\"Viruses and Antivirus Utilities\" Please respond to the following: From the e-
ID: 3662476 • Letter: #
Question
"Viruses and Antivirus Utilities" Please respond to the following: From the e-Activity, analyze the primary manner in which one (1) particular virus or worm was successful. Summarize the one (1) way in which the virus or worm avoided defense mechanisms. Suggest at least two (2) ways in which the infected parties could have protected themselves from the threat. Identify the antivirus software that you currently use or would prefer to use in order to protect your organization or personal system(s). Indicate the key features that this application utilizes to assist in preventing infection from viruses and worms. Provide a rationale for your chosen antivirus software.
Explanation / Answer
Cryptolocker
The most recent virus in 2015.
Ever heard of ransomware? Well, this one of the most dangerous ransomware that can quickly find its way into your computer. Once in your system it attaches itself to files and data in your drives and networks thereby encrypting them. This is just the commencement of your woes. After successfully encrypting your data, it then sends you a popup asking you to pay a ransom so that it can give you the encryption key. Things get really heated up since it also has a countdown timer which destroys the encryption key after .
The one way in which the virus or worm avoided defense mechanisms.
One approach is to try to masquerade as a machine where the target user has already logged on. ARP is one possible target; by running suitable code, the attacker can give wrong answers to ARP messages and claim to be the victim. The victim machine might notice if alert, but the attacker can always wait until it is down—or take it down by using another attack. One possibility is to use subnet masks.
A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Backdoors are often used for securing unauthorized remote access to a computer, or obtaining access to plaintext in cryptographic systems.
A backdoor may take the form of a hidden part of a program,a separate program (e.g. Back Orifice may subvert the system through arootkit), or may be a hardware feature.Although normally surreptitiously installed, in some cases backdoors are deliberate and widely known, and may have somewhat legitimate uses such as the manufacturer having a way to deal with users losing passwords.
Following are the ways to protect the infected computer from more threats:
A) Clean Computer With CCE and TDSSKiller
Download Comodo Cleaning Essentials (CCE). Make sure to select the correct version for your operating system. If you're not sure if your computer is running a 32 or 64 bit operating system. Be careful with the flash drive as the malware may actually infect it when you plug it into the computer. Thus, don't plug it into any other computers after transferring these programs. Also, I would like to point out that both programs are portable. This means that once you're done using them no uninstall is required. Just delete their folders and they will be gone..
After downloading CCE unzip the file, open the folder for CCE, and double click on the file called CCE. This will open the main program for Comodo Cleaning Essentials. If it refuses to open then hold down the shift key and, while still holding it down, double click on the file called CCE. After CCE has successfully opened you can let go of the shift key. However, do not let go of it until the program has fully loaded. If you let go of it even during the UAC popup it may not be able to forcefully open correctly. Holding down shift should allow it to open, even on heavily infected computers. It does this by killing most of the unnecessary processes that could be interfering with its launch. If it still will not launch then download and run a program called RKill.
B) If Still Not Clean Then Scan With HitmanPro, Malwarebytes, And Emsisoft Anti-Malware
If the above steps failed to fully remove the infections then you should download HitmanPro. Install the program and run a "Default Scan". Note that if it will not install please continue to the next paragraph and install Malwarebytes. During the installation of HitmanPro, when asked I would recommend you choose the option to only perform a one-time check of the computer. This should be suitable for most users. Also, if malware prevents it from loading correctly then open the program while holding down the CTRL key until the program is loaded.
More ways can be:
Antivirus to be used:
Bitdefender Antivirus Plus 2016
Complete Data Protection
Bitdefender’s powerful technologies eliminate even the most dangerous e-threats today. Bitdefender blocks everything from traditional viruses, worms, and Trojans to ransomware, zero-day exploits, rootkits, and spyware.
Active Threat Control
Behavioural detection technology that acts as an additional protective layer by constantly monitoring active programs and tagging suspicious activities.
Ransomware Protection
Bitdefender blocks all ransomware, even new or unknown, from encrypting and demanding ransom on your personal files. You can choose which areas you want to protect.
Powerful Anti-phishing
Sniffs and blocks websites that try to steal financial data such as passwords or credit card numbers by masquerading as a trustworthy entity.
Sensitive Anti-fraud
Warns whenever you visit websites that pose potential fraud risks such as casino, porn, money loans and many others.
Weekly Security Report
Bitdefender Antivirus Plus 2016 is always silently active in the background, blocking new malware and removing infections. Every week, we send you a summary.
Password Manager
Bitdefender stores your passwords, credit card data and other sensitive in a secure vault. It also autofills them when you brows and can recommend you secure passwords.
Social Network Protection
Bitdefender Antivirus Plus 2016 blocks malicious links or e-threats you passed on from your friends on Facebook, Twitter, Pinterest or any other social network
USB Immunizer
Immunizes any Flash Drive from viruses when they’re connected to your computer so you never worry again about USBs infecting you or your friends.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.