StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Malware and its Effects - Essay Example

Cite this document
Summary
The paper "Malware and its Effects" tells us about software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Malware and its Effects
Read Text Preview

Extract of sample "Malware and its Effects"

Malware is a makeup term that refers to malicious software. These are software that is created by individuals and designed to attack computer systems for the creator's benefit (Szor, 2005). Malware has been in existence for almost as long as computers have and have been one of the greatest enemies of software developers as they are designed to find points of weakness in order to gain entry into a host computer and thus serve as a means of revealing the imperfections that exist within the various programs that have been designed by computer companies (Parikka, 2007). There are different types of Malware present in the market and they are used by their attackers to perform different activities. Some of the malware present in the world of computers today include:

Viruses – These can be said to be one of the oldest malware that has been present in the world of computers (Brodkin, 2013). Viruses are programs that have been designed to replicate themselves so as to spread from computer to computer causing havoc wherever they infect. They affect the computers they infect in a number of ways including changing the behavior of the computer, erasing data, and stealing information that may be stored on the computer.

Viruses embed themselves onto other program files in the computer and are activated when the user attempts to open the infected file (Brodkin, 2013). They can be spread through a downloaded file that contains the virus which is transferred from one computer to another.

Trojans – This malware is named after the Greek mythology of the Trojan horse due to their innocent appearance to the user so as to avoid suspicion of the actual danger that they yield (Brodkin, 2013). Once they are activated however, they are able to achieve a number of attackers on the Personal Computer such as causing continuous irritations such as unrelated pop-up windows to more harmful acts such as the deletion of programs and the creation of backdoors into the computers files.

The fact that Trojans present themselves as harmless programs make them harder to detect and a user may be more vulnerable to this form of malware. Remote Access Trojans (RATs) are those that can create a backdoor system that allows the hacker access to one’s computer and is even able to send commands via root access capabilities (Brodkin, 2013).

Backdoors – These are programs that are designed to allow the creator undetected access to a computer system once they have been installed. Backdoors can be used by hackers to steal information from a server undetected and are similar to Remote Access Trojans in their functionality (Brodkin, 2013). The main difference between RATs and other backdoors is that RATs have a user interface available to the hacker.

Information Stealers – These are malware designed to steal important information from a computer system undetected (Brodkin, 2013). The information may include things like passwords, restricted data, and other private details meant for the computer owner only. Examples of information stealers include desktop recorders, memory scrapers, and keyloggers.

Ransomware – This can be considered to be one of the most destructive malware available as they are designed to hold the computer owner hostage by taking control of their PC and threatening to delete important files or even the whole machine unless financial compensation is paid to the creator in exchange for having the “problem solved”  (Brodkin, 2013).

Botnets – This malware does not exactly directly affect the computer and turns a user’s desktop into their own task dog and a hacker is able to use it to perform various functions that may bring about monetary gain (Brodkin, 2013).

The main prevention of this malware consists of the various antivirus programs that are available in the market today (Parikka, 2007). However, developers of this malware continue to discover new ways of avoiding them, and the best strategy to prevent infection would be to avoid downloading any suspicious documents onto your computer as well as avoid entry into suspect sites as these are the main gateways that are used by this malware.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS assigntment #2 Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
CIS assigntment #2 Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1614548-cis-assigntment-2
(CIS Assigntment #2 Essay Example | Topics and Well Written Essays - 500 Words)
CIS Assigntment #2 Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1614548-cis-assigntment-2.
“CIS Assigntment #2 Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1614548-cis-assigntment-2.
  • Cited: 0 times

CHECK THESE SAMPLES OF Malware and its Effects

Profit Implications of Malware

Despite the fact that there no standard categorization of malware, still they can be grouped based on their effects, behaviors and intentions.... Worms are known to exploit a zero-day vulnerability that allows them to execute their copies within the same network (effects of Malware Infections: Avoid the Dangers of Malware Programs ).... Recently Trojan horse is released as payloads by computer worms that give the attackers full control of the victims' personal computer (effects of Malware Infections: Avoid the Dangers of Malware Programs )....
15 Pages (3750 words) Annotated Bibliography

Computer Crimes, Ethics, and Privacy

The effects of this computer crime are more ponderous than Malware as it can financially hurt the individual.... Common types of malware include viruses, Trojan, and Worm.... malware is used to gain access to computers, sometimes just for fun.... This research paper "Computer Crimes, Ethics, and Privacy" attempts to highlight some computer crimes and explain how these crimes give rise to ethical issues....
6 Pages (1500 words) Research Paper

Malware and computer system

Malware is every computer owner nightmare due to the known effects that come with them.... The name malware which owe its derivation from the two names malicious and software has universally been used to refer to these softwares.... Computer malware can be sometime very disturbing not only to the proper operation of a computer system but also to the computer user.... Being that most of this malware are intentional crafted in order to have some fishy benefits to those involved....
6 Pages (1500 words) Essay

Personal Security and The Internet

It will explore both the negative and positive effects of the internet.... However, the internet has its ugly side too.... It also facilitates faster intake and processing of information However, the internet has its own setbacks as well.... In the past, somebody had to write a letter that could take ages to reach its destinations....
12 Pages (3000 words) Research Paper

Online Banking and the Banking Sector

ONLINE BANKING AND THE BANKING SECTOR Instructor Institution Submission Date Content list 1.... INTRODUCTION 1.... Background information 2.... DISCUSSION 2.... Evaluation 2.... Advantages 2.... Shortcomings 3.... Conclusion 1.... INTRODUCTION 1.... Background information Banking experience, just as is the case with all other aspects of business, has had great evolution in the past....
16 Pages (4000 words) Essay

African Investments Data Handlers - Contingency Planning in Action

The organization has its headquarters and the main office in Johannesburg in South Africa through plans are underway of establishing constituent operating sub ventures in the western countries where it supposes the business would thrive.... It currently operates with an employee base of hardly forty technicians due to its small capacity in operation and for the reason that few experts are required to carry out the lump some work of handling the data technologically....
11 Pages (2750 words) Business Plan

Risk management of issues associated with high speed access for schools and libraries

This may have detrimental effects to the organization.... This is because he or she would be breaching the library's policies as regard to its mode of operation.... Some of these threats include; hacking, malware, key-logging, viruses, hardware problem, just to mention but a few.... On the other hand, malware Internet Threats Internet threats comprise any threat using the internet to expedite cybercrime.... Some of these threats include; hacking, malware, key-logging, viruses, hardware problem, just to mention but a few....
1 Pages (250 words) Essay

Cyber Security in Business Organizations

Target's investment into the malware detection software by FireEye was legitimate.... The paper "Cyber Security in Business Organizations" highlights that the attack is an example of poor information security management despite having one of the most powerful cyber security software....
5 Pages (1250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us