0% found this document useful (0 votes)
3 views3 pages

06 Task Performance 2

The document outlines a task performance assignment on malware, where the author, Justin Lacap, selects five types of malware and provides examples and descriptions for each. It also includes a section on a cybersecurity attack, specifically detailing an article about a LockBit ransomware attack on Accenture, including its title, author, publication date, and the company's response to the incident. The assignment emphasizes the importance of cybersecurity measures and the impact of malware attacks.

Uploaded by

ezjustin99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views3 pages

06 Task Performance 2

The document outlines a task performance assignment on malware, where the author, Justin Lacap, selects five types of malware and provides examples and descriptions for each. It also includes a section on a cybersecurity attack, specifically detailing an article about a LockBit ransomware attack on Accenture, including its title, author, publication date, and the company's response to the incident. The assignment emphasizes the importance of cybersecurity measures and the impact of malware attacks.

Uploaded by

ezjustin99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

06 Task Performance 1

Name: justin lacap Subject: “ Information Assurance & Security”


Section: A604

Part I 1. Select five (5) malware from the following: Spyware, Adware, Rootkit, Ransomeware,
Worm, Trojan Horse, or Backdoor

2. Search two (2) examples for each of the five malware you have selected. Add a short
description for each. Cite your reference. (5 points per example)

1.Adware

a. Fireball – Developed by a Chinese digital marketing agency called Rafotech. This adware
hijacks a computer browser by changing the search engine, which is fake, and put a noticeable
ads on any website you visit, and prevent you from changing your setting on your browsers

b. DeskAd – This adware put misleading ads on your browser. This adware is so hidden at first
and gradually became a problem and take control over your browser. It spread normally thru
email attachments.

2. Spyware –

a. TIBS Dialer – This Spyware disconnected the victim's PC from their local phone connection
and connected them to a toll number for visiting pornographic websites.

b. CoolWebSearch – This spyware is exploiting security flaws in Internet Explorer to take control
of the browser, change its settings, and send browsing information to the creator of the spyware

3.Trojan Horse

a. BankingTrojan – The purpose and goal of this malware is to steal your online banking,
epayment, and credit or debit card account information.

b.DDoS Trojan – This Trojan carries out Attacks, which are meant to bring a network to a stop
by overwhelming it with data traffic.

4. Rootkits

a. Firmware Rootkit – This kind of rootkit can potentially infect your computer's hard drive,
router, or BIOS. They allow hackers to not only watch your internet activities but also to log your
keystrokes since they affect the hardware.
b. Memory Rootkit – This root kits is commonly hide in your computers RAM, it eat your
memory resources and run in the background and doing harm on your computer.

5. Worm

Email worm – The worm uses the email inbox as a medium. The message contains an infected
link or attachment that, when clicked or opened, automatically installs the worm. This worm
finds the infected system's email contacts and sends links to those e-mail, causing them to be
destroyed as well.

Instant messages and chat room worm – These worms function like email worms, stealing
contacts from chat rooms and sending messages to them. The system is infected once the
receiver opens the message or link

Part II:

1. Search for an article regarding a cybersecurity attack using malware. The article should be
published within the last 5 years by a credible source.

2. Answer the following items based on the article you found.

a. What is the title of the article? (3 points)

b. Who wrote the article? (3 points)

c. When was the article published? (2 points) d. Give the link where you found the article. (2
points)

e. Is it possible to prevent this kind of attack? How? (Essay: 15 points)

f. How extensive was the impact of the attack to the environment where it happened? (Essay:
15 points)

g. How did the person/company, who was attacked, cope with the consequences and effects of
the incident? (Essay: 15 points)

Answers: a. Accenture Confirms LockBit Ransomware Attack

b. Lisa Vaas

c. August 11, 2021

d. Accenture Confirms LockBit Ransomware Attack | Threatpost


e. Yes, this kind of attack can be possibly prevented by bolstering their security by upgrading
and employing trusted cyber security firm, but hackers is getting smarter every day without us
knowing, unbeknownst to us they could be attacking us right now without us knowing. It is hard
to prevent this kind of attack without the help of experts.

f. The impact is quite small because they notice the malware early. And they act very quickly

g. They said that they were okay because, they notice the irregularities in the servers and
isolated the infected server, by doing so they stop the attack on its early stages.

You might also like