StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Assignment (most current IT threats) - Essay Example

Cite this document
Summary
The malware is considered to be low risk and seems to have been introduced in the global arena within the last few days. One reputable organization that offers IT solutions, Symantec, registered the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Assignment (most current IT threats)
Read Text Preview

Extract of sample "Assignment (most current IT threats)"

Most Current IT Threats One threat that information technology systems face today is Trojan.Premele. The malware is considered to be low risk and seems to have been introduced in the global arena within the last few days. One reputable organization that offers IT solutions, Symantec, registered the existence of the malware in its systems on February 17, 2014 (Symantec, 2013). The malware an infect different operating systems, especially Windows. In this respect, the threat infects Windows 2000, Windows NT, Windows Server 2003, Windows XP, Windows Server 2008, and Windows 7 among other operating systems. Trojan.Premele infects a computer system by presenting itself as a fake Adobe Flash update (Symantec, 2013).

When a user allows the software to be downloaded and installed, it is executed to form a new executable file. The software also creates a new registry entry that makes the file to be executed every time Windows starts. The program further modifies a number of registries. When the computer is connected to the Internet, the malware connects to some remote locations and may install other malware into the infected system. The malware that is installed by Trojan.Premele way cause further harm to the computer system and expose it to even more malicious software. Trojan.Premele can be detected by antivirus or antimalware software installed in a computer (Symantec, 2013).

It can also be detected by the changes that it makes to registries and the new registries that it creates. It can also be detected by the computers that it connects to remotely. The malware can be avoided by installing a firewall or/and antivirus that is up-to-date. The use of complex passwords on computers also lowers the risk of infection by the malware.ReferenceSymantec (2013). Trojan.Premele. Retrieved February 18, 2014, from http://www.symantec.com/security_response/earthlink_writeup.jsp?

docid=2014-021714-4409-99

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Assignment (most current IT threats) Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Assignment (most current IT threats) Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/e-commerce/1629370-assignment-most-current-it-threats
(Assignment (most Current IT Threats) Essay Example | Topics and Well Written Essays - 250 Words)
Assignment (most Current IT Threats) Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/e-commerce/1629370-assignment-most-current-it-threats.
“Assignment (most Current IT Threats) Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/e-commerce/1629370-assignment-most-current-it-threats.
  • Cited: 0 times

CHECK THESE SAMPLES OF Assignment (most current IT threats)

Biopsychosocial Identification of an HIV Positive Client

These relationships were intimate sexual relationships even though they have not had intimate sexual relations with the current girlfriend.... This paper "Biopsychosocial Identification of an HIV Positive Client" focuses on the detailed identification of the client needed to understand the emotional and social interactions regarding the client....
4 Pages (1000 words) Assignment

The Three Step Model

This is where the marketers do check their strengths, weaknesses, the available market opportunities and then they test on the possible threats in the market (Trost 2011).... Be in the current class for the better for the better of your academic grades.... The reason behind this is the fact that most of the marketers do involve themselves in the market analysis.... assignment, BUSINESS This paper delves in the discussion of the various strategies that are used in the student admissions exercise....
2 Pages (500 words) Assignment

Applying Theories

Increase in demand for books, therefore, increase threats on the environment since more trees must be cut down to facilitate the establishment for a new building and in processing books.... most people purchase expensive but helpful books both hardcopies and e-books to help them sharpen their understanding of concepts (Gould, et al.... Each individual strives to obtain the most resourceful materials to help in the schoolwork such as assignments and while doing examinations....
2 Pages (500 words) Assignment

Etiological Factors That Lead to Alcohol/Substance Abuse

Furthermore, as a function of correcting the issue, the authors of the article indicate that seeking to address poverty, hardship, and violence within these communities serves as the most effective means of addressing these ecological threats and subsequent substance abuse (Lormand et al.... For the most part, many of the economic hardships that are the result of persistent drug addiction has to do with the fact that drugs are currently illegal and create a situation in which the demand far exceeds the supply; thus driving up its price....
2 Pages (500 words) Assignment

How to Attain Success in any Business - Motivation the Employees

The paper "How to Attain Success in any Business - Motivation the Employees " discusses that educating the workforce is not enough to create teamwork.... Creating new programs that facilitate engagement in social activities frequently would play a big role in promoting teamwork.... nbsp;… Social activities offer an opportunity for employees to interact with each other hence they are able to know each other....
7 Pages (1750 words) Assignment

Kaplan Conversion Program

This paper “Kaplan Conversion Program” will use Porter's Five Force Model to evaluate opportunities and threats to iTech.... It will look into threat of entry, the threat of substitute, bargaining power of buyers, bargaining power of suppliers and the extent of rivalry between iTech and other competitors....
5 Pages (1250 words) Assignment

Why Customers Visit Restaurants

Even if one was to take a lenient view of what customer service entails, courteous and competent staff, prompt and correct delivery is the bare minimum that would feature in the ‘to-do' list of customer… Some customers go to a restaurant to satiate hunger, while others visit the restaurant simply to catch up with a friend and enjoy a hot cup of coffee....
9 Pages (2250 words) Assignment

Roles in Fulfilling the Requirements of Statutory Duties

In the current situation, numerous statutory duties apply because of the numerous stakeholders.... In the current situation, numerous statutory duties apply because of the numerous stakeholders (Akintoye, Beck and Hardcastle 2002, 126).... … The paper "Roles in Fulfilling the Requirements of Statutory Duties" is a perfect e example of an assignment on the law.... The paper "Roles in Fulfilling the Requirements of Statutory Duties" is a perfect e example of an assignment on the law....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us