The Global Threat of Malicious Code

6199 Words13 Pages

The Global Threat of Malicious Code

I. Introduction

Malicious code is "Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality, integrity, or availability of an information system. 1 Today, as ubiquitous computing is fast becoming a reality and information systems are becoming a part of everything from mobile phones to cars, any threat to an information system represents a risk to hardware, software, data, and the users that depend on their confidentiality, integrity, and availability. This paper surveys the topic of malicious code by identifying malicious code, discussing how social engineering is related to malicious code, describing its threats, listing ways and means of infection, illustrating it through two case studies, and discussing countermeasures.

Malicious code can be classified into viruses, worms, and trojans. A virus is defined as "Self-replicating, malicious code that attaches itself to an application program or other executable system component and leaves no obvious signs of its presence. 1 The term computer virus comes from the biological organism. A biological virus attaches itself to a body cell, uses the cell s D.N.A to make copies of itself and spreads to other cells, in the process damaging them. A computer virus does exactly the same thing with computers. As with biological viruses, symptoms of a computer virus also are usually seen only after it has infected system components. A worm is a self-propagating piece of malicious code that spreads over computer networks infecting all vulnerable hosts. A Trojan horse is a "program containing hidden code allowing the unauthorized collection, falsification, or destruction of information. 1 The ...

... middle of paper ...

...emoval Tool Last updated: 10 Sep. 2003.
<http://securityresponse.symantec.com/avcenter/venc/data/w32.klez.removal.tool.html>

15.Security Config Klez Removal Tool
<http://www.securityconfig.com/software/antivirus/klez_removal_tool.html>

16.Understanding Heuristics, Symantec s Bloodhound Technology . Symantec White Paper
Series. Volume XXXIV.
<http://securityresponse.symantec.com/avcenter/reference/heuristc.pdf>

17.Harrington, Anthony. Blind Man 's s Buff. Dec. 2001.
<http://www.vnunet.com/News/1127335>

18.Sladaritz, Stephen. About Heuristics. Mar. 2002. SANS Institute. <http://www.sans.org/rr/papers/36/141.pdf>

19. Comparing heuristics to law enforcement is an example previously used in several publications including 16 and 18.

20. Landesman, Mary. The Computer Virus Continuum. Mar. 2002. <http://www.commandsoftware.com/products/continuum.html>

More about The Global Threat of Malicious Code

Open Document