Unit 2 Lab. Answr.
Unit 2 Lab. Answr.
Bravo
UNIT 2: LABORATORY
CASES OF MALWARE ATTACK
PRETEST
Directions: Read the following sentences. Write T if the statement is True and F if the
statement is False. Write your answer on the space before the number.
__T _1. Emotet is a trojan that gained notoriety in 2008.
_T_2. WannaCry, the deadliest ransomware outbreaks in history, was spread using phishing
emails in 2017.
_T _3. Petya disables the whole operating system of the computer.
_T_4. This type of ransomware targets users by infecting them with malicious files ostensibly
containing further information on the situation is called Mellieza virus.
__T_5. In 2019, the ransomware iloveyou made news after targeting big corporations throughout
the world, including Altran Technologies and Hydro.
ACTIVITY 1:
Create a Reaction paper regarding the video you watch. (500 words each)
1. https://www.youtube.com/watch?v=NZDiQczOsdc
For nearly 50 years, computers have been getting infected with worms and
viruses, program designed to spread from machine to machine. The I Love You
Virus known mostly as “ILOVEYOU”. Which was recognized by the Guiness
Book of World records as the worst computer virus of all time, causing more
damage than anything it before? May 5, 2000 was a very average day for the very
average business supervisor. Though in just a couple of hours, it would quickly
turn into a day o utter chaos and turmoil. Nearly every install of brand-new
computer software damage beyond repair, over 13,000 pieces of malware detected
in just one office building, and soon, over $20 Billion in damage seen all across
the world. These catastrophic events were the work of a new computer worm that
circulating the internet “ILOVEYOU”. The new computer worm was circulating
the World Wide Web. Disguised as a love letter, the ILOVEYOU virus infected
millions of computers around the world, causing collectively $20 billion in
damage. I LOVE YOU have change since declared one of the most catastrophic
computer viruses ever developed.
2. https://www.youtube.com/watch?v=iBGIUd9niXc
Much like humans, computers can contract nasty viruses that complexly wreak
havoc on their systems. It believes that there are over 100,000 computer viruses,
though some experts contend that there are over a million. The good news is that
many of the viruses are not in circulation and are merely a part of collections.
However, there are some that have been released, and in some cases, they caused
massive devastation. These are 10 of the most notorious.
ACTIVITY 2.
Read and understand each question, choose from the box the correct answer
and write it on the space provided before the number.
ILOVEYOU WannaCry
CryptoLocker
Malware Trojan
Melissa _1. On or around March 26, 1999, the ______ virus was launched as a
mass-mailing macro virus. Trojans can provide an attacker access to a user's
personal information, such as financial information, passwords, or personal
identification, such as Social Security or Driver's License numbers.
MyDoom __2. In January 2004, a computer worm infecting the Microsoft
Windows operating system was found for the first time.
ILOVEYOU _3. Is a computer worm that infected over ten million Windows PCs
on and after May 5, 2000, when it began propagating as an email message with the
subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-
YOU.TXT.vbs.‖?
Trojan_4. This refers to any invasive software created by cybercriminals
(commonly referred to as "hackers") with the intent of stealing data and causing
harm or destruction to computers and computer systems. Viruses, worms, Trojan
horses, spyware, adware, and ransomware are all examples of prevalent malware.
Data has been exfiltrated in large quantities as a result of recent malware assaults.
WannaCry 5. In May of 2017, a ransomware worm spread quickly across a
number of computer networks.
Malware _6. Malware that masquerades as something beneficial, helpful, or
entertaining while inflicting harm or stealing information. Other malware (e.g.,
spyware, adware, and ransomware) is frequently quietly downloaded by this virus
on an infected system.
CryptoLocker _7. Since it was originally released in 2013, it has been one of the
most wellknown ransomwares in history, owing to the fact that it used an
unusually large encryption key, making professional work more difficult.
Petya 8. This malware disables the computer's whole operating system, the
windows operating system.
Malware 9. Malware that is transmitted through phishing attacks using harmful
files disguised as emails and bogus websites. It's well-known for spreading quickly
and replicating keystrokes, which has led to widespread use in instances when
credentials and passwords, such as email and bank accounts, are stolen.
Zeus _10. This type of ransomware targets victims by infecting them with
malicious files ostensibly containing further information on their condition.
ASSESSMENT
What is a Distributed Denial of Service (DDoS) attack? and, in your own words, how does
it work? (1000 words) Click the link to watch the video-
bhttps://www.youtube.com/watch?v=yLbC7G71IyE.