Solved by verified expert:Malware, also known as malicious software, can be classified several ways to distinguish the unique types of malware from each other. Distinguishing and classifying different types of malware from each other is important to better understanding how they can infect computers and devices, the threat level they pose and how to protect against them.Malware types with multiple functionsIndividual malware programs often include several malicious functions and propagation routines—and, without some additional classification rules, this could lead to confusion.For example, a specific malicious program may be capable of being spread via an email attachment and as files via P2P networks. The program may also can harvest email addresses from an infected computer, without the consent of the user. With this range of functions, the program could be correctly classified as an Email-Worm, a P2P-Worm or a Trojan-Mailfinder. According to Massachusetts Inventor (2012), there are sets of rules that can automatically categorize a malicious program as having a particular behavior, regardless of the program functions. This classification can be based on behavior which has its own threat level. Additionally, the behavior can be categorized by which may pose a higher risk than the other.So, in our example, the Email-Worm behavior represents a higher level of threat than either the P2P-Worm or Trojan-Mailfinder behavior—and thus, our example malicious program would be classified as an Email-Worm.Multiple functions with equal threat levelsIf a malicious program has two or more functions that all have equal threat levels—such as Trojan-Ransom, Trojan-ArcBomb, Trojan-Clicker, Trojan-DDoS, Trojan-Downloader, Trojan-Dropper, Trojan-IM, Trojan-Notifier, Trojan-Proxy, Trojan-SMS, Trojan-Spy, Trojan-Mailfinder, Trojan-GameThief, Trojan-PSW, or Trojan-Banker—the program is classified as a Trojan.If a malicious program has two or more functions with equal threat levels—such as IM-Worm, P2P-Worm, or IRC-Worm—the program is classified as a Worm.Read the following in preparation for the discussion:Gallagher, S. (2016). New ransomware installs in boot record, encrypts hard disk[Updated]. Retrieved from https://arstechnica.com/security/2016/03/new-ranso…Goodin, D. (2017). Tuesday’s massive ransomware outbreak was, in fact, something much worse. Retrieved from https://arstechnica.com/security/2017/06/petya-out…Given the current state of malware, please discuss how Ransomware is rising to the top of the malware chain. Research the recent outbreaks of ransomware and discuss how this could threaten Saudi companies, personal systems, etc. and disclose methods of ingress into systems as well as methods of countering the threat.In preparing your response, cite at least one source from professional or academic literature, such as articles from peer-reviewed journals and relevant textbooks. For this course, the use of Wikipedia is not considered an academic or professional reference. You should also be sure to proof-read and spell-check your responses. All sources should be formatted per Saudi Electronic University academic writing standards and APA style guidelines.Be sure to support your statements with logic and argument, citing any sources referenced. Post your initial response early and check back often to continue the discussion. Be sure to respond to at least two of your peers’ posts, as well.Reference:US Patent Issued to CA on July 24 for “System and method for using rules to protect against malware” (Massachusetts Inventor). (2012, July 30). US Fed News Service, Including US State News.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more