Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

CIS106 Instructions Part 1 Instructions: Synthesize the researched information y

ID: 3590261 • Letter: C

Question

CIS106

Instructions

Part 1 Instructions:

Synthesize the researched information you found, the assigned readings for this unit, and assigned lectures for this unit.

Based on your synthesis, provide the following information in a 1- to 2- page Word document:

1.List the five of latest malware and ransomware threats.

2.Define and describe each threat in detail (what type, how it spreads, how it is used, etc.)

3.List five techniques that you may use to defend against different types of threats.

4.How would backup and recovery mitigate the risk of ransomware and other threats?

Cite your sources in APA format.

Part 2 Instructions:

Strong passwords are the first line of security. It is important to understand what is meant by a strong password.

Complete the following steps for part 2 of this assignment:

1.Go to pctools.com/guides/password (Links to an external site.)Links to an external site. (or use an Internet search engine and search for password generator).

2.From your chosen site, follow the directions to generate a password.

3.List the password rules you set and the password given to you by the generator.

4.Briefly explain (in 1 to 2 paragraphs) why it is important to use strong passwords. Use supporting details to explain your reasons.

Compile part 1 and part 2 in a single Word document. Remember to include any citations and references using APA formatting.

Please answer all of the questions, if you can not answer all of the questions do not reply.

Explanation / Answer

Answer:

Part 1:

1) List of malware and ransomware:

malware in point of sale applications is the most important kind of malware found on the POS applications. These will exploit the data of a huge number of customers and
steal thousands of data.

Viruses and Trojans are one of the viruses which corrupt the data

Ransomware is the new virus which compromised lakhs of data and leads to millions of rupees lose

2) Definition and description of each threat:

POS Malware is the ty[pe of malware and it is injected into the application and spread across the local files inside the system. This is used through various techniques like SQL injection etc.

Viruses and trojans can be imparted in an old system and the virus is spread across the system and may lead to data compromise.

ransomware is the type of malware which can be imported into the application by various injection techniques.

3) Techniques used to defend against attacks:

Continuous scanning of system for viruses can avoid the virus to some extent
Use of anti-virus software also leads to protect the system from external threat
Various encryption algorithms also used to save the confidential data

4)Continuous scanning and recovery and backup may reduce the risk of ransomware and other malware threats. Backup maintains the system data and keeps the data safe once the backup is done the data can be deleted in the system and the new set of data can be imported into the system.

Part 2:

1) In the password generator site, certain rules for the password has been defined and based on the password guidelines the password has been generated.
2) The random password which I have generated using the random generator tool is "2uCuwr6tex=p".
3) Rules are given by the password generator website.

The passwords should be minimum of 8 characters and it should allow all the digits, symbols and special characters also
Do not use repeated passwords and avoid using same passwords many times
Do not use nicknames and baby names for the password.

4) Importance of strong password:

A Strong password can be impossible to decode for the intruders and it is difficult the break it. It can save you from data compromise and keeps the data safe. Intruders check for the backdoor which compromises the password when a hint is available. The password should be complex such that even after many trials it should be difficult for the attacker to understand.