After seeing my result assessment I was actually surprise from my results. My personal computer (PC) actually received “severe risk” and “blank or weak password” which it actually makes sense because everyone in the house uses the computer; I decide to use because my brand new laptop will not giving the results I’m looking for. In addition, the house PC does not have a password except on my parent’s accounts so I was bound to receive a red flag for bad security practice. After doing assessment I actually suggest we all open our own accounts and create …show more content…
Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy (Malware). Malware is able to accomplish this by its works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. The type of malware that could be used is a Rootkit Malware. A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executable. Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook (What is a Rootkit Virus?). Owners are able to implement files, monitor what’s being down on the computer and change the systems on the