What would be the financial advantage for a malware designer to create lots of different malicious code instances that all exploit the same vulnerability yet have different malware signatures?

What will be an ideal response?


By creating lots of different instances of malware, a designer can sell each one as
a separate product. By having a different malware signature for each one he can guarantee
to his customers that the malware he is selling them will not have a signature that has
already been seen by the anti-malware companies.
Creativity

Computer Science & Information Technology

You might also like to view...

The MLA style uses the term bibliographical references for works cited.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If you were doing an analysis in a large multinational firm and needed to retrieve from historical data only the countries and boutiques in each country, you would use this technique:

A) Mathematical Summaries. B) Crosstab Queries. C) Nested Queries. D) Grouping Data.

Computer Science & Information Technology

List at least three standards listed in the ACM Code of Ethics. Why is it important to follow these standards? What would happen if the ACM Code of Ethics did not exist?

What will be an ideal response?

Computer Science & Information Technology

A user needs to print to a printer. They have a laptop with Windows 7. The printer has a USB and an Ethernet connector. Which of the following is the EASIEST way to connect the laptop to the printer?

A. Use the Ethernet connector. B. Use the USB connector. C. Use the network connection. D. Use the parallel port

Computer Science & Information Technology