Suppose, in a scenario based on a true story, a network computer virus is designed so as soon as it is copied onto a computer, X, it simply copies itself to six of X's neighboring computers, each time using a random file name, so as to evade detection. The virus itself does no other harm, in that it doesn't read any other files and it doesn't delete or modify any other files either. What harm

would be done by such a virus and how would it be detected?

What will be an ideal response?


This problem is based on the true story of the Cornell graduate student, Robert
Morris. His virus (which is more properly called a "worm") brought the entire Internet to
its knees. The reason is that when the virus copies itself to X's neighbors, they will copy
it back six times to X, which then copies 36 copies to its neighbors, and so on. Soon all of
X's disk memory is full of copies of the virus and X crashes. So this is a type of denial of
service attack.

Computer Science & Information Technology

You might also like to view...

In Microsoft Excel Charts, _________are individual parts of a chart such as the chart area, the chart title, the plot area, data markers, and a legend.? A. chart sectors B. chart elements C. chart metrics D. chart plotters

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Unlike master items that are overridden, detached master items are no longer affected by any changes made to the master page.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

_________ in a macro explain what the code should accomplish and should appear above the macro action

Fill in the blank(s) with correct word

Computer Science & Information Technology

The Color blending mode does not in any way affect the hue value of base pixels.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology