Free Essay

Unit 1 Assignment 1

In:

Submitted By Greebus
Words 344
Pages 2
In the past the greatest threats to the computing world were the highly skilled black hat hackers and their various coordinated groups. Not to downplay their reputation, they are still very real threats; however there has been a surge of neophyte hackers in the world. It has become profitable for the skilled and connected hackers to create tidy packages of malicious software and sell them to what are called “script kiddies,” which are essentially unskilled or want-to-be hackers that simply run targeted malicious software without actually understanding how the software works or why.
These script kiddies have become such a major threat because there are large numbers of them that buy these very lethal malicious software packages and deploy them in mass numbers, wherever the internet touches or wherever technology can be found. Some of these packages have the ability to be custom tailored (called crimeware kits) towards its specific use such as the Zeus kit. This kit can be purchased at $700 and can also be found free in some circles. When these kits are widely distributed and reconfigured so many times in so many ways it creates seemingly infinite amount software which makes it extremely difficult for antivirus companies to keep up. Almost 90,000 different strains of the Zeus toolkit were discovered by Symantec during 2009.
“Variants of the Zeus kit use spam to lure users to a website that uses social engineering or that exploits a Web browser vulnerability to install the bot on a victim’s computer. the bot then allows remote access to the computer and can be used to steal information such as the user’s online banking credentials. Each bot can then be used to send additional spam runs to compromise new users.”
These kits have become such a lucrative business among cyber criminals that there are rival organizations that develop their software to interfere with other malicious software. The SpyEye kit not only steals information it has the ability to detect if a device already has Zeus installed and, if so, intercepts its’ communication.

Similar Documents

Premium Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 1. Describe the role of software for computers: Computer software tells the hardware what to do. Without any software, the hardware would be worthless. Think of the software as a subject in school, and the hardware as you or your brain. Without any learning, you can't do anything. One you have learned some math, and then you are able to solve math problems. This learning is usually accomplished through downloads or CD's that are loaded into the computer. At the very basic level, computer software contains specific instructions for how to accomplish a specific task. These instructions tell the hardware exactly what to do, and how to do it 2. Identify the hardware associate with a computer: the physical components that make up a computer system. There are many different kinds of hardware that can be installed inside, and connected to the outside, of a computer. Here are some common individual computer hardware components that you'll often find inside a modern computer case: Motherboard, Central Processing Unit (CPU), Random Access Memory (RAM), Power Supply Video Card, Hard Drive (HDD), Solid-State Drive (SSD), Optical Drive (e.g. BD/DVD/CD drive) Card Reader (SD/SDHC, CF), etc. Here is some common hardware that you might find connected to the outside of a computer: Monitor, Keyboard, and Mouse 3. Describe how computer store data: it converts the request into binary digits and its stores the data in a database. As a table format. The binary data can then...

Words: 324 - Pages: 2

Free Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 Integrated Circuit Technology A motherboard is the backbone of the personal computer, it transfers information and power to all the other components. The motherboard is the largest board inside of the computer that contains the basic input and output system that allows every component to communicate with one another. Attached to the motherboard is a chip comprised with dozens of pins called the central processing unit. Along with the CPU attached to the motherboard is the dual-inline memory modules a part of the random access memory. RAM is the most common type of memory used another type is ROM, read only memory, which stores data onto metal disc within the device. The operating system manages the hardware resources and provides a place to run programs. The last components of the personal computer are the tower and the human interface devices. The tower holds all the components that make up the computer except for the HID which are located outside of the computers tower. The main purpose of the HID’s are to help us interact with the computer, a few examples are the keyboard, mouse, monitor, video camera and speakers. You put together the Motherboard, CPU, RAM, ROM, OS, Tower, HID’s add a power supply and you have a basic personal computer. PROCESSOR TRANSISTOR YEAR Intel 4004 | 2,300 | 1971 | Intel 8008 | 3,500 | 1972 | Intel 8080 | 4,500 | 1974 | Intel 8085 | 6,500 | 1976 | Intel...

Words: 427 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...Daphne Jones AP2530 Unit 1 Assignment 1: Homeostatic Imbalances Hypertension is caused by physical inactivity, a salt-rich diet made by processed and fatty foods, and also alcohol and tobacco use. You can identify hypertension if your blood pressure is higher than 140 over 90 mmHg. While having hypertension you could also develop some other conditions such as kidney disease. Even though hypertension itself does not cause symptoms, it does lead into long-term complications caused by blood vessels becoming narrower. To be able to reduce Hypertension and get better, we would need to cut down, restrictions such as salt restriction; moderation of alcohol and other diet changes that have affect your condition you have now. There are several drugs that may be used for treatment. Hypertension will affect your heart, so your blood pressure should be normal… when you follow the restrictions. Diabetes Is also called diabetes mellitus, what it does is describes a group of metabolic diseases in where you have high blood glucose, which is high blood sugar. You will experience frequent urination called polyuria, and become more thirsty and hungry. There are two types of diabetes, Type 1 and Type 2. With type 1, your body doesn’t make enough insulin, which is a hormone. Type 2 is where your body doesn’t produce enough of the insulin to function properly. There is Gestational Diabetes, but fortunately for you… you are not a female. Most females get this type while they are pregnant....

Words: 435 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 Cell Phones use voice and data communications. It uses the voice at a lot less these days because people rarely call one another anymore. Data is used for the applications which people use more of these days. So they use a mixture of both but mainly data. Also some phone now use Wi-Fi calling so people can use data networks to call people. Landlines use voice communication. Unlike data voice can work during a black-out because it doesn’t get its power from the same and everything in your house. It’s also a cheaper technology which also makes it cheaper. SMS/Text Messaging uses data. It’s part of the reason I said Cell Phones use both. And it can only be sent over 2G and above because 1G is voice only. Fax Machines use voice. It uses the same jack and RJ-11 like landlines do. It can be used on data but traditional fax use the voice network. The fax is sent it immediately gets digitized the put back in analog form once its sent. Pagers use data. It’s almost like SMS in the is send data (words over the networks). It’s an older technology. VOIP phone use data. It’s similar to Wi-Fi calling. It breaks up in to packets and is sent over the air waves. If you used a VOIP phone you could probably hear it sounding choppy that’s because those packets were dropped for some reason or another. Skype and face time also use data. Without internet connection these applications can’t be used. The main reason these applications exist it to provide an alternative...

Words: 330 - Pages: 2

Free Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1: Integrated Circuit Technology Year | Transistor Count | Processor Model | 1971 | 2,300 | Intel 4004 | 1972 | 3,500 | Intel 8008 | 1974 | 4,500 | Intel 8080 | 1976 | 6,500 | Intel 8085 | 1978 | 29,000 | Intel 8086 | 1979 | 29,000 | Intel 8088 | 1982 | 55,000 | Intel 80186 | 1982 | 134,000 | Intel 80286 | 1985 | 275,000 | Intel 80386 | 1989 | 1,180,235 | Intel 80486 | 1993 | 3,100,000 | Pentium | 1995 | 5,500,000 | Pentium Pro | 1997 | 7,500,000 | Pentium II | 1999 | 9,500,000 | Pentium III | 2000 | 42,000,000 | Pentium 4 | 2008 | 47,000,000 | Atom | 2002 | 220,000,000 | Itanium 2 McKinley | 2006 | 291,000,000 | Core 2 Duo | 2003 | 410,000,000 | Itanium 2 Madison 6M | 2004 | 592,000,000 | Itanium 2 with 9MB cache | 2008 | 731,000,000 | Core i7 (Quad) | 2011 | 1,160,000,000 | Quad-Core + GPU Core i7 | 2010 | 1,170,000,000 | Six-Core Core i7 (Gulftown) | 2012 | 1,400,000,000 | Quad-Core + GPU Core i7 | 2006 | 1,700,000,000 | Dual-Core Itanium 2 | 2008 | 1,900,000,000 | Six-Core Xeon 7400 | 2010 | 2,000,000,000 | Quad-Core Itanium Tukwila | 2011 | 2,270,000,000 | Six-Core Core i7/8 Core Xeon E5 | 2010 | 2,300,000,000 | 8-Core Xeon Nehalem-EX | 2011 | 2,600,000,000 | 10-Core Xeon Westmere-EX | 2012 | 3,100,000,000 | 8-Core Itanium Poulson | 2012 | 5,000,000,000 | 62-Core Xeon Phi | In 2010, the processor model that was the first to have two billion transistors on its chip was known as the Quad-Core...

Words: 374 - Pages: 2

Free Essay

Unit 1 Assignment 1

...Miosha Vogt ET2560 Unit 1 Assignment 1 Chapter 1: Pg. 43 Quick- Check Exercise 1. Machine language 2. Operating System 3. Translation, Linking, Loading, Execution 4. Source 8. Software, Hardware 9. Variables 10. Secondary storage Pg. 44 Review Questions 3. Two secondary storage devices is a disk drive and flash drive Two input devices is the keyboard and mouse Two output devices is the monitor and printer 5. Syntax error is grammar error of a programming language. 6. The loader copies the executed file into memory and initiates execution of instructions. 7. Memory cells are a grouping of small units called bytes Bytes are the amount of storage required to store a single character, composed of even smaller unit called bits. Bits are binary digits 0-10. 8. Three high languages are Fortran, C, and Java FORTRAN used in scientific programming. C is used in system programming. Java supports web programming and programming Android applications. 9. Ram is volatile and it temporarily stores programs while their being executed, delete when computer is turned off, Rom is not volatile the data stored there will not disappear when the computer is turned off. 2. Write an algorithm in pseudo-code to solve the following problem: Input a temperature in Fahrenheit, and output the temperature in Celsius and Kelvin. Formulas needed are: C = ( 59 ) (F – 32). K= ( 59 ) (F – 32) + 273.15 Algorithm: Fahrenheit...

Words: 458 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...Homework Unit 1 Assignment 1 1. Why is the CPU the most important component in a computer? It’s the part of the computer that runs programs. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? A turned on bit is 1 and a turned off bit is 0. 3. What would you call a device that works with binary data? A digital device 4. What are the words that make up a high-level programming language called? Key words or reserved words 5. What are the short words that are used in assembly language called? Mnemonics 6. What is the difference between a compiler and an interpreter? A compiler translates a high-lever program into a separate machine language program; whereas, an interpreter is a program that both translates AND executes instructions in a high-level program language program. 7. What type of software controls the internal operations of the computer’s hardware? Operating systems which is a type of system software. Unit 2 Assignment 1 Short Answer 1. What does a professional programmer usually do first to gain an understanding of a problem? Works with and interviews the customer to gain an understanding of what the customer wants the program to accomplish. 2. What is a pseudocode? A “fake” code that programmers use to test their programs before executing them. 3. Computer programs typically perform what three steps? A) Input is received B) Some process is...

Words: 508 - Pages: 3

Premium Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 Exploring Programming Languages PT1420 Introduction to Programming Pong Sintaisong ITT-Tech Tempe Campus Instructor: Ms. Kate Eskesen 9/23/2015 5 Programming Languages 1970s-2000 1970s Pascal: Niklaus Wirth was is the invertor and was invented in 1971 Motivation: To provide features that were lacking in other languages at the time. Forth: Forth was created in 1970 by Charles H. Moore Motivation: He wanted to create a language that would allow direct user and machine interactions. C: In 1971-73 Dennis M. Ritchie turned the B language into the C language. Motivation: Lack of features from B language so made C language. Prolog: Alain Colmerauer in 1973. Motivation: Unknown ML: In 1973 ML was invented as part of the University of Edinburgh's LCF project Motivation: Research in constructing automated theorem provers. Eventually saw that the "Meta Language" they used for proving theorems was more generally useful as a programming language. 1980s C++: Bjarne Stroustrup was the inventor. 1979 Motivation: He needed the use of a programming language that was concise and that produced compact and speedy programs. MATLAB: First Fortran MATLAB was portable and could be compiled to run on many of the computers that were available in the late 1970s and early 1980s. Cleve Moler is the inventor. Motivation: This document for engineers developing models and generating code for embedded systems using Model-Based Design with MathWorks products. ADA:...

Words: 715 - Pages: 3

Free Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 Scientific inquiry is a process of developing an explanation of a question by testing, investigating and collecting data that will either support the idea of what's going on. A problem in the world can be a scientific inquiry because you might have a question about it, so you are basically digging for information about the problem going on and you try to find results by using the internet, books or any source to get your answers. There will be results maybe through testing or charts will appear from studies to support the answers. A non-scientific inquiry is one that does not use a systematic collection of evidence or one that tries to find answers to questions about things other than the natural world/universe, such as beliefs. An example of everyday assumption is gender or stereotyping of what you see that what you assume this more like expectations. If women are mowing the lawn there is going to be a man that will approach you and tell you how to do things properly or what to wear in order to for you to cut the grass right. The answers will come to you without seeking them, just because she is a women it doesn’t mean that she don’t know what’s she doing it is just an assumption because of her gender. The cutting of a lawn is supposed to be a man’s job so they feel they need to say something about it. But all of this is not...

Words: 256 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...Tina Nunez NT1330 Unit 1. Assignment 1 Windows 2008 Network Services Domain name system (DNS) is a naming service used on any device that can connect to the internet. It translates fully qualified domain names of websites into IP addresses for the device. There are DNS records such as address (A, AAAA) records, name server (NS) records and mail exchanger (MX) records stored in the DNS server. Regardless of how many hosts, the DNS is a system that is very important. Dynamic host configuration protocol (DHCP) is a networking protocol that allows the dynamic (automatic) distribution of IP addresses to hosts on a network. If DHCP is enabled, the hosts will each receive a leased IP address that is chosen by the DHCP server from a scope chosen by the network administrators. Sometimes the administrators can reserve IP addresses if needed. Depending on the amount of hosts, it could determine if the IT management wants to use DHCP. If the company is very small, it may not be worth the effort to set up a DHCP server. It can still work but static (manual) IP addresses would be simple to configure because there would be very few devices compared to a large company. Some of the vital devices will usually use static IP addresses anyway such as any servers. If there is a very large company, it would be extremely beneficial to use DHCP. All of the devices can automatically pick up an IP as soon as they connect to the network and the network administrators do not have to go to each and...

Words: 272 - Pages: 2

Free Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 Community Groups The definition of Community is a group of people that live in the same place or having a particular characteristic in common. It is also described as having a feeling of fellowship with others, as a result of sharing common attitudes, interests, and goals. Community groups are created for a lot of different reasons some more critical than others. Since communities are so close knit people start groups for several reasons, the most common is just to know one another and be familiar with who you live by. Some people start neighborhood watches, borrow things from one another or just simply look out for each other when the other is not at home. What Makes a Good Community? In my personal opinion a Good Community takes time to form. Just like anything school, work, etc... You’re taking different people from different places, ethnicities, and backgrounds and putting them all together in once specific place. So it takes time for everyone to gel, but in all it takes patience, understanding and just being courteous and respectful. Challenges There are a lot of challenges you face when your living somewhere whether it’s a bigger or smaller community, it may possibly be easier to get know everyone in a smaller community than a bigger one. For instance some communities or neighborhoods are outside the county that means that the city does not fund the neighborhoods street lights, therefore the community have...

Words: 290 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 AP2530 Hypertension Hypertension is just a fancy medical term for high blood pressure or HBP. When your heart beats, it creates pressure that pushes blood through a network of tube-shaped arteries and veins around your body. When we measure this pressure it is referred to as “blood pressure”. This pressure is the result of two forces from the heart. The first force occurs as blood pumps out of the heart and into the arteries. This is the top number in the reading called the systolic pressure. The second force is created as the heart rests and refills with blood between beats, and is called the diastolic pressure. The average person will have a blood pressure reading of about 120/80. Any reading where the numbers are higher than that is considered to be high. The arteries in your body are made of muscle and a semi-flexible tissue that stretches like elastic when the heart pumps blood through them. The more forcefully that blood pumps, the more your arteries have to stretch to allow blood to flow easily, and when the force of the blood flow is to high on a regular basis, the tissue that makes up the walls of your arteries gets stretched out. When left untreated this creates problems and damage over time. The overstretching creates weak places in the blood vessels, making them more likely to rupture or break. Also, the overstretching can cause tiny tears in the blood vessels that leave scar tissue on the walls of arteries and veins. These tears and the...

Words: 364 - Pages: 2

Premium Essay

Unit 1 Assignment

...Unit 1 Assignment PA205-03 UNIT 1 ASSIGNMENT CASE STUDY QUESTIONS 1. The case study references one state statute. Identify it and explain what it prohibits. My understanding of the case study is that the identifiable state statute is section 42.09(a)(3) of the Texas Penal code, which prohibited the “desecration of a venerable object.” 2. Which branch of government (executive, judicial, or legislative) created the state statute? The legislative branch of government created the state statute. 3. The passage above also discusses one court case. Who were the parties involved in the case? The parties involved in the court case in the above passage are Gregory Lee Johnson and the State of Texas. 4. The case was heard by three lower courts before it reached the United States Supreme Court. List those three courts in order, beginning with the court that has the most authority and ending with the court that has the least amount of authority. Most authority = Texas Court of Criminal Appeals Middle authority = Texas Court of Appeals, Fifth District Least authority = Dallas County Criminal Court 5. Provide the citation for the United States Supreme Court’s decision in this case. After hearing the oral arguments and reading the parties’ appellate briefs, the Supreme Court, in a 5-4 vote, affirmed the decision of the Texas Court of Criminal Appeals. Texas v. Johnson, 491 U.S. 397 (1989). 6. What effect did the United States Supreme Court’s decision have on the Texas...

Words: 308 - Pages: 2

Free Essay

Unit 1 Assignment 1

...1. How to travel 175 miles autonomously with speeds consisting of 0-50 mph. Problem components would include Terrain, weather, and equipment. Terrain, weather, acts of god i.e. falling rocks and wildlife. 2. Assuming ideal conditions at 50 mph the trip would 3.5 hours. But, this question cannot be answered at this time due to the lack of information given about the course. 3. Weather, road conditions, turn radius on curves, and general obstacles such as rocks ect, that will not be included in the course file. 4. The use of a sensor system would need to be implemented to be able to see and recalculate the route on the fly to be able to avoid obstacles. A manual override would need to be installed in case things go south quickly. Have a chase vehicle that is human controlled with the equipment needed to be able to make sure that the vehicle is handling obstacles correctly. 5. Test driving the route is not an option. Things that or not in the route profile will not be accounted for. (natural occurrences). Writing the program to be able to just plug in the route program will be a little more challenging. 6. Write the program to be able to understand the environment based off of geographical information. So that once you have the route you can load that information and the vehicle will already be prepared to accept the profile. 7. Computer equipment and or vehicle failure. Weather conditions. Serious last minute route changes. (Naturally)...

Words: 257 - Pages: 2

Free Essay

Unit 1 Assignment 1

...1. Identify threats to the seven domains of IT within the organization. User Domain: Employee lack of education. A social engineer can trick an employee into giving up there credentials. Users can visit risky web sites and download and execute infected software. Workstation Domain: Susceptible to malicious software. The anti-virus software is installed and up to date. Computers that aren’t patched can be exploited. LAN Domain: Any data on the network that is not secured with appropriate access controls is vulnerable. Weak passwords can be cracked. Permissions that aren’t assigned properly allow unauthorized access. LAN to WAN Domain: Users can visit risky web sites and download and execute infected software. Firewalls with unnecessary ports open allow access to the internal network from the internet. WAN Domain: Any public facing server is susceptible to DoS and DDoS attacks. A FTP server that allows anonymous uploads can host worms from hackers. Remote Access Domain: An attacker can access unprotected connections allowing the attacker to capture and read the data. System/Application Domain: Threats would be not changing default passwords, unneeded services and protocols. 2. Identify the vulnerability’s in the seven domains. User Domain: User’s going to unrestricted websites and executing infected software. Workstation Domain: If computers anti- virus software is not up to date then it is exploited. LAN Domain: A user that doesn’t change their password on...

Words: 553 - Pages: 3