You are to answer each questions as 1 full page per question with references. No plagiarism. It will be scanned for plagiarism. Also you are to comment on each answer in a separate sub heading.
Compare and contrast the similarities and differences between a trojan, virus and a worm. In what situation do you think each one might be used for a malicious purpose?
In your own words why do you think session hijacking is still a valid attack? What makes session hijacking possible and what technical control or controls would you put in place to prevent session hijacking from being successful? What would you implement to stop session hijacking?