StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Computer Rootkits - Report Example

Cite this document
Summary
This paper 'the Computer Rootkits' discusses that the effects of rootkits are evident and prevalent. Most of these effects directly or indirectly negatively affect the functionality or profitability any business enterprises using the recent technology. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.2% of users find it useful
The Computer Rootkits
Read Text Preview

Extract of sample "The Computer Rootkits"

Rootkits Introduction The rapid growth in modern technology has had both negative and positive impacts in today’s global development. Through network technology, communication has been made easier while carrying out business related activities has been enhanced. However, invention and implementation of technology has resulted to spread of viruses and worms. Rootkits is a form of malware which pose threat to computer management and networks (Bidgoli 19). This paper precisely discusses in detail “the state of a current computer rootkits, how it spreads, its impacts, how people are fighting it, and how technology pertaining to networks works.” Inclusively is an in depth description of the effects arising from it acting as a computer spyware which results to slowing down the functionality of systems, loss of essential data, rise in expenses experienced through inventing in anti-virus software, and hiring computer experts to protect systems is highlighted. General Overview of Rootkits and How They Work In definition, rootkits refer to programs that are intentionally made to hinder with system functionality and documentation hence doing away with the information or data which is stored in the computer for different uses. At most of times they are a collection of programs that facilitate spying on people computers (Rimon 1). The major difference existing between rootkits and the worm and virus is that a worm, the likes of the Stuxnet remains or continues attacking the computer system. This means that the worm does not necessary require to attach itself to an obtainable program in the system for its multiplication to occur accordingly (Rimon 1). Viruses, Trojans and worms have since been infecting computers of many user and even different servers that are essential in running electronic businesses. In that sense, fighting viruses and worms has become an issues which needs to be solved through the adoption of the appropriate measure if at all the running, operation of computer system and networking management has to be continued been enjoyed globally. On the other hand discovering/detecting of rootkits is even harder. According to Bidgoli Rootkits can therefore act in some instance as computer viruses or worms (21). Computer viruses and worms affect systems through deleting major documents or files or even putting a stop to website right of entry. The manner in which computer virus and worms attack the system clearly defines how they work (Rimon 1). The current state of computer virus basically is concerned with the Stuxnet worm. This is because the worm appears much different from other worms and virus following the manner in which it works and spreads in the computer system. In definition, the Stuxnet refers to a worm or malware that breaks into the categories of system that manages equipment (Douglas & Sturken 9). This results to permitting an attacker to take for granted control of critical equipments thus interfering with them the way in which it should not be. Generally, the worm originally distributes arbitrarily in the computer system although it involves extremely dedicated malware which multiplies while at the same time interfering with the functionality and performance of the system. The worm spreads into computer systems through various ways, although the most common means of spreading is through e-mail services. Virus and worms work in almost similar ways when it comes to interfering with the computer system (Rimon 1). Viruses characteristically need unsuspecting system users to unintentionally split them. Rimon believes that a number of viruses that are complicated like the Stuxnet worms duplicate and transform themselves mechanically to different computers by calculating different programs like e-mail sharing application (1). This clearly explains the idea that, networking technology is the reason behind major development of threats like worms and viruses which completely interfere with performance and functionality of systems. Other viruses like the Trojans incorrectly come into view as a helpful plan to coax customers into downloading them. Once they are downloaded and stored in the computer, they result in multiplication and later on interfering with the functionality of the system. For instance, most Trojans offer predictable results where else silently destroying your computer and different networked systems at the same time (David 80). Even though it is considered important to recognize the dissimilar categories of viruses and how they function, it is also considered significant for users of computer to keep their systems with the most up-to-date anti-virus and updates. As well, it is important that users of systems should follow the fundamental rules especially during downloading files, surfing the Internet and opening big attachments (Rimon 1). Stuxnet with no trouble infect different systems even through the use of detachable media drives like the universal serial board. The worm mechanically performs malware by means of shortcut programs positioned on the USB drives. In this sense, the malware is sprint just by employing request that exhibits shortcut images. This means that the Stuxnet worms usually infect whichever detachable media emotionally involved in the system. Bidgoli asserts that the Stuxnet worm in most cases remains attacking systems is a typical way (42). This implies that, it is a virus like request that distributes itself by means of internet with no human interference saves for a straightforward click. In that case, it is usually sufficient for a worm like the Stuxnet to keep attacking the systems hence infecting a system. The main common way through which Stuxnet worm attacks the computer systems with the aim towards infecting user computer is through e-mail. The worms usually comes as “email file attachment or within an infected email message” (Douglas & Sturken 16). Upon opening the file, Stuxnet worm remains attacking the user system as it installs itself into user system mutely. This clearly indicates that, by the time a user notices about the introduction or impact of the virus in his or her system may take time. However, the worm has signs which enable one to notice its impact in the system (David 71). Such symptoms in the computer system include loading with difficulties, strange messages appearing while starting the system and warning signs or sounds which keep on popping in the screen every now and then. There are various steps which can be implemented in order to avoid worms and viruses. These measures have been adopted with the aim to prevent networked computers from the dangerous threats since it is evident that stand alone systems are not most probably encountered by the Stuxnet worms. First and foremost, users are required to employ internet firewall in their systems are activated in order to ensure maximum protection throughout. Bidgoli elucidates that similarly through ensuring that “Microsoft Update and turn on Automatic Updates” are available is another way of keeping away from virus and worms (14). More so, through installation of anti-virus software and it up to date through subscription and avoiding opening attachments from the internet can as well be appropriate way of preventing virus spreading. One of the harsh and solemn harmful effects of computer viruses and worms is that they slow down the computer system hence resulting to delays and poor performance (David 17). This occurs because viruses in most cases display multiplication traits especially when they have entered the computer system. Once a virus has right of entry to your computer system, many a time, they multiple themselves to several copies. This results to the system being bulky, overloaded and the processer is overwhelmed by the processes it should process and at what priority. A computer system infected with worms and viruses is always subjected to crashing any time which may result to losing data stored within. Any user wishing to protect his or her system from Stuxnet worm should install strong antivirus in the system in addition to configuring all the latest updates while running the update security implement (Bidgoli 28). It is also suggested that users should check their computers with Stuxnet remover tool which detects and removes the vigorous virus, discovers different files created by Stuxnet, become aware of malicious programs and remove them. Network technology is can be considered as the benchmark from where worms originate. It should be noted that Stuxnet worms are not primarily created by hackers but they developed automatically due to configuration of the networking system or whatsoever (David 52). Viruses and worms cause the processor of the entire system to delay vital procedure and therefore give priority to minor process which doesn’t add up much. The slowness of the computer system absolutely affects services been offered to the client (Rimon 1). In a business enterprise, virus can even result to low performance hence low production. In the case of business enterprises, they are forced to encompass on customer service which is a fundamental constituent to the accomplishment and affluence of the business. As well, slowing down of computer system destroys the self-esteem of worker in view of the fact that the computer takes long time to respond to instructions and command. According to Rimon the effects of computer virus can be looked upon as a reason towards the waste of time while at the same time as the output of the business plateaus which results to poor production (1). The worst of all, virus and worms causes systems to crush or become tremendous slow such that they have to be cleaned which may bring operation to a standstill within any given organization or business. Apart from affecting the business different enterprise system performance, computer viruses may cause loss or damage of data. Viruses and worms like the Stuxnet have the tendencies of “hiding, deleting or manipulating information.” Such information which may be deleted by virus and worms may be required in running events especially when it comes to decision making (David 62). For any user or organization requiring improving and maintaining system performance and safeguard information from any negative interference, investing in protective measures against worms and viruses is considered important and given first priority (Online Technology Center). This can entirely be attained through hiring computer experts who are in position to monitor their system and incase of any infection, they are able to detect and delete the virus before causing massive loss or damage. As well, appropriate understanding when it comes to the use of internet services is essential and required by computer users. This is because it serves as the way through which proper use of the internet can be of help (Douglas & Sturken 28). Networking technology works in different ways and the configuration essential in networks differs depending on the internet protocols used in the arrangement. Studies conducted by David reveals that poor networking causes breach through which worms and viruses emerge (71). This been the case, it is considered important for network developers to use the appropriate internet protocols which ensure elimination of virus hence control the spreading of the same. There are many viruses which emerge following the increase use of networking technology. As well, development of different anti-virus software’s to combat the virus is manufactured. However, it is worth to note that, coming up with the best anti-virus software which can be in position to fight all the viruses is impossible. This implies that, different anti-virus software’s are restricted to fighting only specific virus or worms (David 172). Computer user should learn how to prevent their systems from viruses by adhering to the simple rules and regulations which define the scope of maintenance. Currently a number of software vendors like the Microsoft and F-secure offer applications that can help in the detection of the presence rootkits. When a rootkit is detected the only accurate way of ridding it is through erasing the computer hard drive completely and re-installation the operating system. This has been made possible by a cracker installing a rootkit into a computer then obtains user access by either exploiting any vulnerability or cracking a password. Here, a cracker can intrude and gain access to the computer by making backdoors (David 16). A discussed earlier, the presence of rootkits has been well documented since the early 1990s. As of today, computers running on the window operating system are the most prone to rootkits while at the same time becoming very difficult to detect on any network. Rootkits have become more common as discussed and their sources still astonish security experts. Experts suggest that electronic suppliers are now installing rootkits in their device software and the customer end up installing these programs in his or her computer without their knowledge (Bidgoli 40). This in the end has created opportunities for the writers of viruses. It should be known that rootkits can be exploited by any form of malware and this even makes it harder to find its source. Conclusion Technology has provided means through which communication has been made easy, networking and management has been enhanced. However, it is worth to note that the same technology is still the source of threats which if not well taken care of damage what is already stored in the computers. In conclusion, the effects of rootkits are evident and prevalent. Most of these effects directly or indirectly negatively affect the functionality or profitability any business enterprises using the recent technology. Up to now, there is no assured methodology of eradicating completely viruses attack on computer system. As well, there is no antivirus software which can guarantees maximum security as far as rootkits are concerned. Works Cited Bidgoli, Han. (2006). Handbook of information security. Vol 3. Chicago, IL: University of Chicago Press. David, Sands. (2006). Foundations of computer security. Washington DC: DIANE Publishing. Douglas, Thomas & Sturken, Marita. (2004). Technological visions: the hopes and fears that shape new technologies. Philadelphia: Temple University Press. Rimon, Islam. (2011). How do viruses work? Retrieved from, http://viruscaptive.com/antivirus-reviews/how-do-viruses-work/ Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Rootkits Research Paper Example | Topics and Well Written Essays - 2000 words”, n.d.)
Rootkits Research Paper Example | Topics and Well Written Essays - 2000 words. Retrieved from https://studentshare.org/information-technology/1445697-rootkits-what-they-are-and-how-they-avoid
(Rootkits Research Paper Example | Topics and Well Written Essays - 2000 Words)
Rootkits Research Paper Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/information-technology/1445697-rootkits-what-they-are-and-how-they-avoid.
“Rootkits Research Paper Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/information-technology/1445697-rootkits-what-they-are-and-how-they-avoid.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Computer Rootkits

Identity Theft: Definition, Effect on Public and Ways of Protection

In recent years, social engineering have become one of the most potent tools used by identity thieves to gain access to buildings, databases and computer systems across the country (Hadnagy, 2010).... Defining Identity Theft, its effect on the public and finding ways on how a company or an individual can be protected from Identity Thieves I....
8 Pages (2000 words) Research Paper

Malware and computer system

Computer malware can be sometime very disturbing not only to the proper operation of a computer system but also to the computer user.... This malicious software can be thought of us a program that is specifically created by someone who intendeds to disrupts normal operation of the computer.... Some of these malware are intended to gather sensitive information from the computer or with the intention of accessing the private computer system.... Later there was the network warms that came through the internet then finally new malware like the rootkit and ransomware were to be found in the computer systems in the later years....
6 Pages (1500 words) Essay

Research Project : Information Security Management

Some of the most common malware include rootkits and botnets (Stephen, et al, 142).... Information stored in computer systems is often under attack from different information security threats coming from different sources.... Threats to information security often gain access to the information stored in computer systems and manipulate the data and information rendering it meaningless and useless to the owners of the information while in some cases benefiting the sources of the information security threats (Stephen, et al, 106)....
3 Pages (750 words) Research Paper

Rootkits, Computer Attacks and Cybercrime

Koch (2007) stated… Casad (2006) stated that it was a set of tools that could be uploaded in the computer under attack; the tools enabled the intruder to perform malicious activities Rootkits Rootkits Introduction Computer attacks and cybercrime has been present in the world of computing in one form or the other since the emergence of the invention of computers.... Casad (2006) stated that it was a set of tools that could be uploaded in the computer under attack; the tools enabled the intruder to perform malicious activities and gave the control of the system to the attacker....
2 Pages (500 words) Research Paper

Build Your Own Botnet

As a result, rootkits enjoy the advantaged right of entry into a computer.... Browser SecurityInvolves ensuring that one's computer is protected against possibly lethal materials or suspicious software obtained online.... Additionally, the administrator can use the traffic analysis and packet logs to trace any intrusion issues on each user's computer....
2 Pages (500 words) Essay

Buffer Overflow & Rootkits

Perhaps, this is due to the nature of some attacks to integrate themselves well into the computer's operating system.... The difference-based scanning method compares trusted original data from the computer with defective data returning from the API (Application programming interface), a programme building tool.... Perhaps, this is due to the nature of some attacks to integrate themselves well Buffer Overflow & rootkits al Affiliation Buffer Overflow & rootkits Computer systems are vulnerable to attacks by a variety of on the internet....
1 Pages (250 words) Assignment

Mac VS Windows Security

Today rootkits are generally associated with malware – such as Trojans, worms, viruses – that conceal their existence and actions from users and other system processes” (veracode).... Remote Desktop Protocol (RDP) is a protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection.... “A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence....
2 Pages (500 words) Essay

Malicious softwares

In the paper “Malicious softwares” the author analyzes various classes of malware programs, along with their effects to the computer system and system users.... A virus is a malware program that has the ability to propagate itself into more copies and end up being a part of another program in the computer.... For these programs to cause harm to the computer, they have to multiply; which is a basic characteristic for them.... These kernel items carry specific information with them that act as an indicator to existence of malware programs in the computer....
11 Pages (2750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us