Commit 83587b2
Changed files (1)
doc
doc/assignment4.md
@@ -52,5 +52,15 @@ Please answer the following questions in complete sentences. Your answer for eac
implement policy decisions related to protection.
1. How does a virus differ from a worm?
+
+ A worm is a process that duplicates itself to propagate across a network. They
+ are designed to use up system resources in order to reproduce itself so that
+ it can continue to infect other hosts.
+
+ A virus is a fragment of code embedded in a legitimate program. Viruses can
+ also be self replicating but tend to target weaknesses in programs. They
+ can wreak havoc in a system by modifying or destroying files and causing
+ system crashes and program malfunctions.
+
1. What is the difference between symmetric encryption and asymmetric encryption?
1. What are the two main varieties of authentication algorithms?