s malware growing more important used or less so explain the difference between a virus and a worm

Okay, put on your hacker hats!!

Is malware growing more important (used) or less so? Explain the difference between a virus and a worm? What is a root kit (application and kernel)? What are covert channels and what are the kinds of attacks that go hand in hand with this technique? How do CA certificates come into play for malware? Are the majority of attackers taking advantage of native Windows and Linux applications to exploit systems or are the majority of hackers still relying on malware for exploits? What are some response strategies for both malware, such as root kits, and exploits using native apps such as psexec, powershell (powercat), and WMIC? How has the exploit landscape changed in the last five years? Provide examples to illustrate your explanations

 
"Order a similar paper and get 100% plagiarism free, professional written paper now!"