HW3
You should be submitted in Backboard CTEC350\ HW3:
See: Due Date in Blackboard
Chapter 3
Part1: Grade (5 points)
- Describe the different types of malicious software and what damage they can do
- Describe methods of protecting against malware attacks
- Describe the types of network attacks
- Identify physical security attacks and vulnerabilities
- Explain that the biggest problem with adware is that it slows down the computer it’s
 running on.
- Describe a Ping of Death attack as an attack that causes the victim computer to freeze and
 malfunction.
- What type of malware do you think is the most destructive: viruses, worms, Trojan
 programs, spyware, or adware?
 Part2: Grade (10points)
 Technical Notes for Activities
 Activity 3-1: This activity requires a Web browser, Internet connection, paper, and pencil
 Activity 3-2: This activity requires a Web browser and an Internet connection.
 Activity 3-3: This activity requires a Web browser and an Internet connection.
 Activity 3-4: This activity requires a Web browser, Internet connection, paper, and pencil.
 Activity 3-5: This activity requires a Web browser and an Internet connection.
 Part3: Grade (5 points)
 Define the Following Key Terms
  adware
  attack
  backdoor
  botnet
  buffer overflow attack
  computer security
  denial-of-service (DoS) attack
  distributed denial-of-service (DDoS) attack
  exploit
  keyloggers
  macro virus
 HW3
 You should be submitted in Backboard CTEC350\ HW3:
 See: Due Date in Blackboard
  malware
  network security
  Ping of Death attack
  ransomware
  rootkit
  shell
  spyware
  Trojan program
  virus
  virus signature file
  vulnerability
  whitelisting
  worm
  zombies
- Any assignment received after the time of the class is considered late (NO EXCUSES) and is
 graded with 0
 
								 
															 
															