1. Describe the following threats to the application environment:
Buffer overflow
Denial of Service
Time-of-check to time-of-use attacks
Malformed input attacks
Object reuse
Garbage collection
Trap door
2. Explain the following terms:
File infector
Boot sector infector
System infector
Email virus
Multipartite
Macro virus
Script virus
Hoax
3. Explain the difference between a virus and a worm. Describe what a trojan horse and a logic bomb are.
Have you or someone you know experienced computer problems caused by a virus? How did it get into the system and how did it first present itself? What effects did it have on the performance of your system? What was done to remove it and did it have any lasting effects on your system/data?