StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Malware in Operating Systems - Essay Example

Cite this document
Summary
The computer is a set of various components out of which the most important one is the operating system. Operating system can be termed as the backbone of computer. It is the underlying surface over which the entire functions are performed…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful
Malware in Operating Systems
Read Text Preview

Extract of sample "Malware in Operating Systems"

Malware in Operating Systems: The computer is a set of various components out of which the most important one is the operating system. Operating system can be termed as the backbone of computer. It is the underlying surface over which the entire functions are performed. Operating systems are at direct threat from various kinds of malicious programs which are known as viruses and malwares in the computing world. These are kind of programs designed for specific purpose of destroying data, accessing private records, jamming networks and various other disabilities.

The history of malware is an ancient one; a large number of malwares gets enrolled into the world of computer and creates problems of various kinds everyday (Weverka, 2006). Some may target a single computer; others may target networks or servers, while still others aim at banks and official departments. In short, no individual or organization that is being run via online medium is safe from the malware. With broadband technology available to almost every user around the globe, the challenges so faced in regard to the safety of users are more severe now since full time chances of malware entering into the network.

Large numbers of operating systems are present in the market, namely Windows by Microsoft, Linux, Android, and Apple Operating System (I.O.S). All of them are vulnerable in one way or another. Every year, we see massive cyber hacking groups launch attacks on official websites, organizations and servers. Many a times, defense organizations become their target as well. Yahoo, Microsoft and other notable websites have become targets of these malwares many a times (Belew & Elad, 2011). Hence, these viruses are not just limited to the individual operating systems, rather, entire cloud and network servers.

This malicious content finds their way in many ways. They can be either penetrated into the system via transfer of files and data, or leaving behind passwords, continuous browsing and extensive online activities are prone to invite the malicious content into the computers (Cooper, 2002). Mostly pop ups and ad on applications lead to entry into the system. The repercussions of all these are highly dangerous and can lead to severe data loss and privacy infringement. Mobile operating systems are equally at threat.

For Android, being the major player in this field and so successful at that, challenges for security are also growing in large proportion (Fedler et al 2012). Mac OS and Linux are considered to be slightly safer option in this paradigm. They cannot be termed as hundred percent safe and secure, yet, the probability of catching a worm and getting affected is far more less than that of Microsoft Windows. The numbers of viruses of windows are umpteen; the numbers of other two operating systems mentioned above are relatively smaller in number.

The main reason of catching viruses is the process of accepting unauthenticated file and data and allowing remote users access it during conversations. While it is a known fact that the world of internet is full of viruses, the best remedy in this case is a protective operating system and, further, protective browsing. The software design of Linux is comparatively different from the Windows and, hence, makes it hard for hackers and spammers to infiltrate into the respective operating system. Linux, in contrast to Windows, can be termed as program based on secure browsing that invites no or little insurgent elements that are out in the open communication sphere (internet).

Microsoft may be relatively user-friendly; yet, this user-friendliness brings about more damages and vulnerabilities on occasions. Linux and Mac OS, in contrast, ensure safe browsing which might not be the most users-friendly yet secure browsing. The reason for catching less number of viruses can be attributed to the nature of design and the software used. Mac OS are designed in such a way that they ensure safety and are antivirus oriented. The problem with windows is the replication of .exe (executable file) which is often coaxes the users into believing that the file is genuine Windows file (Dvorak et al 2004).

Once these files enter in to the system, they spread like fire and make their way to every folder, every drive and every corner of the system. Separation of users into privileged and ordinary users is another factor due to which Linux enjoys considerable safety heaven over Microsoft. In bid to overcome the viruses’ factors, Microsoft comes up with official anti-viruses’ software that is the company endorsed and ensures protection from various forms of viruses and malwares. They require regular updates and registered member id.

Having identified the nature of multiple operating systems, their preferences and priorities, the areas of strength and weaknesses, it can be said that despite the safety functions provided by the operating systems, the users are largely responsible for managing the manner in which their operating system behaves. Safe browsing is the order of the day regardless of any operating system being used. References Belew, S., & Elad, J. (2011). Starting an Online Business All-in-One For Dummies. John Wiley & Sons.

Cooper, J. (2002). Special Edition Using Ms-dos 6.22. Que Publishing. Dvorak, J., Pirillo, C., & Taylor, W. (2004). Online!: The Book. Prentice Hall Professional. Fedler, R., Banse, C., Krauss, C., & Fusenig, V. (2012). Android OS Security risks and Limitations: Practical evaluation. Fraunhofer Research Institution For Applied And Integrated Security. Weverka, P. (2006). The Everyday Internet All-in-One Desk Reference For Dummies. John Wiley & Sons.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Malware in Operating Systems Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1457882-malware-in-operating-systems
(Malware in Operating Systems Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1457882-malware-in-operating-systems.
“Malware in Operating Systems Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1457882-malware-in-operating-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Malware in Operating Systems

Malware and computer system

Later there was the network warms that came through the internet then finally new malware like the rootkit and ransomware were to be found in the computer systems in the later years.... Body of the Report During the last twenty four hours our computer experts have be up to task due to the so many computer malware that have been detected and has thus given us a hell of trouble as far as the function ability of the computers systems are concerned.... Computer malware can be sometime very disturbing not only to the proper operation of a computer system but also to the computer user....
6 Pages (1500 words) Essay

Malware and how it affects the system and the Victim also how it get into a Victim machine

A malicious software (in short Malware) is an illegitimate software that is designed and programmed by persons who want to gain access to other private computer systems, gather sensitive information and or disrupt the working of computer systems.... Over the last years, malware has… become a dominant feature within the computer systems and is not isolated to particular places but on the contrary, it is spread all over the globe (Reavis, 2012). Malicious software in general refer to a variety of software which are intrusive or even hostile and includes such MALWARE A malicious software (in short Malware) is an illegitimate software that is designed andprogrammed by persons who want to gain access to other private computer systems, gather sensitive information and or disrupt the working of computer systems....
2 Pages (500 words) Essay

Investigating Dynamic Malware Analysis Tool

malware has evolved into a more lethal threat by use of multiple vectors to launch attacks and exploit both unknown and known computer vulnerabilities and can infest prescanned files and folders with lightning speed.... It will be expedient to equip scanners for the detection of… However, the current malware detection scanning techniques have serious limitations.... Since the pattern or the signature is obtained from a familiar malware, this detection technique is easily evaded by obfuscating a program such as junk insertion and packing (Mishra, 2010)....
4 Pages (1000 words) Research Proposal

Investigating Dynamic Malware Analysis Tool

The continuous evolutionary patterns of the malware designs have raised difficult for the analysts in terms of identifying and terminating such programs from slipping into systems in an undetected manner.... Within the drastic evolution in the areas of software fields and data execution patterns, multiple unauthorized individuals have started using these kinds of malicious contents for attaining illegal access to those systems from where they can gather crucial data for sufficing their needs (Malware Help....
27 Pages (6750 words) Case Study

The Analysis of the Security Policy

There are many malware… Some of the serious damages and loses that could happen to a computer due to antivirus, spyware, and adware invasion include data loss, sharing In addition, certain malware programs are meant to transfer information regarding website activities to third parties (Vacca, 2013).... The policy also defines the means by which prevention and removal of malware programs from computers is done (Aycock, 2011)....
4 Pages (1000 words) Assignment

Malicious softwares

These malware programs tend to infect systems and bundle other programs by attaching themselves as macros to computer files.... Some types of viruses enter into the user computer systems through the email systems as well as the address books.... These malware programs are also installed through the exploitation of a vulnerable spot in an operating system, a network spot, or even a hole that is existent in a browser.... Worms and viruses have the ability to alter the normal operation of an operating system; inflicting various kernel-level items (Christodorescu et al....
11 Pages (2750 words) Essay

Malware Analysis Plan

However they have been found to be relatively ineffective with regard to overcome the large scaled threats and problems that may be faced by the operating systems and domains at large in the global e governance and business environments.... The personnel employed must be aware of the nature of work they pull off and they should have the basic understanding of the types of threats and challenges that come about in the form of malware in the digital domain....
10 Pages (2500 words) Research Paper

Understanding Information Technology Security

hellip; Detection of Malware in Operating Systems can be conducted using signature-focused works on the byte or binary patterns or even hashes (Chiasson et al, 2008).... "Understanding Information Technology Security" paper focuses on the use of encryption that assures one using either of the operating systems in place of immediate security and protection.... In fact, it will only be people with a unique key that can decipher information from the different operating systems (SANS, 2011)....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us