Saturday, April 27, 2019
Profit Implications of Malware Annotated Bibliography
Profit Implications of Malw be - Annotated Bibliography ExampleA calculator worm refers to a self-replicating computer program. It relies on computer network to send copies of itself to other computers on the network in an automatic manner. Worms are known to exploit a zero-day vulnerability that bothows them to execute their copies within the same network (Effects of Malware Infections Avoid the Dangers of Malware Programs ). at that place are several types of worms these are The internet Relay chew the fat worms that exploit the Internet Relay Chat (IRS) unlike the Instant messenger worm that exploit the IM channel. The web or internet worm spreads via exploiter access to a web page, file transfer protocol or by use of other internet sources. We also have the file-sharing (Peer-to-peer) worm that copies itself into a shared folder, it then use its peer-to-peer mechanism to invite its existence known with the hope that a exploiter will download it. As for the flash variety show these refers to the theoretical worms that spread within seconds upon activation to all vulnerable hosts on the internet.A fifth column long horse is a non-self-replicating type of malware that tends to perform normal beneficial functions for the user though it facilitates unauthorized access to the users computer system. Recently Trojan horse is released as payloads by computer worms that give the attackers wide-eyed control of the dupes personal computer (Effects of Malware Infections Avoid the Dangers of Malware Programs ). There are several factors that make Trojans dangerous, first of all Trojans are not visible in the traditional process viewer. including windows and task managers, this coupled with the fact that roughly virus and Trojan scanners find it difficult detecting the Trojan code. Also the Trojan code is really difficult to unload hence making it hard cleaning it. The most common type of Trojan is the proxy Trojan that once it attacks the victims computer i t turns it into a proxy server (Zombie) which then operates on behalf of the distant attacker. This makes it even more difficult tracing the attack to the attacker as the trail often leads to the victim in most cases. A rootkit is a software system that is composed of several of one or more computer programs that are designed to hide the fact that a computer system has been compromised. usually an attacker
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.