What are the components of the functional algorithm to describe in the presentation?
(a) How malware infects the system; (b) Elements of the system violated; (c) Threats generated; (d) Signs of infection.
What should students do with their presentation after completion?
Upload it to e-learning and present it to other teams during the lab and next lecture.
1/7
p.1
Categories of Malware

What are the components of the functional algorithm to describe in the presentation?

(a) How malware infects the system; (b) Elements of the system violated; (c) Threats generated; (d) Signs of infection.

p.1
Categories of Malware

What should students do with their presentation after completion?

Upload it to e-learning and present it to other teams during the lab and next lecture.

p.1
Categories of Malware

What is the goal of the lab?

To familiarize with different categories of malware, their characteristics, and evaluate infection and protection methods.

p.1
Categories of Malware

What should be included in the presentation regarding team participation?

All names of the team members who participated.

p.1
Categories of Malware

What should students include in their presentation about a selected malware category?

1. Functional algorithm of infection 2. Impactful examples from 2023-2024 3. Recommendations for protection 4. Suggestions for better malware classification.

p.1
Categories of Malware

List the categories of malware identified in the article.

1. Virus Malware 2. Worm Malware 3. Trojan Malware 4. Adware Malware 5. Spyware Malware 6. Rootkit Malware 7. Zombie Malware 8. Botnet Malware 9. Ransomware Malware

p.1
Categories of Malware

What is required regarding examples of malware in the presentation?

At least three impactful examples from the selected malware group that occurred during 2023-2024.

Study Smarter, Not Harder
Study Smarter, Not Harder