Hey, please let me know in case you need any revision. Thanks.Running head: NETWORK SECURITY1Network SecurityName of StudentInstitution AffiliationCourseDateNETWORK SECURITY2Answer 1:Social engineering attacks that persuade users to permit security tools to enable Trojansto give a response to phishing attacks.Exploit of software vulnerabilities which tend to be either locally or via a system byworms to enable the malware to duplicate.Infection of subsisting viable or explicated content by viruses that get eventually unfurledto other programs.Answer 2:Some of the broad classification of payloads that malware may carry entail;a) Theft of information from distinct programs like passwords, logins, and other personalinformation through the utilization of spyware systems.b) Corruption or destruction of numerous programs, software, and also data folders.c) Stealthing where malware happens to hide its existence on the program from trials fordetection and blocking.d) Service theft to make the system an attack agent as a segment of the botnet.Answer 3:a) Dormant phase – During this phase, the virus tends to be idle, and in the end, getactivated by some episodes like other programs or a date.b) Propagation phase – In this phase, the virus puts a duplicate of itself in other systemsor programs on the disk.c) Triggering period – The virus happens to get activated to execute the task which it gotintended. Regarding the dormant phase, this triggering phase can get generated by numeroussystems of events.NETWORK SECURITY3d) Execution phase – During this phase, the task gets carried out, and it may be harmlesslike the message on the screen or destructive like the damaging of systems, and data folders.Answer 4:a) Encrypted virus – This part of the virus happens to develop an …
15 Million Students Helped!
Sign up to view the full answer
WE’VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER AND GET AN AMAZING DISCOUNT