Identify and describe the four phases of computer viruses. Practically speaking, how do these stages work and what are the implications in the context of computer crime?
What will be an ideal response?
Dormancy: the virus does not destroy files
Propagation: the virus begins to multiply
Triggering: the virus is launched by some occurrence, such as a particular date
Damaging: the virus carries out the actual harm intended by its author
Computers can be infected with a virus for months or even years without the user's knowledge
You might also like to view...
When Israel invaded Lebanon in 1982, Iran responded by sending their Revolutionary Guards into that country which led to the creation of this new terrorist network
a. Hamas b. Mujahadeen c. Al Qaeda d. Hizbollah
A prosecutor may consider evidence that a youngster who killed his father was abused by his father to charge the youth with a lesser crime. What is the prosecutor considering?
A. Defense motions B. Mitigating circumstances C. Aggravating circumstances D. Felonious circumstances
Injunctions may be challenged as ________________ if they do not clearly delineate how officers may apply such orders
Fill in the blank(s) with correct word
Vigilante terrorism, insurgent terrorism, and transnational (foreigners fighting on American soil) are typologies of terrorism
a. domestic b. international c. narco d. jihadist