Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

CIS assigntment #2 - Essay Example

Comments (0) Cite this document
These are software that are created by individuals and designed to attack computer systems for the creators benefit (Szor, 2005). Malware has been in existence for almost as long as computers have and have been one of…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
CIS assigntment #2
Read TextPreview

Extract of sample "CIS assigntment #2"

Malware and its Effects Malware is a make up term that refers to malicious software. These are software that are created by individuals and designed to attack computer systems for the creators benefit (Szor, 2005). Malware has been in existence for almost as long as computers have and have been one of the greatest enemies of software developers as they are designed to find points of weakness in order to gain entry into a host computer and thus serve as a means of revealing the imperfections that exist within the various programs that have been designed by computer companies (Parikka, 2007). There are different types of Malware present in the market and they are used by their attackers to perform different activities. Some of the malware present in the wolrd of computers to day include:
Viruses – These can be said to be one of the oldest malwares that have been present in the world of computers (Brodkin, 2013). Viruses are programs that have been designed to replicate themselves so as to spread from computer to computer causing havoc wherever they infect. They affect the computers they infect in a number of ways including changing the behavior of the computer, erasing data and stealing information that may be stored on the computer.
Viruses embed themselves onto other program files in the computer and are activated when the user attempts to open the infected file (Brodkin, 2013). They can be spread through a downloaded file that contains the virus which is transferred from one computer to another.
Trojans – These malware is named after the Greek mythology of the Trojan horse due to their innocent appearance to the user so as to avoid suspicion of the actual danger that they yield (Brodkin, 2013).Once they are activated however, they are able to achieve a number of attackers on the Personal Computer such as causing continuous irritations such as unrelated pop up windows to more harmful acts such as the deletion of programs and the creation of backdoors into the computers files.
The fact that Trojans present themselves as harmless programs make them harder to detect and a user may be more vulnerable to this form of malware. Remote Access Trojans (RATs) are those that can create a backdoor system that allow the hacker access to one’s computer and is even able to send commands via root access capabilities (Brodkin, 2013).
Backdoors – These are programs that are designed to allow the creator undetected access to a computer system once they have been installed. Backdoors can be used by hackers to steal information from a server undetected and are similar to Remote Access Trojans in their functionality (Brodkin, 2013). The main difference between RATs and other backdoors is that RATs have a user interface available to the hacker.
Information Stealers – These are malware designed to steal important information from a computer system undetected (Brodkin, 2013). The information may include things like passwords, restricted data and other private details meant for the computer owner only. Examples of information stealers include desktop recorders, memory scrapers and keyloggers.
Ransomware – This can be considered to be one of the most destructive malware available as they are designed to hold the computer owner hostage by taking control of their PC and threatening to delete important files or even the whole machine unless financial compensation is paid to the creator in exchange for having the “problem solved” (Brodkin, 2013).
Botnets – This malware does not exactly directly affect the computer and turns a user’s desktop into their own task dog and a hacker is able to use to perform various functions that may bring about monetary gain (Brodkin, 2013).
The main prevention of these malware consists of the various antivirus programs that are available in the market today (Parikka, 2007). However, developers of these malware continue to discover new ways of avoiding them and the best strategy to prevent infection would be to avoid downloading any suspicious documents onto your computer as well as avoid entry into suspect sites as these are the main gateways that are used by these malware.
Brodkin, J. (2013). Viruses, Trojans, and worms, oh my: The basics on malware.
ARS Technica.
Retrieved on February 8, 2013 from:
Parikka, J. (2007). Digital Contagions. A Media Archaeology of Computer Viruses,
Peter Lang. New York. Digital Formations-series
Szor, P. (2005). The Art of Computer Virus Research and Defense. Boston: Addison-
Wesley. Read More
Cite this document
  • APA
  • MLA
(“CIS assigntment #2 Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
CIS assigntment #2 Essay Example | Topics and Well Written Essays - 500 words. Retrieved from
(CIS Assigntment #2 Essay Example | Topics and Well Written Essays - 500 Words)
CIS Assigntment #2 Essay Example | Topics and Well Written Essays - 500 Words.
“CIS Assigntment #2 Essay Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document



... countries. The validity of the recommendations are grounded on two primary sources: the existent information on the topic from and outside CIS countries, and a new additional survey. Therefore, the main target of the research can be supported by two preliminary objectives. 1. Extract the most significant outcomes from the existent information within the region and comparative analysis between the socio-economic conditions of the CIS countries and other regions of the developing world. 2. Receive the necessary information straight from the decision makers in the CIS regions, so that it is easy to obtain an overall perspective on how the political elite in these regions view the term development and the various development oriented... the...
16 Pages(4000 words)Essay


...CIS With the imagination of the human mind, racing at the speed of light it is quite evident how it affects the field of technology. Because of the fast paced human thought process, new technologies emerge everyday. Implementing these, technologies in the socio sphere of life bring along its own issues. The widespread use of technology in day-to-day business has forced experts to look into its pros and cons with some insight. The past few years have seen new trends emerging, better and efficient ways to communicate on a personal as well as social level. These boast about the enormous amount of data that can be shared. Nevertheless, along with it has come the intriguing question of "how safe is it to share" (Martinelli,...
3 Pages(750 words)Essay

Cis 331

...Icebergs for Kuwait Icebergs for Kuwait Explore the mess by answering the following Questions. What do we know? Freshwater in Kuwait is scarce hence very expensive as stated in Powell and Baker (2010). Desalinating water from sea is quite costly; it requires a lot amount of oil. What can we assume? We will assume that only large towing ships will be rented to carry maximum of 10, 000, 0000. We will also assume that the towing ship can travel at 1, 3, 5 km/hr, iceberg is spherical and melts with a constant radius. What will the results look like? Towing vessel will travel at 5km/hr and the quantity of the iceberg carry from South Pole will be greater than 6,054,466m3. The alternative method will be reasonable and less expensive... for Kuwait...
2 Pages(500 words)Assignment

Cis 331 discussion wwek 2

...Please respond to (2) other discussion posts. The original post will be highlighted in bold red colors. The yellow will be what I put as myanswer for the same discussion post. You may agree or disagree with their posting. Or you can add something to their answer, but please remember to be respectful. Please remember that you are no editing their post answer, you are just writing what you think about what reading their post for the week. It will be just like a sit in class discussion with you the teacher and the other students. You can put all answers ONE pages of work. No sources are needed. I have provided an example of how to respond to student post at the bottom of the page in discussion question two. This week I...
1 Pages(250 words)Essay

CIS Homework

...Security Best Practices In order to find out the best practices of the information security, I have visited and explored the websites of Microsoft, Oracle, Cisco, IBM and Intel. I have noticed that all of these organizations have developed their own information security best practices or guidelines; moreover, some of these guidelines are same in all organizations whereas the others are specific to the equipment or technology, they have developed. These organizations have developed information security frameworks, security architectures, information security laws, information security policy, the user training and resource (Oracle, 2005). It is pertinent to mention here that the guidelines and best practices varies with respect... Best...
1 Pages(250 words)Case Study


...Sherry Turkle: Connected, But Alone? Turkle in the show talks about how technology has transformed the manner in which people communicate today. The traditional forms of communication where people used to talk face to face or through phone calls have been replaced by new forms of technology through use of text messages, social networks and emails. According to her, this transformation has led to loss of genuine real life conversation converting people into robot- like machines. She asserts that there are features of real conversation that can never be replaced by the electronic communication. These features are what connect people as social beings. It is through real conversation that one can express their real emotions... Turkle:...
2 Pages(500 words)Essay

CIS 599

...The Chief Information Officers Body of Knowledge al Affiliation The Chief Information Officers Body of Knowledge The published book, the chief information officers body of knowledge is the most exciting collection of ideas and insights worthy of a place in a CIO office. The right word that describes the book is a collection since the book is an assemblage of writing from 30 independent contributors organized around three central themes; technology, process and people. The book written by Dean Lane is full of great material offered up in very applicable terms offering the reader every confidence they can borrow or copy the ideas themselves. The author’s idea on the IT role and that of the CIO in the industry is that it is rapidly... Chief...
2 Pages(500 words)Assignment

Unit 2 Discussiion CIS 204

...I totally agree with the team leader on account of leaving out RIP. Since RIP may not be suited to the large scale networks and given the shortest path first function, it may compromise the security aspect of the network. The RIP protocol may be left over against OSPF and EIGRP on account of the complete set of instructions and requirements fulfillment. The RIP protocol provides for the shortest path first, while OSPF allows fulfilling the requirements of the entire loop and network, hence the team lead may well be justified suggesting the use of OSPF and EIGRP against RIP protocol. OSPF and EIGRP are two commonly used protocols for the purpose of networking systems. The difference between the two is in terms of the proprietary... totally...
1 Pages(250 words)Coursework


...CIS Part My experience working for an organization offered new insight and practical involvement in theimplementation of a new system. Participating as part of the software design and development and implementation team, both the functional and non-functional requirements for the system had to be gathered for the organization, Virtusa. The organization is a profit oriented tech-firm that was looking to install a new computer system for its clients. The firm in this instantiated example of the project proves that the failure of the project was due to the requirements deficiencies. The practical case problem presented is that of a software corporation called Virtusa which released a software program application for its...
1 Pages(250 words)Essay


...College: Computer Programming Preheat the oven to 350 degrees. In a bowl, cream some butter, brown sugar, and white sugar together. Beat in the pudding mix until it is blended (, n.d). This recipe step exhibits both a sequence and iteration control structures. The first two steps exhibit a sequence control structure while the last step manifests an iterative approach. 2) 1. Database Administrator - Design and operations of a database 2. Help Desk - End-user oriented 3. System Programmer - Improve mainframe performance 4. Network Manager- Set up and manage network 5. System Operator - Day-to-day computer operations C++ Programming Language C++ is a cross-platform, multi-purpose computer...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic CIS assigntment #2 for FREE!

Contact Us