How Malware Infects a Computer - Essay Example

Comments (0) Cite this document
The author of the present essay "How Malware Infects a Computer" points out that Malware refers to malicious software that is used to disrupt the normal functioning and operations of a computer. The software gathers sensitive information and gains access to private computers…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
How Malware Infects a Computer
Read TextPreview

Extract of sample "How Malware Infects a Computer"

Malware Malware Malware refers to malicious software that is used to disrupt the normal functioning and operations of a computer. The software gathers sensitive information and gains access to private computers (Sikorski & Honig, 2012). Malwares can appear as scripts, codes or active content. Some of the most common malware include computer viruses, spyware, ransomware, scareware and adware. Most of the active malware threats are Trojans and worms (Bayuk, 2010). Some malware may be disguised as genuine software, which is supplied through official company website. Malware may also be supplied as an attractive or useful program. In this case, the malware is used to track and gather statistics and information.
Characteristics of Malware
Malware have the ability to run without being shutdown, detected or deleted. Malware such as Adware has a privacy invasive characteristic. In this case, the malware displays, plays and downloads advertisements automatically. Malware such as Backdoor have secure remote computer access characteristics. In this case, they can circumvent regular authentication processes (Aquilina, Casey & Malin, 2008).
How Malware Infects a Computer
Malware usually infect a computer through executable software. They target a system without the authorization or consent of a user. Running a software or system that is infected by a malware provides opportunities for the malware to spread. A malware needs a user to run an infected system or program in order to facilitate its spread to other executables (Dunham & Abu-Nimeh, 2009). For instance, the Valentine’s Day virus is spread when a user opens an email that has been infected with the virus (Skoudis & Zeltser, 2004). Users are usually compelled to open these emails because they have enticing messages. The aim of the virus was to spread in the computer and capture financial and personal information.
Aquilina, J. M., Casey, E., & Malin, C. H. (2008). Malware forensics: Investigating and analyzing malicious code. Burlington, MA: Syngress Pub.
Bayuk, J. L. (2010). CyberForensics: Understanding information security investigations. New York: Humana Press.
Dunham, K., & Abu-Nimeh, S. (2009). Mobile malware attacks and defense. Burlington, Mass: Syngress.
Sikorski, M., & Honig, A. (2012). Practical malware analysis: The hands-on guide to dissecting malicious software. San Francisco: No Starch Press.
Skoudis, E., & Zeltser, L. (2004). Malware: Fighting malicious code. Upper Saddle River, NJ: Prentice Hall PTR. Read More
Cite this document
  • APA
  • MLA
(“How Malware Infects a Computer Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
How Malware Infects a Computer Essay Example | Topics and Well Written Essays - 250 words. Retrieved from
(How Malware Infects a Computer Essay Example | Topics and Well Written Essays - 250 Words)
How Malware Infects a Computer Essay Example | Topics and Well Written Essays - 250 Words.
“How Malware Infects a Computer Essay Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF How Malware Infects a Computer

Malware Forensic Computing to provide evidence. This electronic or magnetically encoded data may include text messages, databases, pictures, e-mail, websites, spyware, malware, and so on. The evidence collected is strong and indisputable as compared to any other branch of forensic science because a copy that is made of the collected data is identical to the actual data and there is no room left for dispute. The whole concept revolves around the idea that a structured investigation is carried out to find out what exactly happened to the computer, when it happened, how it happened, and who did it. This is just like solving a murder case and performing postmortem. The operator does not know that the evidence...
10 Pages(2500 words)Assignment

Profit Implications of Malware transmission. This usually exploits email attachments as they can be executed immediately upon download (Karen Mercedes Goertzel). The multi-variant viruses are implemented with slight variations so that the anti-virus scanner cannot be able to detect the one of the variants. A computer worm refers to a self-replicating computer program. It relies on computer network to send copies of itself to other computers on the network in an automatic manner. Worms are known to exploit a zero-day vulnerability that allows them to execute their copies within the same network (Effects of Malware Infections: Avoid the Dangers of...
15 Pages(3750 words)Annotated Bibliography

How Computer Games Influence Violence

...they are vulnerable to deceptions (Signorielli 2006, p. 36). This means that they can barely separate illusions from reality. Children easily develop emotions that make them vulnerable to script of their play. It is essential to note that video games are proven to have positive effects as well. For instance, video games could be responsible for improving manual dexterity. This is useful in handling things such as bicycles, vehicles and other machines. Additionally, video games could improve computer literacy of children. This is attributable to employment of various control keys and manipulations in creating a game. Technology improves to accord these games better graphics for real three dimensional experiences in...
8 Pages(2000 words)Essay

Malware in Operating Systems

...?Malware in Operating Systems: The computer is a set of various components out of which the most important one is the operating system. Operating system can be termed as the backbone of computer. It is the underlying surface over which the entire functions are performed. Operating systems are at direct threat from various kinds of malicious programs which are known as viruses and malwares in the computing world. These are kind of programs designed for specific purpose of destroying data, accessing private records, jamming networks and various other disabilities. The history of malware is an ancient one; a large number of...
3 Pages(750 words)Essay

Malware. PMDump and Holodeck

...?WEEK 8 INIDIVIDUAL PROJECT Hostile worms and viruses, also known as Malware, are threats to virtually every system in the world that is connected to another system. Microsoft, by virtue of creating the most popular operating systems and application software, is by far the most attacked. So it stands to reason that their WinWord and the Notepad programs would be subject to attacks. For example, Data Rescue, a company that specializes in helping customers recover their vital information after an attack or disaster, analyzed one customer’s computer. They found that an executable program called MSMSGS.EXE was loaded on the customer network that played havoc with the WinWord application. With diligent...
3 Pages(750 words)Essay

Dynamic Analysis of Malware

...Victim server for certain services, keeping malicious traffic local! Multiple Worker (VM) Snapshot technology which can revert to the known state in seconds Anubis was designed to assist human experts to give fast overview of a sample’s behavior. Anubis is used in data tainting, which a powerful technique used in tracing data flows of a program like how network data is processed by a program, and also makes us able to find out if for infection, a malware uses random file names during a single analysis run. Anubis can also provide the feature known as “clustering”. This feature is used in finding and partitioning a given set of malware samples into subsets, so that...
4 Pages(1000 words)Research Paper

Malware and computer system the so many computer malware that have been detected and has thus given us a hell of trouble as far as the function ability of the computers systems are concerned. To begin with our experts have had to deal with the menace of computer virus, computer worms, rootkits and ransomware, spyware and backdoor malwares (Christodorescu, 2006). Computer virus During the last twenty four hours one of the malware that has really given our Information Technology experts a lot of headache is the computer virus. A computer virus can be said to be a malware that...
6 Pages(1500 words)Essay

Business: Information Technology Malware the means by which potential businesses and individuals will become infected. With rapid advances in technology, prior means of computer security are becoming antiquated. Organizations need to become increasingly aware not simply of malware within the organizational context, but even in contexts that are adjacent to this environment, such as cell phones and home computers. While no panacea exists that completely secures an organizations technology, implementation of Macintosh over PCs has demonstrated effectiveness because of the lack of malware specifically targeted towards the Apple platform. In addition, a number of added security measures have...
1 Pages(250 words)Research Paper

Server malware protection policy

...and the purpose of users in preventing incidents. The company should also have regular malware-oriented training and exercises. (Mell et al., 2005) Likewise, the awareness program by the company should make the employees and the computer machine users aware of the policy and the procedures that apply to malware handling; such as how to detect malware and how to report suspected infections. An effective awareness program should be developed by the company that states and explains proper rules of behavior for the use of the organization’s IT systems and information, i.e., not downloading items from untrusted sources....
4 Pages(1000 words)Assignment

Investigating Dynamic Malware Analysis tool

...’ specifically assists the detection tools in identifying and differentiating the malicious codes from the normal codes (Cloud 9 Internet, Inc., 2014). 4. What is the Sandbox, How It Is Works and What Does It Do From the technical perspective, sandbox is a form of testing environment where the identified codes are tested to determine the behavior patterns of the code. In sandbox technique, the malicious code is executed and examined within a same kind of computer platform environment as exists in the real time organizational network setup. Unlike the traditional malware signature detection technique, sandbox technique proves to be highly effective in identifying and examining...
20 Pages(5000 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic How Malware Infects a Computer for FREE!

Contact Us