0% found this document useful (0 votes)
22 views

Performance Tasks Module 5: John Mark A. Timon Bsit 1-A Answer The Following Question 1. What Is Malware?

The document defines different types of malware. Malware is malicious software used by hackers to damage systems and access private information. A virus replicates by modifying other programs and inserting its own code, infecting affected areas. Ransomware encrypts user files and demands payment to undo the encryption. Cryptography converts plain text into unintelligible text using ciphers, allowing secure transmission of data. Cryptanalysis deciphers ciphers without knowing the key, while cryptology combines cryptography and cryptanalysis techniques.

Uploaded by

John Mark Timon
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Performance Tasks Module 5: John Mark A. Timon Bsit 1-A Answer The Following Question 1. What Is Malware?

The document defines different types of malware. Malware is malicious software used by hackers to damage systems and access private information. A virus replicates by modifying other programs and inserting its own code, infecting affected areas. Ransomware encrypts user files and demands payment to undo the encryption. Cryptography converts plain text into unintelligible text using ciphers, allowing secure transmission of data. Cryptanalysis deciphers ciphers without knowing the key, while cryptology combines cryptography and cryptanalysis techniques.

Uploaded by

John Mark Timon
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Performance Tasks Module 5

John Mark A. Timon


BSIT 1-A

Answer the following question


1. What is Malware?
- short for malicious software, is a blanket term for viruses, worms, trojans, and other harmful
computer programs, hackers use to wreak destruction and gain access to sensitive information.

2. What is Virus ?
- A computer virus is a type of computer program that, when executed, replicates itself by
modifying other computer programs and inserting its own code. When this replication succeeds,
the affected areas are then said to be "infected" with a computer virus.

3. What is Ransomware and how will it be identified?


- Ransomware is malware that employs encryption to hold a victim’s information at ransom.
A user or organization’s critical data is encrypted so that they cannot access files, databases,
or applications. Ransomware trojans are a type of cyberware that is designed to extort money
from a victim, often ransomware will demand a payment in order to undo changes that the
trojan virus has made to the victim’s computer.

4. What is Cryptography?
- Cryptography is associated with the process of converting ordinary plain text into
unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular
form so that only those for whom it is intended can read and process it. Cryptography not only
protects data from theft or alteration, but can also be used for user authentication.

Explain Cryptography and Cryptanalysis?


- Cryptography is the science of ciphering and deciphering messages. Deciphering is reversing
a cipher into the original text. Cryptanalysis is the art of deciphering ciphers without the
knowledge of the key used to cipher them. Cryptology combines the techniques of
both cryptography and cryptanalyst.
-

You might also like