HW3
You should be submitted in Backboard CTEC350\ HW3:
See: Due Date in Blackboard
Chapter 3
Part1: Grade (5 points)
- Describe the different types of malicious software and what damage they can do
- Describe methods of protecting against malware attacks
- Describe the types of network attacks
- Identify physical security attacks and vulnerabilities
- Explain that the biggest problem with adware is that it slows down the computer it’s
running on. - Describe a Ping of Death attack as an attack that causes the victim computer to freeze and
malfunction. - What type of malware do you think is the most destructive: viruses, worms, Trojan
programs, spyware, or adware?
Part2: Grade (10points)
Technical Notes for Activities
Activity 3-1: This activity requires a Web browser, Internet connection, paper, and pencil
Activity 3-2: This activity requires a Web browser and an Internet connection.
Activity 3-3: This activity requires a Web browser and an Internet connection.
Activity 3-4: This activity requires a Web browser, Internet connection, paper, and pencil.
Activity 3-5: This activity requires a Web browser and an Internet connection.
Part3: Grade (5 points)
Define the Following Key Terms
adware
attack
backdoor
botnet
buffer overflow attack
computer security
denial-of-service (DoS) attack
distributed denial-of-service (DDoS) attack
exploit
keyloggers
macro virus
HW3
You should be submitted in Backboard CTEC350\ HW3:
See: Due Date in Blackboard
malware
network security
Ping of Death attack
ransomware
rootkit
shell
spyware
Trojan program
virus
virus signature file
vulnerability
whitelisting
worm
zombies
- Any assignment received after the time of the class is considered late (NO EXCUSES) and is
graded with 0