Consider applying the discrete-time epidemic model described in lecture) for infectious diseases to a computer worm....
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Consider applying the discrete-time epidemic model described in lecture) for infectious diseases to a computer worm. In this scenario, the potential victim population is Windows-installed computing devices at Wake Forest University (so yeah, we're talking about the business school). Assume there are 3000 Windows devices in this case. The worm can infect about 35 computers per hour. Thankfully, computers do have anti-malware software installed, but it takes some time for an infected computer to have the malware removed. So on average, it takes 3.59 days for an infected computer to become uninfected. How did it all start? When Andy took his laptop to the B-school after going to CSC 348. Answer the following questions regarding this infection. A. How long (in minutes) will it take for all the computers to become infected? (4 points) B. Assume the worm is more voracious than originally described and can infect 60 computers per hour (nom, nom, nom). How long (in minutes) will it take for all the computers to become infected? (3 points) C. Assume the worm is very stealthy and infected computers are never uninfected. How long (in seconds) will it take for all the computers to become infected? (2 points) Consider applying the discrete-time epidemic model described in lecture) for infectious diseases to a computer worm. In this scenario, the potential victim population is Windows-installed computing devices at Wake Forest University (so yeah, we're talking about the business school). Assume there are 3000 Windows devices in this case. The worm can infect about 35 computers per hour. Thankfully, computers do have anti-malware software installed, but it takes some time for an infected computer to have the malware removed. So on average, it takes 3.59 days for an infected computer to become uninfected. How did it all start? When Andy took his laptop to the B-school after going to CSC 348. Answer the following questions regarding this infection. A. How long (in minutes) will it take for all the computers to become infected? (4 points) B. Assume the worm is more voracious than originally described and can infect 60 computers per hour (nom, nom, nom). How long (in minutes) will it take for all the computers to become infected? (3 points) C. Assume the worm is very stealthy and infected computers are never uninfected. How long (in seconds) will it take for all the computers to become infected? (2 points)
Expert Answer:
Answer rating: 100% (QA)
QUESTION Consider applying the discretetime epidemic model described in lecture for infectious diseases to a computer worm In this scenaro the potential victim population is Windows installed computin... View the full answer
Related Book For
Applied Regression Analysis and Other Multivariable Methods
ISBN: 978-1285051086
5th edition
Authors: David G. Kleinbaum, Lawrence L. Kupper, Azhar Nizam, Eli S. Rosenberg
Posted Date:
Students also viewed these programming questions
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Managing Scope Changes Case Study Scope changes on a project can occur regardless of how well the project is planned or executed. Scope changes can be the result of something that was omitted during...
-
Good Morning Food, Inc. is using the profitability index (PI) when evaluating projects. You have to find the PI for the company's project, assuming the company's cost of capital is 14.29 percent. The...
-
What are some potential pitfalls of poor short-term financial planning?
-
For the reaction 2N2O5(g) 4NO2(g) + O2(g) the following data were collected, where Calculate Ea for this reaction. dIN.O;] dt Rate =- T = 338 K [N2 1.00 10-1 M 6.1410-2 M 2.33 10-2 M 5.4110-3M 1.26...
-
Briefly describe the role of technology in conceptual, logical, and physical modeling.
-
Refer to the situation in Exercise 86. Suppose you choose someone randomly and discover that the person is a supporter of expanded tax credits. Use Bayes theorem to revise the probability that the...
-
New Tech Corporation has assets with a market value of $300 million, $40 million of which are cash. It has debt of $50 million, and 7 million shares outstanding. Assume perfect capital markets and no...
-
Locate the court case Ellis v. Jarvis et al., 117 AFTR 2d 2016-1932. Using only the head notes, answer the following questions: a. What issue(s) did the court address? b. What was the ruling of the...
-
There are various types of posting exercises within this job skill. Post all transactions on the following ledger cards using the current date or date referred to. Enter appropriate references and...
-
Check that 1,400 units at a contribution of 50 pence each gives a total contribution of 700. It is always a useful precaution to check the arithmetic of a calculation as a safeguard against...
-
The following extract is taken from a report prepared for the Auditor General for Scotland in November 2008. It analyses the case for a change to a rail service. Additional North Berwick services and...
-
The following extract is taken from a report prepared for the Auditor General for Scotland in November 2008. It analyses the case for a change to a rail service. Additional North Berwick services and...
-
Think of a decision you have taken recently where there was some uncertainty at various stages of the process. How did you deal with the uncertainty? Could you represent the decision as a decision...
-
Think of a decision you have made recently, such as going on holiday or renting a new flat. What were the relevant costs and benefits that you considered in making the decision?
-
The laccase consumption is about 500 kU/year in Turkey. Laccase is used for enrichment of detergent at 1 U Laccase / 1 kg solution. Microbial concentration reached 4 g/L. Total income, outcome and...
-
In your readings, there were many examples given for nurturing close family relationships in this ever-evolving technological society we live in Based upon your readings and research describe three...
-
A study by Holder, Plikaytis, and Carlone (1996) compared two laboratory protocols designed to measure antibody levels in an enzyme-linked immunosorbent assay (ELISA) for Streptococcus pneumoniae....
-
Use the output from Problem 11 in Chapter 8 and the output given here to answer the following questions. (Assume that no interaction occurs between TV advertising expenditure [X1] and print...
-
The results presented in the following tables are based on data from a study by Gruber (1970) to determine how and to what extent changes in blood pressure over time depend on initial blood pressure...
-
Wallace and Hussain type estimators for the variance components of a one-way unbalanced panel data model. (a) Verify the \(E\left(\widehat{q}_{1} ight)\) and \(E\left(\widehat{q}_{2} ight)\)...
-
Using the Monte Carlo setup for the unbalanced one-way error component model considered by Baltagi and Chang (1994), compare the various estimators of the variance components and the regression...
-
Using the Harrison and Rubinfeld (1978) data published in Belsley, Kuh and Welsch (1980) and provided on the Springer website as Hedonic.xls, reproduce Table 9.1. Perform the Hausman test based on...
Study smarter with the SolutionInn App