Malicious Code

1628 Words4 Pages

Malicious code is a real danger to modern systems. Most systems nowadays do not work in isolation; they are more likely to be connected to other systems and sometimes they can even be dependent on them. Therefore an attack on one of the systems in the network is a potential attacking attempt to any other systems, with which it is interacting. Therefore, it is inevitable for any networked or Internet-connected computers to deal with malicious code attacks at some point. Businesses lose billions of dollars each year because of malicious code attacks. Responding to the attack and restoring all the data on the computers is a time-consuming and expensive task. It is a much better practice to try preventing it through organizing and maintaining effective defenses. However, it is important to keep in mind that there is no one general solution that can help to prevent all the attacks. Attackers are constantly looking for new ways to take advantage of systems’ vulnerabilities and find new ones. That’s why organizations have to not only defend themselves against existing attack methods, but also try to predict and prevent new attacking techniques. It means that computer and network security is a never-ending challenge and expense.
Malicious code, also known as malware, installed on a computer provides an attacker with the control over this machine. Therefore, malware can be defined as “a set of instructions that run on your computer and make your system do something that an attacker wants to do”. It is more common to see malicious code to be implemented in binary executable files. However, it can be implemented in almost any computer language. Attackers have used a huge number of scripting languages, word processing macro languages and a h...

... middle of paper ...

...he Trojan horse, users should be familiar with all the programs that should normally run on their systems. Once there is an addition or alteration, it is easy to notice and investigate. Another technique that is often used by attackers involves using wrapping programs, that are combining both malicious and original code. Once run on the victim’s computer the program first installs malicious code, and then executes the original code.

Works Cited

Erbschloe, Michael “Trojans, Worms, and Spyware. A Computer Security Professional’s Guide to Malicious Code”, Elsevier Inc, 2005
Nazario, Jose “Defense and Detection Strategies against Internet Worms”, Artech House Computer Security Library, 2004
Skoudis, Ed, Zeltser, Lenny “Malware: Fighting Malicious Code”, Prentice Hall, 2003
Zesheng Chen, Lixin Gao, Chuanyi Ji “On Effectiveness of Defense Systems Against Worms”

More about Malicious Code

Open Document