An expert hacker in one who develops software scripts

This preview shows page 2 - 4 out of 9 pages.

An expert hacker in one who develops software scripts and codes to exploit relatively unknown vulnerabilities. The expert hacker is usually a master of several programming languages, networking protocols, and operating systems. An unskilled hacker is one who uses scripts and code developed by skilled hackers. They rarely create or write their own hacks, and are often relatively unskilled in programming languages, networking protocols, and operating systems. Protecting against an expert hacker is much more difficult, due in part to the fact that most of the time the expert hacker is using new, undocumented attack code. This makes it almost impossible to guard against these attacks at first. Conversely, an unskilled hacker generally uses hacking tools that have been made publicly available. Therefore, protection against these hacks can be maintained by staying up-to-date on the latest patches and being aware of hacking tools that have been published by expert hackers. 10. What are the various types of Malware? How do worms differ from viruses? Do Trojan horses carry viruses or worms? Common types of malware are viruses, worms, Trojan horses, logic bombs, and back doors. Computer viruses are segments of code that induce other programs to perform actions. Worms are malicious programs that replicate themselves constantly without requiring
Image of page 2

Subscribe to view the full document.

another program to provide a safe environment for replication. Once a trusting user executes a Trojan horse program it will unleash viruses or worms to the local workstation and the network as a whole. 11. Why does polymorphism cause greater concern than traditional malware? How does it affect detection? Polymorphism causes greater concern because it makes malicious code more difficult to detect. The code changes over time, which means commonly used anti-virus software, which uses preconfigured signatures for detection, will be unable to detect the newly changed attack. This makes polymorphic threats harder to protect against. 12. What is the most common form of violation of intellectual property? How does an organization protect against it? What agencies fight it? The most common violations involve the unlawful use or duplication of software-based intellectual property known as software piracy. Some organizations have used such security measures as digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media. Also, most companies file patents, trademarks or copyrights which can allow a company to legally pursue a violator. Another effort to combat piracy is the online registration process. During installation, software users are asked or even required to register their software to obtain technical support, or the use of all features.
Image of page 3
Image of page 4

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern