StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Malware and how it affects the system and the Victim also how it get into a Victim machine - Essay Example

Cite this document
Summary
A malicious software (in short Malware) is an illegitimate software that is designed and programmed by persons who want to gain access to other private computer systems, gather sensitive information and or disrupt the working of computer systems. Over the last years, malware has…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Malware and how it affects the system and the Victim also how it get into a Victim machine
Read Text Preview

Extract of sample "Malware and how it affects the system and the Victim also how it get into a Victim machine"

MALWARE A malicious software (in short Malware) is an illegitimate software that is designed andprogrammed by persons who want to gain access to other private computer systems, gather sensitive information and or disrupt the working of computer systems. Over the last years, malware has become a dominant feature within the computer systems and is not isolated to particular places but on the contrary, it is spread all over the globe (Reavis, 2012). Malicious software in general refer to a variety of software which are intrusive or even hostile and includes such software as rogue security software, spyware, worms, adware, dialers, Trojan, computer virus and key loggers among others which normally appear in the form of active contents, codes as well as scripts (Klaus, 2013).

However, it is worth noting that malwares are different from defective software in the regard that defective software may be legitimate software which would have had defective bugs before release and which were not corrected. Malwares get access into a personal computer system through a variety of ways, which include through an exchange of contaminated files, accessing contaminated online materials or even through legitimate download of corrupted software from the online stores. Attackers or the developers of these malware are known to attach the malware onto legitimate software online and as such, unsuspecting victims purchase the software only to have the harmful software get into their computer system.

However, such malware as spyware spread through individual installation by visiting security holes or even though installation of corrupted programs from harmful websites. Ill intentions by hackers or malware developers lead to the design and programming of the harmful software in order to access sensitive information from organizations or even private system. These software programs are used to steal sensitive financial, personal or even business information, which is targeted by the hackers.

Besides the use of malware to gather or ‘steal’ important information from corporate systems, the malicious software is used to disrupt the operations of computer systems and as a result bring about much suffering to organizations or corporate. The software has been used in many instances to target government operations, bank systems as well as corporate and private security systems for profit gains by the hackers (Reavis, 2012). The working of the different malicious software differs from one type to another.

Worms and virus are known to target executable software installed within computer systems and when the programs are run, the software spread to other software within the system of computers. This therefore imply that the spread and multiplication of the harmful software depend on the type where some do self replication while others depend on the running systems in order to spread. Furthermore, viruses spread through exchange of emails and Microsoft word documents, which are infected, and thus, upon opening of these documents, the virus gets access to the computer system.

Others also gain access into a system of computer through concealing their characteristics until they are from within the systems. Through this conciliation, they are able to carry out intended purposes in an undetected manner (Reavis, 2012). In sum, it is worth noting that no computer is immune absolutely to the malware attacks. There however anti-malware software which offer protection against these attacks with the most known among them being the ant-viruses that are installed to computers to detect and disable intrusion by the malware.

REFERENCESKlaus I. (2013). Viruses, Trojans, Malware - and other aspects of Internet Security. Apple support communities. Retrieved on 27 June, 2013 from:< https://discussions.apple.com/docs/DOC-2435> Reavis J. (2012). The Ongoing Malware Threat: How Malware Infects Websites and Harms Businesses —and What You Can Do to Stop It. White Paper. Retrieved on 27 June, 2013 from:

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Malware and how it affects the system and the Victim also how it get Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1622378-malware-and-how-it-affects-the-system-and-the-victim-also-how-it-get-into-a-victim-machine
(Malware and How It Affects the System and the Victim Also How It Get Essay)
https://studentshare.org/information-technology/1622378-malware-and-how-it-affects-the-system-and-the-victim-also-how-it-get-into-a-victim-machine.
“Malware and How It Affects the System and the Victim Also How It Get Essay”, n.d. https://studentshare.org/information-technology/1622378-malware-and-how-it-affects-the-system-and-the-victim-also-how-it-get-into-a-victim-machine.
  • Cited: 0 times

CHECK THESE SAMPLES OF Malware and how it affects the system and the Victim also how it get into a Victim machine

How ISPs Can Help Fight Botnets and Cybe

However, along with the convenience some more things have also been introduced like threat to personal information and intellectual possessions.... With the increase of users on IRC, conflicts also increased between the users.... (2010) stated that this server is also called the Command and Control server and the commands are sent in Command and Control...
14 Pages (3500 words) Essay

Definition, Organisation, and Creation of Botnets

fter the installation of the bot with the fixed payload in the computer, the machine makes contact with a public server set up by the botmaster.... This pattern follows for every other machine that is recruited into the botnet.... The bot software can also be transmitted as freeway in peer to peer networks.... This code is also used to insert new commands and attack victims (Patrick Lee, 2009).... These attacks can also be in the form of password “brute-forcing” and application layer attacks....
7 Pages (1750 words) Case Study

Spyware and Viruses

The user of the computer can also be cheated or tricked into the installation of the software via a Trojan horse when it pretends to be piece of security software offered for free.... Spyware is kind of malware, which is installed on a computer without approval or awareness of the owner with the aim of gathering the private information of the owner....
17 Pages (4250 words) Term Paper

Investigation of Crytolocker: Trace Analysis With Wireshark and Windows 2003 Server

It s software that gets into a computer system and then bars the owner of the computer from accessing the services or the system until a ransom is paid (Kevin, 2012).... GSX server:-the licensing of this product for the case of a two-processor machine begins from $3025.... This is so because the product can withstand the number of Central Processing Units (CPU) that can operate up to 64GB of the virtual machine.... It is also used on websites....
18 Pages (4500 words) Coursework

Security Protocols

Not only would cloud computing help the company improve its security, but would also provide it with better services and features.... DoS methods are also used by different web based companies to make sure that their competitor's servers remain unavailable to the users.... he first threat to the current system is the packet analyzer or packet sniffer....
13 Pages (3250 words) Coursework

Malware Analysis Plan

s a general rule, before undertaking the challenge of overcoming the malware, it is important to know the nature and the particular area and domain in which the malware may have damaged the operating system, program or any particular part of the system.... For this purpose, various tools and techniques are used that allow for a more comprehensive approach towards overcoming the menace of malware and making the global digital operations more effective and less insecure....
10 Pages (2500 words) Research Paper

Timeliness, Bandwidth and Other Factors Essential When Performing Scans or Enumeration

All these techniques form part of the penetration testing means of accessing an organizations information system and identify any existing and potential vulnerabilities (Allsopp, 2017).... After the tests, the results will become forwarded to the firm's information technology personnel who will use the outcomes in coming up with recommendations and plans to strengthen their system and reduce any likelihood of future attacks.... Through acquiring the certification, it will provide the ethical hacker can carry out system hacking, different forms of attacks on the system such as planting Trojan horses and other viruses, SQL injections, scanning, and enumeration....
12 Pages (3000 words) Term Paper

The Key Failure Points in the Tjx System

Without the knowledge of it, the worm is a threat to technology and can stay in the system for even 18 months.... Thus there cannot be any central controller except itself by deleting files from the computer and allowing an attacker to remotely control the system.... Discuss how TJX's information systems and technology security could be improved or strengthened, distinguishing between short-term versus long-term priorities Some of the short-term security measures that could be improved or strengthened included working with all major credit and debit cards to help investigate some of the potential frauds, directly contacting customers whose information had been exposed in the time of the intrusion process, working with the law including the U....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us