StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Malware and computer system - Essay Example

Cite this document
Summary
Computer malware can be sometime very disturbing not only to the proper operation of a computer system but also to the computer user. Being that most of this malware are intentional crafted in order to have some fishy benefits to those involved…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Malware and computer system
Read Text Preview

Extract of sample "Malware and computer system"

?TECHNICAL REPORT College This is a report about malware that specifically reflects on the problems that was faced due to the malware that attacked our computer system. This report closely looks at the malware one by one concentrating specifically on the problems that they caused in a time frame of twenty four hours. Computer malware can be sometime very disturbing not only to the proper operation of a computer system but also to the computer user. Being that most of this malware are intentional crafted in order to have some fishy benefits to those involved it should be noted with a lot of concerned that some of these malware are so unavoidable since they are not only easy to come by through storage devices but they can also easily be found over the internet(Skoudis & Zeltser, 2004). These malware come in very many forms and with them come different effects to the computer which in turn will be very disturbing to the computer user. Introduction Malware is every computer owner nightmare due to the known effects that come with them. The name malware which owe its derivation from the two names malicious and software has universally been used to refer to these softwares. This malicious software can be thought of us a program that is specifically created by someone who intendeds to disrupts normal operation of the computer. Some of these malware are intended to gather sensitive information from the computer or with the intention of accessing the private computer system. The history of these computer malware date back to as early as 1986 when the first computer malware was made for PC by the two Pakistani brothers. Since then there has been so many advances as far as the malware are concerned from the then window malware which had the mail worms and the macro worms. Later there was the network warms that came through the internet then finally new malware like the rootkit and ransomware were to be found in the computer systems in the later years. Today malware include the computer viruses, ransomware, worms, rootkit, keyloggers, dialers, spyware, adware, malicious BHOs and Trojan horses (Skoudis & Zeltser, 2004). Body of the Report During the last twenty four hours our computer experts have be up to task due to the so many computer malware that have been detected and has thus given us a hell of trouble as far as the function ability of the computers systems are concerned. To begin with our experts have had to deal with the menace of computer virus, computer worms, rootkits and ransomware, spyware and backdoor malwares (Christodorescu, 2006). Computer virus During the last twenty four hours one of the malware that has really given our Information Technology experts a lot of headache is the computer virus. A computer virus can be said to be a malware that harms the computer by spreading within the infected files and this has to be with the aid of other software since it is only during the time of program execution when the code is executed. Specifically our computer system was under attack by the so called Randex which is a computer virus that falls under the memory resident virus affected all the file that were being opened by the user of the computer. It was so hard to deal with this virus since it was specifically located in the RAM of the computer. The computer user subsequently lost control of the system memory to this virus that then was later responsible for the corruption of the many programs that the user was trying to open. In most case the virus not only closed programs that had already opened but also made multiples of copies for the files in the memory and even renamed most of the files thus grounding the user as far as the use of the computer is concerned. Computer worms Secondly, our experts had so much difficulty in dealing with the computer worms that were detected in the computer system. Computer worms can be thought of as the malware that act independently and thus must not attach itself to computer software in order to affect a file. Most of these worms work by redesigning the host operating system in a way that favors their existence so that they start simultaneously with the boot process. One of the worms that our system face were the Internet worms specifically the code red. This virus affected our system due its scanning algorithm that scans for network and this gave a big problem to our private IP address. Due to our unpatched platform the worms gained access to our computer. It then leads to an increase in the payload thus making our servers to crumble. This was made possible by the fact that it was able to disguise itself and stay safe from the defending mechanism (Christodorescu, 2006). Rootkits and ransomware Our computer system in the last twenty four hours have also face so much difficulty as far its operation is concerned due to the attacks by the rootkit malwares. Rootkit malware can be referred to as software that are intentionally created to modify the operating system of a computer system so that the person responsible for the rootkit can have an remote access to a computer system and stay unidentified by the user of the computer system. This rootkit that specifically gave us a lot of trouble was the mebroot which we believe must have attacked our system over the internet. This rootkit malware was particularly a big headache since even our rootkit detectors could not pick its presences. Mebroot was actually responsible for the alterations of the our systems binary executables and even our system library thus gaining access to send information like what the user is typing to the attacker and we believe someone had the same intentions too. This malware almost brought our system down since ours system was hanging for almost three hours thus putting our operations to a stop (Skoudis & Zeltser, 2004). On the other hand the ransomware also caused bit of headache to our system this because the hard disk of our computer system had been crypted such that we lost control of our system. We believe that this attack might have been executed over the internet and though some files like the PDF files that prompted one to download and install the file. Subsequently this malware totally change the background of our computer system and a notification that demanded that we decrypt our system with a key that had to be paid for (Skoudis & Zeltser, 2004). Spyware Our computer system also faced so various attacks from Trojan horse. This can be described as malicious software that is able to change their form and disguise themselves as one of the computer files so that they cannot be detected by programs like antivirus. These programs are usually installed by the computer user without knowing since they usually appear like they are not of malicious intent. This Trojan horse made most of our file to be deleted making us lose so many of our vital files. This malware also led to the installation of other harmful software (Aycock, 2006). Backdoor Lastly, over the last twenty four hours our system have also faced attacks from malware know as the backdoor. This can be described as software that is intentionally crafted to grant access to other person’s computer system without going through the usual authentication procedures. This malware was a big headache to our system experts since every time our system were booting this programs were also starting. This in turn led to a decrease in our computer system speed (Christodorescu, 2006). Conclusion It is said that every good thing comes with its own problems and surely the menace of malware will forever be a big problem to computer systems. Taking for example malwares like the viruses, the rootkit, backdoor, spyware and the ransomware that we had to deal with were surely a big problem to the normal operation of the computer systems. Thus in every good computer system so many actions should be taken to safe guard the computer system. It is therefore advisable that whenever one thinks of buying or owning a computer then he should be able to reflect on its safety and put the relevant safety measures in order to be free of such attacks. One of the methods that can be used to keep one computer system from being attacked by some of this malware is for example having up-to-date antivirus software which can be able to deal with most of malware (Aycock, 2006). One can also be very cautious especially when they are browsing over the internet. This can be achieved by avoiding any suspicious looking command or site. People should always avoid downloading software programs that they doubt or they are not sure of there if they are authentic. It is only with this that we can keep our computer systems from being attacked by these renounced malware (Aycock, 2006). References (Aycock, J. D. (2006). Computer viruses and malware. New York: Springer. Christodorescu, M. (2006). Malware detection. New York: Springer. Skoudis, E., & Zeltser, L. (2004). Malware: fighting malicious code. Upper Saddle River, NJ: Prentice Hall PTR. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Malware and computer system Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1472321-malware-and-computer-system
(Malware and Computer System Essay Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/information-technology/1472321-malware-and-computer-system.
“Malware and Computer System Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1472321-malware-and-computer-system.
  • Cited: 0 times

CHECK THESE SAMPLES OF Malware and computer system

Malware in Operating Systems

The computer is a set of various components out of which the most important one is the operating system.... Operating system can be termed as the backbone of computer.... Malware in Operating Systems: The computer is a set of various components out of which the most important one is the operating system.... Operating system can be termed as the backbone of computer.... Large numbers of operating systems are present in the market, namely Windows by Microsoft, Linux, Android, and Apple Operating system (I....
3 Pages (750 words) Essay

Malware and how it affects the system and the Victim also how it get into a Victim machine

Malwares get access into a personal computer system through a variety of ways, which include through an exchange of contaminated files, accessing contaminated online materials or even through legitimate download of corrupted software from the online stores.... Attackers or the developers of these malware are known to attach the malware onto legitimate software online and as such, unsuspecting victims purchase the software only to have the harmful software get into their computer system....
2 Pages (500 words) Essay

How Malware Infects a Computer

They target a system without the authorization or consent of a user.... Running a software or system that is infected by a malware provides opportunities for the malware to spread.... A malware needs a user to run an infected system or program in order to facilitate its spread to other executables (Dunham & Abu-Nimeh, 2009).... The author of the present essay "How Malware Infects a computer" points out that Malware refers to malicious software that is used to disrupt the normal functioning and operations of a computer....
1 Pages (250 words) Essay

Server Malware Protection Policy

Similarly, the term server refers to whatever computer system domiciling in the physically secured data center owned and operated by the Company.... In summation, this includes any organization operating an operating system specifically designed for server usage as determined by the Company.... The installed anti-virus application should be one that offers a real-time scanning protection of files and applications running on the target system....
4 Pages (1000 words) Assignment

The Analysis of the Security Policy

Malwares refer to types of software whose installation into a computer leads to the performance of undesired tasks.... There are many malware… Some of the serious damages and loses that could happen to a computer due to antivirus, spyware, and adware invasion include data loss, sharing In addition, certain malware programs are meant to transfer information regarding website activities to third parties (Vacca, 2013).... If defines the handling of computer gadgets in the organization including how regularly computer software maintenance is expected to be performed, the manner in which computer updates are conducted, the type of programs to be installed and used on computers....
4 Pages (1000 words) Assignment

Malicious softwares

In the paper “Malicious softwares” the author analyzes various classes of malware programs, along with their effects to the computer system and system users.... These malware programs are also installed through the exploitation of a vulnerable spot in an operating system, a network spot, or even a hole that is existent in a browser.... Worms and viruses have the ability to alter the normal operation of an operating system; inflicting various kernel-level items (Christodorescu et al....
11 Pages (2750 words) Essay

Keeping Computer Systems Clean: Antivirus Software Industry

hellip; Some types of spyware and malware gather sensitive information from platforms which can then be sold to others, used to leverage the system for financial gain (stealing), or held for ransom (Rozas, et al.... The paper describes the precautions that would either prevent or fix a lot of troubles yet ordinary computer users do not do these simple things on a regular basis.... Just as diet and exercise take some effort and concentration, keeping computer systems clean takes the latest scanning software....
8 Pages (2000 words) Research Paper

The Impact of Computer Viruses on Business and Users

Loss of files, unusual changes in computer operations, slow functions performed by the computer and corrupted files are also the indication of viruses in the computer system.... The viruses that affect the whole functions or memory of the computer are, of course, posing a threat to the data stored in the computer system.... The viruses that enter the computer multiply them by created and spreading in each section of the system.... This essay "The Impact of computer Viruses on Business and Users" discusses how the businesses, educational institutions, domestic users and other organizations which are using computers for their routine work are greatly affected by the viruses and their outcomes on the computer data....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us