Preview

Malware

Good Essays
Open Document
Open Document
601 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Malware
MALWARE

There are several methods that a computer may become damaged or corrupt. These threats are known as malicious software, or malware. If your computer is not secure with software that protects your computer, such as an anti-virus or anti-malware program, you may be risking your personal information or files created from being accessed or deleted without your knowledge. Malware may be so damaging that it can cause a company, like Amazon, to lose millions of dollars if it causes its website to shut down. Attackers will also use different methods to try and have the malware installed into a computer. The more popular known malware are viruses, worms, Trojan horses, and spam. However, there are other forms of malware which are just as dangerous. A very hard type of malware to detect is called a rootkit. This form of malware will conceal itself within the operating system code to hide itself from detection. Rootkits may also hide itself within other programs. When installed, the attacker will now have access to the infected computer and view any file or carry out other attacks from the computer. This can be especially damaging if a company was infected as the information being obtained can be sold and danger the company’s reputation.
Some methods used to install malware are by way of e-mail, social engineering, and direct access to a computer. With so much pirated software, music, and movies available on the internet for download, attackers may use this to their advantage by allowing someone to download through a sharing program and have malware hidden within its contents. This method is known as drive-by downloads. The malware hidden may be anything from a virus, a worm, adware or spyware. “Torrents” are infamous for having pirated files and having other hidden contents within the file.
Another form of attack used to have malware installed is pop-up downloads. They are being more widely used. When a website is visited, a pop-up message or page



Bibliography: Holcombe, Jane and Charles Holcombe. Survey of Operating Systems 3rd Ed. New York: McGraw-Hill, 2012. Windows lifecycle fact sheet. 2012. 06 11 2012 <http://windows.microsoft.com/en-US/windows/products/lifecycle>.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    14) What term describes a malicious software program that users are tricked into running? A) Trojan horse…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    File Sharing worms – worms that are programmed to replicate themselves through peer-2- peer (P2P)j file sharing networks, such as KaZaA, Frostwire, Morpheus, etc.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3445 Unit 4 Lab

    • 556 Words
    • 2 Pages

    Criminals often use social engineering along with vulnerabilities in applications such as web browsers or email clients to trick users into installing malicious code on their computer.…

    • 556 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Computer program that can copy itself and infect a computer. The term ‘computer virus’ is sometimes used as a catch-all phrase to include all types of malware, including true viruses.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Malware Lifecycle

    • 463 Words
    • 2 Pages

    Next we will discuss malware what it is and how it affects us. Malware is any kind of unwanted software that is installed without your adequate consent. Viruses, worms, and Trojan horses are examples of malicious software that are often grouped together and referred to as malware. Cybercriminals sometimes try to trick you into downloading rogue (fake) security software that claims to protect you against malware. This rogue security software might ask you to pay for a fake product, install malware on your computer, or steal your personal information. To protect yourself from Malware it is important to do some of the following: make sure automatic updating is turned on to get all the latest security updates. Keep your firewall turned on. Don't open spam email messages or click links on suspicious…

    • 463 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cyp 3.3, Task 7

    • 1343 Words
    • 6 Pages

    A child or young person may unknowingly download viruses and malware; a programme that can attach itself to another programme, if this is opened through a spam email it can then damage or create files and generate unwanted behaviour to your computer.…

    • 1343 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Satisfactory Essays

    ur mama

    • 659 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    is adware really malware

    • 305 Words
    • 2 Pages

    Like malware or spyware, adware is usually downloaded without the user’s knowledge by attaching itself to the primary program you are choosing to run. The adware sticks itself to your computer and shows up when you run the freeware on your computer or mobile device. Adware is even able to break through your computer's basic security. Without a really strong anti-virus software, adware may install itself without the prior agreement of the user when you are browsing the internet.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays