Suppose that you are a computer virus writer; hence, you know that you need to store a copy of the code for your virus inside the virus itself. Moreover, suppose you know that a security administrator is also aware of this fact and will be using it to detect the presence of your virus in operating systems files, as described in the previous problem. Explain how you can hide the embedded copy of

your virus so that it is difficult for the security administrator to find it.

What will be an ideal response?

If the embedded virus code is stored in encrypted form and only decrypted just
before it is replicated in another operating system file, then it would be difficult to see the
repeated pattern when the virus is at rest inside the infected file.

Computer Science & Information Technology

You might also like to view...

In what type of trusted recovery process is the system able to recover without administrator intervention but the system may suffer some loss of data?

A. Automated recovery B. Manual recovery C. Automated recovery without undue data loss D. Function recovery

Computer Science & Information Technology

After you have provisioned your IPAM server and completed the initial server discovery process, how often will server discovery be scheduled to occur by default?

A. twice per day B. twice per week C. once per day D. once per hour

Computer Science & Information Technology