Malicious Code Essay

Malicious Code Essay

Length: 1628 words (4.7 double-spaced pages)

Rating: Powerful Essays

Open Document

Essay Preview

Malicious code is a real danger to modern systems. Most systems nowadays do not work in isolation; they are more likely to be connected to other systems and sometimes they can even be dependent on them. Therefore an attack on one of the systems in the network is a potential attacking attempt to any other systems, with which it is interacting. Therefore, it is inevitable for any networked or Internet-connected computers to deal with malicious code attacks at some point. Businesses lose billions of dollars each year because of malicious code attacks. Responding to the attack and restoring all the data on the computers is a time-consuming and expensive task. It is a much better practice to try preventing it through organizing and maintaining effective defenses. However, it is important to keep in mind that there is no one general solution that can help to prevent all the attacks. Attackers are constantly looking for new ways to take advantage of systems’ vulnerabilities and find new ones. That’s why organizations have to not only defend themselves against existing attack methods, but also try to predict and prevent new attacking techniques. It means that computer and network security is a never-ending challenge and expense.
Malicious code, also known as malware, installed on a computer provides an attacker with the control over this machine. Therefore, malware can be defined as “a set of instructions that run on your computer and make your system do something that an attacker wants to do”. It is more common to see malicious code to be implemented in binary executable files. However, it can be implemented in almost any computer language. Attackers have used a huge number of scripting languages, word processing macro languages and a h...


... middle of paper ...


...he Trojan horse, users should be familiar with all the programs that should normally run on their systems. Once there is an addition or alteration, it is easy to notice and investigate. Another technique that is often used by attackers involves using wrapping programs, that are combining both malicious and original code. Once run on the victim’s computer the program first installs malicious code, and then executes the original code.








Works Cited

Erbschloe, Michael “Trojans, Worms, and Spyware. A Computer Security Professional’s Guide to Malicious Code”, Elsevier Inc, 2005
Nazario, Jose “Defense and Detection Strategies against Internet Worms”, Artech House Computer Security Library, 2004
Skoudis, Ed, Zeltser, Lenny “Malware: Fighting Malicious Code”, Prentice Hall, 2003
Zesheng Chen, Lixin Gao, Chuanyi Ji “On Effectiveness of Defense Systems Against Worms”

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Essay about The Global Threat of Malicious Code

- The Global Threat of Malicious Code I. Introduction Malicious code is "Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality, integrity, or availability of an information system. 1 Today, as ubiquitous computing is fast becoming a reality and information systems are becoming a part of everything from mobile phones to cars, any threat to an information system represents a risk to hardware, software, data, and the users that depend on their confidentiality, integrity, and availability....   [tags: Internet Web Hackers]

Powerful Essays
6199 words (17.7 pages)

Malicious Code Essay

- Malicious Code Introduction "The wind of change came on 26th March in the form of an email cyclone called Melissa. Moreover, during 1999 numerous changes in the level of computer virus technology were seen," Armstrong (May 2000, p1). From an organisational point of view, societies around the world are just learning about the level of importance that computer security against virus attacks and the critical significance of cybercrime. Companies around the world lost vast amounts of time, money and resources due to the lack of defense systems and lack of knowledge....   [tags: Essays Papers]

Free Essays
1905 words (5.4 pages)

Computer Fraud and Abuse Act Essay

- ... He then transferred the information he found to an internet gossip site. He received 41 months in prison. The same sentence a child pornographer received that month. Another example of someone prosecuted using the CFAA is Keith Downey. Keith was 28 when he attacked PayPal servers. The sentence Keith received was a 15 year prison sentence. The same sentence that people who abuse children, and murder people because of gang activity receive. The CFAA is currently an issue. Many people want the CFAA reformed to this day....   [tags: internet, malicious code, virus]

Powerful Essays
868 words (2.5 pages)

Malware, Or Malicious Malware? Essay example

- Malware, or malicious malware has a significant impact in our society. Sophisticated malware, are on the rise against users, utility software and user applications especially for monetary profits. Some of the threats are stealing sensitive information like credit card numbers or copyrighted materials, spamming, impersonating and extorting money (ransomware). It is a cybercrime operated by crackers. Indeed, crackers are individuals who break into computers and networks for criminal purposes. Consequently, cyber security is a major concern of computing systems....   [tags: Security, Computer security, Computer virus]

Powerful Essays
881 words (2.5 pages)

Security Vulnerability of the World Wide Web Essay

- ... These types of attacks are also known as Persistent XSS Attacks or Type-I XSS attacks. Reflected XSS attacks occur when the injected script is reflected off the web server. The delivery of the attack is via an alternative path such as through email or via another website where the user engages with the malicious link. This allows the malicious code to catalyze the attack on the vulnerable website which reflects the attack back to the user’s browser. The browser executes the code because it believes it is from a trusted server....   [tags: internet safety, malicious content, XSS]

Powerful Essays
1840 words (5.3 pages)

Updates Over Security Software Essay

- Almost all information technology professionals, believe their ideas will be the most effective way to protect their computer networks and end users from viruses, Trojans, malware, and intrusion. Every day users expose themselves to security related concerns. Developers release patches and updates every day; these updates affect firmware, operating systems, application, and device drivers. With most users and devices connected to the Internet, security is a very important hurdle. In the battle against invasion the most important step is keeping all devices and subordinate applications up-to-date....   [tags: malware, world wide web, malicious apps]

Powerful Essays
1692 words (4.8 pages)

The Oath of Office and Code of Ethics Essay

- Abstract In today’s world there are many issues facing the criminal justice system. Some of these issues include police corruption, use of excessive and deadly force, pursuits, and deviance. The media influences public opinion and there is concern over the morality, and ethics of our public leaders. (DeShon, 2000) The criminal justice system has two neglected and important issues of integrity and truth; the oath of office and the code of ethics. (DeShon, 2000) In many agencies the impact these two issues have on our communities are not fully understood....   [tags: Ethics ]

Powerful Essays
1300 words (3.7 pages)

Static Analysis of a Source Code Essay

- Introduction The main purpose of performing a static analysis of a source code as far as web applications auditing is concern is to detect vulnerability. This article describes therefore an algorithm proposal that will be used to examine two main PHP source code potential vulnerabilities; LFI (Local File Inclusion) and RFI (Remote File Inclusion). The approach will be as follow, a de nition of the pat- tern used to nd such les function whose potential for abuse is very high as a result of having user inputs that are unhandled, is rst made....   [tags: Information Technology]

Powerful Essays
938 words (2.7 pages)

The Code of Professional Condut Essay

- The Code of Professional Conduct (CPC) was developed by the Veterinary Council of New Zealand (VCNZ) to protect the interests of the public by ensuring that veterinarians registered to practice in New Zealand are competent and fit to practice. The code also has standards in place to ensure that veterinarians comport themselves professionally, both with their clientele and colleagues; these colleagues are not only those in one’s workplace, but veterinary professionals throughout New Zealand. The CPC is set around 7 key principles: 1....   [tags: Veterinary Council of New Zealand, Veterinarians]

Powerful Essays
1666 words (4.8 pages)

Privacy Protection Through a Code of Conduct Essay

- In an effort to develop a viable privacy culture within the organization, the first step to achieve the enhancement of a culture of privacy protection within the department would be to develop a code of conduct. Based on the reality that such a code, usually referred to as a code of ethics is seen to be the basis of any ethics program it would only be prudent to institute the development of the same as a starting point. Such a code of conduct should be developed in such a manner as to be able to address previous unethical conducts within the department as well as project into the future so as to prevent future acts that would be unethical....   [tags: Organizational Issues]

Powerful Essays
880 words (2.5 pages)