Computer Viruses and Malware

863 Words2 Pages

INTRODUCTION

Two of the common known attacks on computing systems are the deployment of computer viruses and malware.

Computer viruses are minute program which is “embedded inside an application or within a data file which can copy itself into another program“(Adams et al, 2008 ) for the sole determination of meddling with normal computer operations. The consequences may range from corruption and deletion of data; propagation of virus on to network and deployment through attachments through emails in order to further creating havoc to all associated computing devices.

Malwares are mischievous programs crafted to agitate or forbid normal operations to gather selected information which may lead to loss of privacy through exploitation; gain unauthorized entry into system resources and other abusive behavior”. The taxonomy of malware includes: Trojan Horses; Viruses, Worms and Zombies (Adams et al, 2008).

In the web applications technology, the web browser is the center which revolves around the internet entity. One of the main tool architecture for web design is the recruitment of JavaScript in the DOM “Document Object Model.” JavaScripting language has inherent capabilities which could execute dynamic effect within the web browser and DOM. DOM offers logic structure in which the document is accessed and manipulated. As a consequence, this also poses numerous security issue which plague all users and developers alike (Wadlow et al, 2009).

ANALYSIS

JavaScript is prevalent within many industries such as web design; desktop gadgets such as Dashboard widgets; PDF used in Adobe Reader; Application tools such as the Adobe Creative Suite; office documents used in Open Office, etc. (Wikipedia, 2011).

PROBLE...

... middle of paper ...

...xman, s., Naldurg, P., Venkatesan, R., Lambert, J., Shin, J. (2011) ‘ ZDVUE: prioritization of javascript attacks to discover new vulnerabilities’ [Online. Available from: http://doi.acm.org/10.1145/2046684.2046690 (Accessed 29 October 2011)

Wadlow, T., Gorelik, V. (2009) ‘Security in the Browser. Queue 7, 2 (February 2009)’, pp. 40-41., [Online]. Available from: http://doi.acm.org/10.1145/1515964.1516164 (Accessed 29 October 2011)

Adams, A and McCrindle R (2008) ‘PANDORA’S BOX, SOCIAL AND PROFESSIONAL ISSUES OF THE INFORMATION AGE’, West Sussex, England: John Wiley & Sons Ltd, pp. 565 (accessed 29 October, 2011)

Choi, Y., Kim, T., Choi, S. (2010) ‘Automatic Detection for JavaScript Obfuscation Attacks in Web

Pages through String Pattern Analysis’, [Online]. Available from:

http://www.sersc.org/journals/IJSIA/vol4_no2_2010/2.pdf (accessed 29 October, 2011)

More about Computer Viruses and Malware

Open Document