Describe some of the characteristics of malware that make it difficult to detect.

What will be an ideal response?

Some of these characteristics, which can be found in any type of malware, include the following:encryption-Some viruses, worms, and Trojan horses are encrypted to prevent detection. Most anti-malware software searches files for a recognizable string of characters that identify the virus. However, anencrypted virus, for example, might thwart the antivirus program's attempts to detect it.?stealth-Some malware hides itself to prevent detection. For example, stealth viruses disguise themselves as legitimate programs or replace part of a legitimate program's code with their destructive code.?polymorphism-Polymorphic viruses change their characteristics (such as the arrangement of their bytes, size, and internal instructions) every time they are transferred to a new system, making them harder to identify. Some polymorphic viruses use complicated algorithms and incorporate nonsensical commands to achieve their changes. Polymorphic viruses are considered the most sophisticated and potentially dangerous type of virus.?time dependence-Some viruses, worms, and Trojan horses are programmed to activate on a particular date. This type of malware can remain dormant and harmless until its activation date arrives. Like any other malware, time-dependent malware can have destructive effects or might cause some innocuous event periodically. For example, viruses in the"Time"family cause a PC's speaker to beep approximately once per hour. Time-dependent malware can includelogic bombs, or programs designed to start when certain conditions are met. (Logic bombs can also activate when other types of conditions, such as a specific change to a file, are met, and they are not always malicious.)

Computer Science & Information Technology

You might also like to view...

When using Twitter, a word or phrase preceded by a # symbol is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ________ is larger than a terabyte

Fill in the blank(s) with correct word

Computer Science & Information Technology