summaryrefslogtreecommitdiff
path: root/doc/assignment4.md
diff options
context:
space:
mode:
authormo khan <mo@mokhan.ca>2021-07-24 19:51:25 -0600
committermo khan <mo@mokhan.ca>2021-07-24 19:51:25 -0600
commit83587b22b969a6f93a213ad26a67b793538aa70c (patch)
tree49960d620229b88300ca810bd2da5d325342cada /doc/assignment4.md
parent5def2a393a777fd3639eb1c4456ae5841c24aab3 (diff)
answer question on worms vs viruses
Diffstat (limited to 'doc/assignment4.md')
-rw-r--r--doc/assignment4.md10
1 files changed, 10 insertions, 0 deletions
diff --git a/doc/assignment4.md b/doc/assignment4.md
index dd3c2c3..2eb22b7 100644
--- a/doc/assignment4.md
+++ b/doc/assignment4.md
@@ -52,5 +52,15 @@ Please answer the following questions in complete sentences. Your answer for eac
implement policy decisions related to protection.
1. How does a virus differ from a worm?
+
+ A worm is a process that duplicates itself to propagate across a network. They
+ are designed to use up system resources in order to reproduce itself so that
+ it can continue to infect other hosts.
+
+ A virus is a fragment of code embedded in a legitimate program. Viruses can
+ also be self replicating but tend to target weaknesses in programs. They
+ can wreak havoc in a system by modifying or destroying files and causing
+ system crashes and program malfunctions.
+
1. What is the difference between symmetric encryption and asymmetric encryption?
1. What are the two main varieties of authentication algorithms?