Nobody downloaded yet

Malicious softwares - Essay Example

Comments (0) Cite this document
Summary
In the paper “Malicious softwares” the author analyzes various classes of malware programs, along with their effects to the computer system and system users. A virus is a malware program that has the ability to propagate itself into more copies and end up being a part of another program in the computer…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
Malicious softwares
Read TextPreview

Extract of sample "Malicious softwares"

Download file to see previous pages These malware programs tend to infect systems and bundle other programs by attaching themselves as macros to computer files. These malware programs are also installed through the exploitation of a vulnerable spot in an operating system, a network spot, or even a hole that is existent in a browser. For these programs to cause harm to the computer, they have to multiply; which is a basic characteristic for them. Worms and viruses have the ability to alter the normal operation of an operating system; inflicting various kernel-level items (Christodorescu et al. 2007). These kernel items carry specific information with them that act as an indicator to existence of malware programs in the computer. As these malwares attach themselves to the computer, they tend to interact with various programs and increase their level of sophistication in order to combat anti-malware solutions.
Some types of viruses enter into the user computer systems through the email systems as well as the address books. These viruses present themselves in a manner to suggest their validity and objectivity from coming from a trusted host source. The execution of the host code supplements the execution of the viral code. The virus program is then able to destroy the host program and attach itself into the computer. However, not all viruses have the ability to overwrite other programs especially with their replicate copies (Gragido 2013). Some only infect the boot sector and move the data in the selected boot sector. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Malicious softwares Essay Example | Topics and Well Written Essays - 2750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1697116-malicious-softwares
(Malicious Softwares Essay Example | Topics and Well Written Essays - 2750 Words)
https://studentshare.org/information-technology/1697116-malicious-softwares.
“Malicious Softwares Essay Example | Topics and Well Written Essays - 2750 Words”, n.d. https://studentshare.org/information-technology/1697116-malicious-softwares.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Malicious softwares

Design System and Security Control

...is everyone’s responsibility. The best advice is to choose a training program that will offer up-to-date courses which ensure that the users understand the policies and the procedures. The course should in turn provide report to the management. Malware (Steady Threat): malicious softwares range from viruses, worms, and Trojan horses programs etc. most employees have been distributing the Malware due to the frequent insist to the sites hosting the Malware. The solution I therefore to use URL filtering, patch management as well as other protection methods. The employees should also be limited as to the sites they can visit by restricting them to only sites deemed to be safe. Employment of the patch...
13 Pages(3250 words)Essay

Make a research paper about two different types of application softare (exclude microsoft office softwares)

...? NUMBER> 27 September Application Software Introduction Computers are almost useless by themselves unless they contain software. Indeed, regular computer users today are under the spell of computers because of the numerous application software that computers contain. These applications allow users to truly maximize the functions of a computer. An application software (also known as “application” or “app”) is a computer software that allows a user to perform a specific task (Miller, Vandome and McBrewster 2). As such, applications are designed to perform a specific task. Specifically, an application software provides the end-user with the...
3 Pages(750 words)Research Paper

Malicious Software, Unknown Threats & Potential Solutions

...?Running head: MALICIOUS SOFTWARE, UNKNOWN THREATS AND POTENTIAL SOLUTIONS Malicious Software, Unknown Threats and Potential Solutions Insert Insert Course Title Insert Instructor’s Name 08 November 2011 Malicious Software, Unknown Threats, and Potential Solutions Problem Statement Malicious software consists of code, scripts, and active contents that are designed to disrupt and deny proper operations of information systems. Malicious software also gathers unauthorized information, thus leading to loss of privacy and confidentiality of information. Systems’ vulnerability...
6 Pages(1500 words)Research Paper

Mobile Cybersecurity

...theft, attacks of malicious softwares or Trojan horses, data loss through hacking or through some other means. There should be security measures in place that provide the basic requirements of confidentiality, integrity and availability. Literature review The more rapidly the mobile industry is advancing, the greater it becomes prone to new risks that need to be addressed and managed by the professionals. In the current scenario, the increased connectivity of these devices has led to a greater threat of data being misused or hampered. In an experiment to test the security of these devices in 2006, with the help of laptop and Bluetooth connectivity they decided to check the mobile devices that can be...
15 Pages(3750 words)Research Paper

Web Server Application Attacks

...? Web Server Application Attacks Reg Submitted Web Server Application Attacks Part 1 Common Web Application Attacks and their Control 1. SQL Injection Vulnerabilities In this type of web application attack, malicious SQL queries execute unexpected actions through web applications, and disturb the back-end of the web application. To prevent this attack, user input in web application must always be validated before sending to the web server for action. This keeps the web application safe from malicious user inputs. 2. Session Security Vulnerabilities When session ID’s are sequential and persistent or when session tokens are not protected, one user may access another user’s data through assuming the other user’s identity. To mitigate... by...
3 Pages(750 words)Assignment

Planning Softwares in todays Project Management

...PROPOSAL (P3) Extensive use of Planning Software in today's Project Management The Context - Introduction The research will be based on a case company that is into website programming and contains 3 to 5 developers (those who are on payroll as well as freelancers working out of home). Being a small company and comparatively smaller projects to work on, the company initially did not feel the need for project management. The company has grown since and although the team size is not too large usually, the number of projects to be handled has grown. The project failure rate has also increased (in terms of not being able to meet cost and schedule specifically). The management is now forced to agree to Sandra Rowe who stated "If you're... on a...
4 Pages(1000 words)Research Proposal

Wounding With Intent and Malicious Infliction of Grievous Bodily Harm or Wounding

... The degree of Stan’s culpable mental state in attacking Helen will be determinative of the crime he can be charged with. The two most serious charges, wounding with intent and malicious infliction of grievous bodily harm or wounding, differ in terms of their mens rea requirement. A charge of wounding with intent under the Offences Against The Person Act of 1861 s.18 requires a specific intent to cause grievous bodily harm, while a charge of malicious infliction of grievous bodily harm or wounding merely requires a general intent of malice, in other words, an intent to do some harm. Because Stan did not intend to cause grievous bodily harm but only intended to instill fear in Helen, his mental state is...
5 Pages(1250 words)Essay

Forensic Accountants: In the Fight Against the Misuse of Technology

...stakeholders who have a direct financial relationship with the company in question. Examples of such crimes include identity theft, credit card theft and embezzlement. The use of computers and higher technology enables microeconomic corporate fraud to be linked with macroeconomic corporate fraud. This is because the computer and sophisticated technology enables people with a criminal intent to commit more crimes than normal. The Federal Bureau of Investigation identifies four main elements of macroeconomic corporate fraud that poses a challenge to the average forensic accountant. They are ATM heists, marketing of stolen Ids and credit card details, email scams and malicious software generation. In a...
8 Pages(2000 words)Term Paper

Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising

...Summary of a Study Li et al. , in their study d Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising, have talked about the malicious effect of infected advertisements, known as malware, and how people and even renowned business websites fall prey to such malware. They have talked about how common this malware has become in present days, and how easily it can get access to personal data and misuse it. The researchers have also presented an effective technique, in the form of a new detection system, called MadTracer, which enables the users to detect the malware and secure their data from it through identifying threats and attacks. They have found MadTracer to be very effective as...
2 Pages(500 words)Research Paper

Potential Malicious Attacks in ACME Inc

...Adopting a diverse computing atmosphere offers important security worth for a few enterprises. Include the impact of recent worm attacks in the concerns of desktop software package decisions. a straightforward way to begin this method is to maneuver the setting organization that don't directly support the operating system desktops which don't need applications that area unit solely supported on OS onto an alternate software package or systems. Therefore, in case a malicious-code attack strikes, the desktops that run the choice systems will perform and may scale back the scope and period of the attack. Potential concerns for data loss and data theft Hackers will access networks that...
4 Pages(1000 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Malicious softwares for FREE!

Contact Us