StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Malware Hiding and/or Spreading on Mobile Devices - Book Report/Review Example

Cite this document
Summary
This paper can be very useful to any person who wants to be acquainted more about the security of their mobile devices, it gives guidelines on how to prevent persona devices from being attacked and as how to deal with the threats associated with Malware and another virus…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
Malware Hiding and/or Spreading on Mobile Devices
Read Text Preview

Extract of sample "Malware Hiding and/or Spreading on Mobile Devices"

 Malware Hiding and/or Spreading On Mobile Devices Question 1(a) aMobile security Use of mobile devices has risen rapidly in the previous years. Many people across the world have thus turned to the devices to run a number of tasks such as playing games, banking transactions and getting the direction to various places. Some organizations and even individuals store some very confidential data n the mobile devices. This paper discusses mobile devices security, the threats n the mobile devices security such as malware and the effects. Malware is software programs that have been specially designed to either damage an individual’s computer perform some other unwanted actions (Jin & Wang, 2013). Question 1 (b) This paper is very significant as it discusses various issues such as the different types of malware, the ways that Malware infection can get into the mobile devices. Most citizens are not sentient that even answering a simple text message can infect their mobile devices with Malware. A new noteworthy role of the paper is that it has made the majority of people to be more cautious when using their mobile devices. The paper has enlightened the public on the various ways that the hackers use to either gain access to their mobile devices in such of confidential information. The paper also gives details about various Malware softwares such as adware, spyware, and Trojan horse. The paper has also explained the differences between the Malware software and the effect that each has on the mobile devices. The spyware gathers information by going through the web browsing history. Trojan steals user delicate data and adware pop-up personal information. Access sites This is the first way that mobile devices can be infected with Malware according to the paper when an individual access a site it can be determined whether the individual enjoys some particular privileges. Some of the privileges may include editing, viewing of profile data, registering and logging in or out. In order to enjoy such privileges, one must key in the username and the passwords. As soon as a mobile device is infected by Malware, hackers can deny the users from accessing their accounts by either deleting or editing of the user login information. Downloads The second way in which mobile devices can be infected with Malware is through downloading of Malware from illegitimate sites. As per most of the researches carried out, this is a major cause though which most mobile devices get infected with Malware. When a mobile device is infected with Malware, the device is not able to boot normally. The hackers can also use Malware to gain access to confidential information. Fake or illegitimate antivirus software Most of the mobile device users are aware of the threats associated with the most types of computer virus and Malware thus many are striving to ensure that the mobile devices they use are not infected. Unfortunately, most of the hackers whose intention is to gain illegal access to the devices have come up with fake antivirus programs. Question 1 (c) Practical information The paper gives a lot of useful information that mobile device users can practice in order to prevent their devices from being attacked by Malware. Some of the useful information provided is not replying sms' from sources that one is not familiar with (Blasco, 2012). Most mobile device users do not bother to the legitimacy of the sites that they visit. In this aspect, many of the mobile device users have either ended up losing confidential information or at times even finances. Thus, the paper is encouraging mobile device users to visit legitimate websites that are secure. Mobile device users should also avoid downloading of illegitimate security software or via USB. Question 2 (a) Removing of any computer virus is not an easy task, this is because most of the times the people who installs them are professionals who also are aware of some of the ways that can be used to remove the virus. The best method to use or steps to use in removing the virus is: 1. Accessing the drive The most convenient time for removing any infection from the computer is when the device is in a dormant state. One of the options but which is not always the best is by booting the device in safe mode. There are some forms of Malware that attach themselves t what is referred to as “win login," these means that if an individual tries to gain access to windows then the virus is automatically loaded onto the device. In order to prevent such happenings the best method to thwart such infections is by creating a BartPE Recovery CD, used to access the infected files. 2. Determination of load points For Malware to cause damage to any device, it needs to be loaded onto the system. Once one has gained safe access to the infected drive, the first task to be carried out is examination of all the start up points (Li et.al, 2014). The list of the startup points can be found on the Auto Start Entry Points Guide. The second task should be backing up of the registry, in case one unintentionally obliterate or changes any genuine setting. 3. Retaking of controls Most of the Malwares virus usually restricts the right of entry to either the task manager or the folder options menu located in windows (Ho & Heng, 2009). After ascertaining, that Malware has been removed manually or by use of an antivirus, one will need to rearrange these settings to take back regular access. Rearranging or changing the key settings may make it difficult for hackers to get right to use to the device. Question 2 (b) When one sees a recycle bin on FAT-32 flash drive there is a reason. Due to this, there is one explanation for such an occurrence, which is the presence of a virus. As a recycle bin should not appear in such a place. Opening the recycle bin to view the contents might activate or launch the virus (Ho & Heng, 2009). Question 2 (c) When a person notices that USB drive icon looks like a folder then there may be a possible presence of a virus. This is mainly caused by a malware that distorts the icons. Question 2 d The best way to deal with the issue is by scanning the system device using an antivirus software, however it is vital to note that not all antivirus software can be able to find the source of such an infection. It is, therefore, advised that one should know the best antivirus software to use (Blasco, 2012). Question 3 Crypto locker mostly targets computers that are running on the Micro soft windows operating system. The malware is spread through e-mail attachments, currently I think it is the worst malware and I do not think of any other way to make the crypto locker’s design any better. Conclusion This paper can be very useful t any person who wants to be acquainted more about the security of their mobile devices, it gives guidelines on how to prevent persona devices from being attacked and as how to deal with the threats associated with Malware and other virus. The immense contribution of this paper will go a long way in helping even the people with limited knowledge about mobile devices security. References Blasco, J. (2012). How to identify and stop mobile malware. Credit Union Times, 23(30), 9. Ho, Y. , & Heng, S. (2009). Mobile and ubiquitous malware. Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia, 559-563. Jin, R. , & Wang, B. (2013). Malware detection for mobile devices using software-defined networking. 2013 Second GENI Research and Educational Experiment Workshop, 81-88. Li, Y. , Hui, P. , Jin, D. , Su, L. , & Zeng, L. (2014). Optimal distributed malware defense in mobile networks with heterogeneous devices. IEEE Transactions on Mobile Computing, 13(2), 377-391. Wang, C. , Wu, Z. , Li, X. , Zhou, X. , Wang, A. , et al. (2014). Smartmal: A service-oriented behavioral malware detection framework for mobile devices. Scientific World Journal, 2014, 1-11. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Malware Hiding and/or Spreading on Mobile Devices Book Report/Review”, n.d.)
Malware Hiding and/or Spreading on Mobile Devices Book Report/Review. Retrieved from https://studentshare.org/information-technology/1850483-malware-hiding-andor-spreading-on-moblie-devices
(Malware Hiding and/Or Spreading on Mobile Devices Book Report/Review)
Malware Hiding and/Or Spreading on Mobile Devices Book Report/Review. https://studentshare.org/information-technology/1850483-malware-hiding-andor-spreading-on-moblie-devices.
“Malware Hiding and/Or Spreading on Mobile Devices Book Report/Review”, n.d. https://studentshare.org/information-technology/1850483-malware-hiding-andor-spreading-on-moblie-devices.
  • Cited: 0 times

CHECK THESE SAMPLES OF Malware Hiding and/or Spreading on Mobile Devices

An Assessment of the Vulnerabilities of the iPhone

ulnerability is a characteristic or feature of a constituent that can be broken by an outside or inside agent like a hacking agent or a malware attack to break a safety policy or cause a harmful consequence on the software of the iphone.... An Assessment of the Vulnerabilities of the iPhone ...
20 Pages (5000 words) Dissertation

Allowing Mobile Devices In The Office

mobile devices introduction will have negative and positive effects in the working environment.... This paper approves that there is a greater assumption that after introduction of mobile devices in different offices workers will follow principles that will be laid down by the veteran authority.... The introduction of mobile devices in the organization will require change of infrastructure to accommodate them.... Summary has to be made on the different devices that can be allowed and their use in the organization....
9 Pages (2250 words) Essay

Mobile Communication 1 and 2

Mobile commerce centers on transactions on mobile devices and represents a means for companies to engage with clients in right, individualized ways, incorporating incentives, loyalty, and location (Rysavy, 2013).... WI-Fi represents a critical access technology and is mainly the fastest and most convenient means to connect online services within nomadic contexts utilizing mobile devices.... Communication 2 What is the impact of consumerization of IT and the proliferation of mobile devices?...
3 Pages (750 words) Essay

Building an App Farm for University Student

obile apps are software programs that one can download and use on their phones or any other devices that they have like the tablets etc.... But not all the mobile apps that are developed are able to be accessed on all the devices; every operating system has the applications that rhyme with it.... Though some devices are enabled for users to block the in-app purchases.... This article describes the development of a pedagogical environment that would like to influence the learning and experiences of university students as mobile app end users, developers, and decision makers....
19 Pages (4750 words) Article

New Business Idea Analysis

In the paper “New Business Idea” the author provides his business idea, which will assist the people to have a variety of foods prepared in their home and provide information regarding the groceries list required.... His business idea deals with the food business as he loves cooking.... hellip; The author considers that the application would be easy to access and would provide assistance regarding the food preparation for every individual from kids to adults....
15 Pages (3750 words) Essay

Management at Apple Company

It designs, manufactures, and sells electronics, software, online services, portable… By revenue, it is the second largest information technology in the world after Samsung Electronics, and the third in the world in terms of mobile phone makers. Its main services and products are iPad, iPod, iPhone, Mac, Apple TV, a package of users Apple Inc....
5 Pages (1250 words) Assignment

A Human-Computer Interaction Guide for the Implementation of a Mobile Web

If the existing online application supports mobile devices, it will grant instant and universal access to the students to their accounts even without a desktop computer.... hen these students would access the web service application from their mobile devices, they would use a range of different devices with different hardware and software specifications, e.... The web application would be hosted on the online server and then will be accessed through mobile devices....
10 Pages (2500 words) Term Paper

Mobile Application Security Issues

hellip; The security of mobile devices is now one of the most critical success factors for an enterprise and 'Information Technology' decision-makers.... As mobile applications and mobile devices are now ubiquitous in the corporate market, they bring a vast variety of security concerns with them.... he use of mobile devices is rapidly increasing, as “Forrester estimates that the revenue from paid applications on Smartphones and tablets was $2....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us