StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Rootkits, Computer Attacks and Cybercrime - Research Paper Example

Cite this document
Summary
The paper "Rootkits, Computer Attacks and Cybercrime" discusses that Casad (2006) stated that it was a set of tools that could be uploaded to the computer under attack; the tools enabled the intruder to perform malicious activities and gave control of the system to the attacker. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Rootkits, Computer Attacks and Cybercrime
Read Text Preview

Extract of sample "Rootkits, Computer Attacks and Cybercrime"

The most powerful aspect of this type of intrusion was that it could make the attack invisible to the users of the computer. 2. Nature of Attack Koch (2007) explained that rootkits are used in combination with Trojan horses. The infected system can be used for malicious usages without the knowledge of the user, for example conducting spam attacks, botnet attacks, or changing the settings of a system according to the desire of the hacker. George (2006) stated that rootkits can even cause the replacement, and changing of executable programs in the systems or the kernel-based files to jeopardize the entire functioning of the system.    

3. Degree of Losses Rootkit attacks are known to cause hefty losses for organizations since they are difficult to be traced by a user. CCH Group (2009) included figures from a survey that took place in 2006; the Computer Crime and Security survey concluded their study and stated that $241,150 is the average loss on an annual basis for organizations in the US. They also stated that 20% of these losses occurred from rootkit intrusions that may have caused leakage of sensitive information, login credentials, banking details, etc. 

4. Example of Rootkits Koch (2007) gave an example of rootkits and explained that Sony BMG Music Entertainment had adopted the strategy of rootkits to set digital rights management software on the system of the user whenever their CD was played to ensure that the music was not being copied or used for piracy purposes. This installation was being done without the knowledge of the user.  

5. Techniques for Mitigation Rootkits are hard to detect since the intruder’s tracks are cleaned and made invisible after the intrusion. George (2006) pointed out an effective mode of recognizing the presence of rootkits in the system by using an alternate media such as rescue CD-ROM. The involvement of such an external medium may be able to detect the rootkits since they may not be executing at the time of running the CD and intentionally trying to hide their existence. Another effective mode was explained by Alsalam, Banerjee, Musick, and Saftoiu (2005) that detects the presence of rootkits and the changes made by the malicious tools; keeping rootkits detection software installed in the system that continues to compare the clean state of the system with the current one. Any changes that may become apparent after comparison can signal malicious changes in the system.     Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Rootkits Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Rootkits Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1592389-rootkits
(Rootkits Research Paper Example | Topics and Well Written Essays - 500 Words)
Rootkits Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1592389-rootkits.
“Rootkits Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1592389-rootkits.
  • Cited: 0 times

CHECK THESE SAMPLES OF Rootkits, Computer Attacks and Cybercrime

The Technology Used in Cybercrimes

This was advancement in the cybercrime through which, the programmable logic of the Siemen products, which is mainly used to reprogram the equipment, was altered.... Breach execution The execution of the attack was highly planned and brought forth the possibility of massive revolutions in cybercrime.... Conclusion Stuxnet virus was one of the latest high technology cybercrime.... As a result, various strategies have been implemented in a bid to ensure that control over such attacks is conducted in time....
3 Pages (750 words) Research Proposal

IT Consultant & Methodolgies

There are more crimes being committed on the internet on a daily basis courtesy of cyber-attack or cybercrime.... IT Consultant & Methodologies Instructor Date Introduction As many people would agree, the computer age has brought with it many advancements in many areas.... IT Consultant & Methodologies Introduction As many people would agree, the computer age has brought with it many advancements in many areas.... A backdoor is a path to access a computer program while bypassing the security mechanism of the computer....
3 Pages (750 words) Essay

The PC: 35 Years and Computing - Computer Crime

och, C 2007, A Brief History of Malware and cybercrime, CIO, 4 June ... andy, J 2009, A Brief History of cybercrime, Times, 1 June ... Ever since the inception of computers, some computer users pose to be a threat for the others in terms of intrusion attacks, identity thefts, viruses etc. ... In the mid 1970's when the personal computer was not as common as the current times, computing attacks were done on the telephone systems for example John Draper hacked the AT&T system to make free long distance calls....
6 Pages (1500 words) Essay

Network/System Forensics

Cyber attack can be referred to as the computer to computer attacks that are carried out to erase, alter, or steal information or to impede or destroy the functioning of the targeted computer system.... Network/System Forensics Cyber Attacks Cyber attack can be referred to as the computer to computer attacks that are carried out to erase, alter, orsteal information or to impede or destroy the functioning of the targeted computer system (Pangi, 2003).... In most cases, these attacks are undetectable to the network administrator or the end user or it can lead to disruption of the network in such a way that the end user is unable to perform some of the rudimentary tasks....
10 Pages (2500 words) Research Paper

Malware and Their Current Impact on Private and Public Affairs

Such teams must cooperate with the global community in order to implement cybercrime laws and to impose significant penalties and punishments for these criminals.... Such teams must cooperate with the global community in order to implement cybercrime laws and to impose significant penalties and punishments for these criminals.... These institutions are equally susceptible to malware and cyber attacks.... Corporations express that they have often suffered billions of dollars in losses due to cyber attacks attributed to malware, with data leaks being a major issue in these malware infections (Siddiqui, 2008)....
8 Pages (2000 words) Coursework

Malicious softwares

Mobile malware attacks and defense.... Blackhatonomics: An inside look at the economics of cybercrime.... Such activities include sending spam mails, stealing vital information, mining digital currency such as the bitcoins, as well as distributed denial-of-service attacks at, also known as DDoS attacks.... attacks targeted towards various computer systems normally include a component of intrusion, as well as pursuance....
11 Pages (2750 words) Essay

Run Silent, Run Deep: How Cyber Criminals Protect Their Code

cybercrime is any criminal activity in which a computer is used as a tool, source, or target in executing the crime.... At present, there has been a widespread activity of cybercrime and these criminals utilize various ways and tools to accomplish their acts.... Ikipedia (2008) cybercrime Available HTTP: ... rg/wiki/cybercrime ... e continued to describe the attack methods used such as spam mailing instead of self-replication, Trojan viruses which are used in different ways, exploits through “Drive-by Downloads' method and the Phishing attacks which involve social engineering....
10 Pages (2500 words) Case Study

The Argument that Cybercrimes Are Not New Crimes, But Are Variants of Existing

"The Argument that Cybercrimes Are Not New Crimes, But Are Variants of Existing" paper states that crime and cybercrime cannot be identical and most organized crimes and other criminal activities will continue to happen in the real world instead of in the cyber world.... It was learnt with this incident that the US defence establishments were not properly guarded even against unsophisticated attacks and that the attack was executed by using tools that were obtained from the internet (Townsend, 2005). ...
12 Pages (3000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us