Preview

Malware and Its Effects on Privacy and Security

Powerful Essays
Open Document
Open Document
1677 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Malware and Its Effects on Privacy and Security
MALWARE AND ITS EFFECTS ON COMPUTER PRIVACY AND SECURITY

The Internet is a system of interconnected networks able to continually amplify its range of sites surpassing its predecessor, the ARPANET (Advanced Research Projects Agency) which was developed by the American military in the 60’s (Abbate, 2000). It has progressed, with the social and economic aspect of its use becoming complex, with illegal activities reaching even the depths of cyberspace – “cybercrime” and the culprits, the “cybercriminals”, have appeared. One cybercrime is malware writing. From mere pranks and the need to establish a reputation among adolescents at school or at work, the goal of malware writing has then changed into the goal of acquiring large sums of money in short time spans, i.e. organized crime and terrorist groups through extortion and the like, and the realization of companies of efficient strategies for advertising scam products (Bocij, 2006) or for harmless purposes like marketing statistics (http://en.wikipedia.org/wiki/Malware). The malware writer creates malware which destroys data and locates and sends back sensitive information. With most people likely to be infected, malware have become one of the most common online security risks causing adverse effects on computer privacy and security. The aim of this report is to discuss malware, its most common variations, its effects on computer privacy and security, and those who are most likely at risk of malware infection.
Malware, derived from the term “malicious software”, is a term used to associate all software applications that cause damage or destruction to systems, computers, networks, and the like (Brown, 2011). The most common kinds of malware are spyware, adware, virus, and spam.
The spyware is a type of malware installed on computers designed to discretely

You May Also Find These Documents Helpful

  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Powerful Essays

    From the year 2000 to 2010, the users’ on the Internet has escalated to approximately five times its original users. The Internet provides a variety of services in which its users transmits large amounts of proprietary and personal data. The increase in Internet users and the vital data transmitted has enticed criminals to use the internet to obtain vital information. This is done through the use of malicious traffic. Malicious traffic can be defined as Internet traffic used to compromise a system and/or to conceivably impair the privacy of consumers data stored on the system or the person working on the system itself. Security experts has documented "67,000 new malware threats on the Internet daily in the first quarter of 2011, resulting from more than 45 new viruses, worms, spyware and other threats" (Department of Commerce (DOC), 2011). Malicious traffic plays a key role in the challenges faced in the economics of information security. Economically speaking, malicious traffic…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    References: Hinde, Stephen. "Spyware: The Spy In The Computer." Computer Fraud & Security 2004.12 (2004): 15-16. Academic Search Premier. Web. 15 June 2013.…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Better Essays

    Computer program that can copy itself and infect a computer. The term ‘computer virus’ is sometimes used as a catch-all phrase to include all types of malware, including true viruses.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Hale, Chris. (2002). Cybercrime: Facts & Figures Concerning the Global Dilemma. Crime and Criminal Justice, vol. 18, no.65, pp.5-6, 24-26.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Generally, the majority of the viruses are bundled up with outsider software to make the downloading and installation of pernicious program less demanding. It is likewise appropriated through phishing sites, undesirable taps on suspicious links and ads and pop-ups, opening spam emails messages or its related attachments, visiting dubious sites and porn sites. You can likewise infect your Windows System when you share your documents over peer to peer network. Hackers utilize some strategy to earn profit on the web. Installing plug-in, toolbar, add-on and expansions without thinking about it additionally lead to installation of TrafLab…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Malware, Spyware & Adware

    • 2084 Words
    • 9 Pages

    Malware is new genre of hostile software, written in a high level language. Normally they target technical vulnerabilities in the system. Spyware, adware, Trojans, virus, worms are very common form of Malware prevalent on the Internet. It propagates through emails, IM and other web services. It can be categorized into criminal and business malware. Criminal malware is used in cyber terrorism and vandalism; while business malware is used for business/monetary benefits.…

    • 2084 Words
    • 9 Pages
    Better Essays
  • Best Essays

    CyberCrime Motivation

    • 1610 Words
    • 5 Pages

    Kshetri, N. (2010). The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives. New York: Springer.…

    • 1610 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Spyware

    • 2744 Words
    • 11 Pages

    As a matter of fact, it is obvious that we are facing one of the most dangerous threats from the Internet and knowing how to prevent computers from being infected spyware is essential. This paper, with the purpose of providing computer users with basic knowledge of spyware, analyses different aspects of spyware, including the definition, ways to infects computers, effects and solutions to get rid of it.…

    • 2744 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Cyber threats

    • 1844 Words
    • 8 Pages

    WORMS Worms, viruses, and Trojan horses are three forms of malware, or malicious software, which attack computer systems. The latest Symantec Internet Security Threat Report identified over 1.6 million instances of “malicious code” (worms and viruses) in 2008, a 165% increase over 2007. A worm is a program that copies itself repeatedly into a computer’s memory or onto a disk drive. Sometimes it will copy itself so often it will cause a computer to crash. Among some famous worms are Code Red, Nimda, Klez, Sasser, Bagle, Blaster, Sobig, and Melissa. The 2002 worm Klez, dubbed the most common worm ever, spread its damage through Microsoft products by being inside email attachments or part of email messages themselves, so that merely opening an infected message could infect a computer running Outlook or Outlook Express. The Sasser worm was estimated to account for 26% of all virus infections in the first half of 2004. Incredibly, one person, Sven Jaschan, 18, who admitted programming the Sasser and other worms and who was arrested in Germany in May 2004, was responsible for 70% of the virus infections in the early part of that year.…

    • 1844 Words
    • 8 Pages
    Better Essays
  • Good Essays

    The Legality of Spyware

    • 949 Words
    • 4 Pages

    Cited: Malware Analysts Cookbook and DVD: Tools and Techniques for Fighting Malicious Code. John Wiley & Sons, 2010. Print. This book contains information on malware and how one can protect their selves. Goes into depth about removing malware.…

    • 949 Words
    • 4 Pages
    Good Essays

Related Topics