Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Importance of software in software engineering
Importance of software in software engineering
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Malware Types
Logic Bomb:
A logic bomb is code which consists of two parts:
1- A pay load, which is an action to perform. The payload can be anything, but has the connotation of having a malicious effect.
2- A trigger, a boolean condition that is evaluated and controls when the payload is executed. The exact trigger condition is limited only by the imagination, and could be based on local conditions like the date, the user logged in, or the operating system version. Triggers could also be designed to be set off remotely, or - like the "dead man's switch" on a train - be set off by the absence of an event.
Trojan Horse a Trojan horse is 'a program which purports to do some benign task, but secretly performs some additional malicious task.'[1] A classic example is a password-grabbing login program which prints authentic-looking "username" and "password" prompts, and waits for a user to type in the information. When this happens, the password grabber stashes the information away for its creator, then prints out an "invalid password" message before running the real login program. The unsuspecting user thinks they made a typing mistake and reenters the information, none the wiser.
Back Door
A back door is 'any mechanism which bypasses a normal security check'[1]. Programmers sometimes create back doors for legitimate reasons, such as skipping a time-consuming authentication process when debugging a network server.
Virus
A virus is 'malware that, 'when executed, tries to replicate itself into other executable code; when it succeeds, the code is said to be infected?' [1] The infected code, when run, can infect new code in turn. This self-replication into existing executable code is the key defining characteristic of a virus.
Worm
A ...
... middle of paper ...
...card numbers.
4- Software license keys, to facilitate software pirating.
Adware
Adware ' has similarities to spyware in that both are gathering information about the user and their habits.'[1] Adware is more marketing-focused, and may pop up advertisements or redirect a user's web browser to certain web sites in the hopes of making a sale. Some adware will attempt to target the advertisement to fit the context of what the user is doing.
Hybrids, Droppers, and Blended Threats
Zombies
Computers that have been compromised can be used by an attacker for a variety of tasks, unbeknownst to the legitimate owner; computers used in this way are called zombies. The most common tasks for zombies are sending spam and participating in coordinated, large-scale denial-of-service attacks.
References:
Aycock,J.(2006).Computer Viruses and Malware . University of Calgary, CANADA.
On August 12, 2003, a computer worm was released called MSBlaster.B, which was distributed through two files “teekids.exe” ( which included code that directs compromised computers to attack the Microsoft domain name www.windowsupdate.com and a backdoor file “Lithium” ( which allows a way into a password protected system without use of a password and remote control a system). The worm itself targeted mostly Windows 2000 & Windows XP systems. If Windows NT or Windows 2003 servers do not have the appropriate patches, they too may be vulnerable. The function of the worm is to exploit the DCOM RPC vulnerability.
Hackers. You know them as gangly kids with radiation tans caused by too many late nights in front of a computer screen. Evil beings who have the power to wipe out your credit rating, cancel your cable TV, raise your insurance premiums, and raid your social security pension. Individuals who always avert their eyes and mumble under their breath about black helicopters and CIA transmissions. Paranoid, social deviants who could start World War III from the privacy of their bedrooms. Or so the mainstream media would have you believe.
Beal, V. (2011, March 29). The difference between a computer virus, worm, and Trojan horse.
At the Aim Higher College there have been recently discovered malware on the campus systems that are due to many recent attacks. I used an Anti-virus protection software called AVG on the computer systems on campus and ran a whole computer scan. The results came back very quick of numbers of malware being high and medium priorities that these should not be taken lightly. Furthermore, the scan found many viruses, Trojans, and malicious software and applications.
Poison Ivy is the name given to a family of malicious remote administration Trojans first developed in 2005 and still being utilized for cyber attacks today. As a type of remote administration software, once a computer becomes infected the attacker has complete control of the computer. The most recently documented large-scale utilization of the software was during the “Nitro” attacks from July 2011 through September 2011 that targeted both chemical and defense companies for the purpose of industrial espionage (Fisher). The information security firm McAfee stated that five multinational natural gas and oil companies were successfully targeted by the Poison Ivy malware, as well as 29 other companies identified by Symantec (Finkle). These organizations lost proprietary information to the attackers, including confidential bidding plans (for the energy companies) and details on manufacturing processes and formulas (for several chemical companies).
Computers are main technological features that allow criminals to step into unsuspecting victims lives. With a simple piggy-backing program hackers are able to track every keystroke made by the victim. One such program is called spyware, not to be confused with adware, which is often referred to interchangeably with spyware, but is potentially harmless (Louis 15). Spyware, hidden within downloaded software, implants itself deep within a computer’s hard drive, allowing it to track every move made by the user (Louis 16). Once inside a system, spyware can gather e-mail addresses, passwords, and credit card numbers.
Hacking has been around since the birth of computers. When the term hacking was first used, its meaning was not that of how we think of it today. At the origins of computing, a hacker was considered to be just a "creative programmer (Baase, 2003)." Early forms of computer games as well as the beginnings of operating systems were discovered and created by these original hackers. These hackers plunged into systems as a way of an intellectual challenge and to aspire to gain knowledge (Baase, 2003). Kevin Mitnick believes he falls into this realm of hackers. Hackers in today's era are now looked upon as criminals who invade the privacy rights of individuals and have the ability to deliver worms/viruses. The differences are that hackers today have full intentions of delivering terrible viruses and worms. Mitnick was one of the most infamous hackers during the 1980's. He molded his hacking style around the stupidity of humans and his quest for intellectual knowledge. The ways in which he wiggled his way into computer systems extenuates many of the issues surrounding computer security and privacy.
Malicious software in short known as Malware. It is also known as computer Contaminant. Similar to biological parasite, malware also reside in a Host. Malware will get installed on host without user’s consent. Generally a software is considered malware based on the intent of the creator...
In the story the signalman is shown as being powerless to stop the horrible accidents involving the train just like humans are powerless to prevent train crashes from happening.
...he Trojan horse, users should be familiar with all the programs that should normally run on their systems. Once there is an addition or alteration, it is easy to notice and investigate. Another technique that is often used by attackers involves using wrapping programs, that are combining both malicious and original code. Once run on the victim’s computer the program first installs malicious code, and then executes the original code.
I will now proceed to amaze you by telling you that from a medical point of view zombies are possible. With the tweaking of a virus a zombie apocalypse can happen or at least something that closely resembles the principles that define a zombie. Which are it feeds on humans, has no concept of right or wrong, essentially is brain dead,works to spread the virus,transmit it through direct fluid contact with other humans blood stream or brain, and is killed by the destruction of the grey matter in their brains. Now you may be saying how in the world do you get that to happen. I will now explain that medically and scientifically a zombie virus is possible.
Malicious software, or simply malware, can be described as software that a computer user never authorized to be loaded. This means that the software can be found on user’s computer without his or her knowledge. Furthermore, a malware can be described as software that collects private information from any computer without user’s knowledge and authorization. As the name suggests, this software is malicious and can do great damage to a computer, mobile device, or other related devices. This damage can range from something as slight as altering the author’s name on a document to massive damage like making an entire device fail to function properly (Töyssy and Marko 109). The good news is that malwares can be controlled or prevented. As a matter of fact, it does not cost a fortune to keep a device safe from malware attacks. It also needs enough knowledge about them. In order to be able to do this, however, it is important to understand the various terminologies used to describe malicious software.
Black hat: Black hat are the "hackers" which means they intentionally sent a malicious code into the computer system or network. black hat hackers are violate the rules of computer security. black hat hackers hack the system without authorization and destroy files or steal data for their purposes. black hat hackers will destroy secure network which is unusable access to user as a result authorize will get a downtime access of network.
A cyber crime called 'Bot Networks', wherein spamsters and other perpetrators of cyber crimes remotely take control of computers without the users realizing it, is increasing at an alarming rate. Computers get linked to Bot Networks when users unknowingly download malicious codes such as Trojan horse sent as e-mail attachments. Such affected computers, known as zombies, can work together whenever the malicious code within them get activated, and those who are behind the Bot Networks attacks get the computing powers of thousands of systems at their disposal.
In today’s days malware is designated as a software which aims to disturb a computer with the consent or permission of the owner. This term “Malware” is used by computer professionals to describe a varied forms of destructive, annoying and intrusive software code. This word “Malware” is used to indicate all types of malware which include a true set of viruses.