackson Propst 

Kaspersky, (n.d.). Zeus Virus. Retrieved From https://www.kaspersky.com/resource-center/threats/zeus-virus

RESPONSE 2:

The malware I found most interesting made its appearance in 2017 as a self-replicating encryptor. The creators of this malware took advantage of a vulnerability in the Microsoft security before a later update. By utilizing this exploit, WannaCry could easily gain remote access to computers in order to install the encryption. Traditionally, encryptors gain access to and infect computers by part of the user who clicks on the suspicious link or downloads some type of attachment from an email that might not even appear suspicious at first glance because it’s using something known to the user to disguise itself. However, WannaCry was able to affect over 45,000 computers in just one day becauase of the fact that the user doesn’t need to do anything to allow the infection to occur. WannaCry detects the hole in the security and forces entry onto the machine. It then attempts to spread throughout the local network like a computer worm by scanning computers on the network to detect the same vulnerability. This was extremely damaging for any large networks because of the amount of machines that were compromised almost in an instant. WannaCry encrypts different types of files like documents, photos, videos, etc. that could potentially be of importance to the user and then renames those files to .WCRY, making them inaccessible to the user. Then the desktop wallpaper is changed to a picture that contains information about the malware and what the user must do in order to gain access to their files and computer again. This will typically include a demand for money to be transferred to the perpetrator in the form of bitcoin which cannot be traced to them, with an expiration date or time limit. In total, Wanna Cry has infect3ed more than 200,000 computers in 74 different countries. It was found in those 74 different countries within the first day. The malware author of WannaCry was never discovered. However, the malware can only effect computers which have not been updated unless a user takes some action to allow for the infection to occur like opening a link or downloading an attachment which would override the patch to fix the security.
¹ WannaCry: Are you safe? Kaspersky. Alex Perekalin. May 13, 2017. 

Felicia 

Punctual Essays
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.

Admissions

Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.

Reviews

Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.

Reviews

Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.

sugar rush 1000
avia masters
pinco giriş
casibom giriş adresi
dog poop bags
neyine giriş