Question: Questions a) What is a propagation vector, for malware? List and describe four common propagation vectors for malware. b) Explain how a common Internet worm

Questions

a) What is a propagation vector, for malware? List and describe four common propagation vectors for malware.

b) Explain how a common Internet worm (such as Code Red, Nimda, or SQL Slammer) propagates so quickly. What can businesses do to prevent such worms from (a) infecting their computers and (b) allowing their infected computers from infecting others.

c) Describe, in your own words, how a buffer overflow occurs and how it is exploited. What steps should developers take to prevent exploitable buffer overflow flaws from being written into their software?

d) Watch the video Overflow Exploitation, Step By Step from David Hoelzer. Summarize and critique Hoelzers presentation (good, bad, and ugly). Pay particular attention to the processes of analysis, fuzzing, and developing the exploit. What did you find interesting, confusing, or surprising?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!