Recent Trends in Malware Name of the Student Name of the University
Added on 2020-03-23
13 Pages2780 Words336 Views
Running head: RECENT TRENDS IN MALWARE
Recent Trends in Malware
Name of the Student
Name of the University
Author’s note
Recent Trends in Malware
Name of the Student
Name of the University
Author’s note
1RECENT TRENDS IN MALWARE
Executive Summary
This report discusses about the recent trends of the malware attacks that are taking place in this
era of technology. Malware attacks have become a serious security threat and a major concern
for the people. There are several types of malware attacks like viruses and ransomware. This
report has described the recent malware attack called WannaCry attack that took place in the
month of May, 2017. This report gave an overview of the challenges that are faced and the
relevant technologies like USB and Internet that play a major role in the malware attack. This
report also discussed about the lesson learnt regarding prevention of malware attacks.
Executive Summary
This report discusses about the recent trends of the malware attacks that are taking place in this
era of technology. Malware attacks have become a serious security threat and a major concern
for the people. There are several types of malware attacks like viruses and ransomware. This
report has described the recent malware attack called WannaCry attack that took place in the
month of May, 2017. This report gave an overview of the challenges that are faced and the
relevant technologies like USB and Internet that play a major role in the malware attack. This
report also discussed about the lesson learnt regarding prevention of malware attacks.
2RECENT TRENDS IN MALWARE
Table of Contents
Introduction..........................................................................................................................3
Discussion............................................................................................................................3
Malware and its Types.....................................................................................................3
Recent Trends in Malware...............................................................................................4
Challenges and Problems.................................................................................................7
Relevant Technologies and its Applications in Malware................................................8
Issues Discussed..............................................................................................................8
Important Issues that are not addressed and its impact....................................................9
Important Lessons............................................................................................................9
Conclusion.........................................................................................................................10
References..........................................................................................................................11
Table of Contents
Introduction..........................................................................................................................3
Discussion............................................................................................................................3
Malware and its Types.....................................................................................................3
Recent Trends in Malware...............................................................................................4
Challenges and Problems.................................................................................................7
Relevant Technologies and its Applications in Malware................................................8
Issues Discussed..............................................................................................................8
Important Issues that are not addressed and its impact....................................................9
Important Lessons............................................................................................................9
Conclusion.........................................................................................................................10
References..........................................................................................................................11
3RECENT TRENDS IN MALWARE
Introduction
Malware or malicious software is a type of deliberate security threat. It has been designed
by the attacker with a malicious intention. Malware can harm and damage the system or network
in which it is injected (Uscilowski, 2013). Malware is capable of disrupting or denying
operations, exploiting vulnerabilities and gaining unauthorized access to the victim’s system. In
this era of ICT, malware threats are increasing at a fast pace. The developers of malware are
finding various advanced techniques for preventing or bypassing detection.
This report discusses about the recent trends in malware. It gives an overview about the
various types of malware that are present in the current market. This report also discusses about
the relevant technologies that play a major role in malware attacks and also figure outs its
application. This report discusses about the missed out issues that are not given much
importance. It also gives a brief explanation about the significance of these issues. This report
also talks about the lessons that are learnt from the recent trends in malware.
Discussion
Malware and its Types
Malware is one of the most important and harmful security threats in the present
generation (Wang, Streff & Raman, 2012). It is a malicious code that is injected in a system to
gain unauthorized access to sensitive and valuable data in order to gain money or harm the user.
There are various types of malware like:
Introduction
Malware or malicious software is a type of deliberate security threat. It has been designed
by the attacker with a malicious intention. Malware can harm and damage the system or network
in which it is injected (Uscilowski, 2013). Malware is capable of disrupting or denying
operations, exploiting vulnerabilities and gaining unauthorized access to the victim’s system. In
this era of ICT, malware threats are increasing at a fast pace. The developers of malware are
finding various advanced techniques for preventing or bypassing detection.
This report discusses about the recent trends in malware. It gives an overview about the
various types of malware that are present in the current market. This report also discusses about
the relevant technologies that play a major role in malware attacks and also figure outs its
application. This report discusses about the missed out issues that are not given much
importance. It also gives a brief explanation about the significance of these issues. This report
also talks about the lessons that are learnt from the recent trends in malware.
Discussion
Malware and its Types
Malware is one of the most important and harmful security threats in the present
generation (Wang, Streff & Raman, 2012). It is a malicious code that is injected in a system to
gain unauthorized access to sensitive and valuable data in order to gain money or harm the user.
There are various types of malware like:
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Report on Recent and Current Trends in Malwarelg...
|13
|2836
|266
Understanding SQL Injection, Insider Attacks, and Malware Threats for Enhanced Cybersecuritylg...
|7
|2711
|157
Crime-ware and Malware-Based Business Assignmentlg...
|12
|3635
|89
Malicious Software Protection Policylg...
|6
|1728
|181
Cyber Security Managementlg...
|14
|2652
|374
IT Security Risks and Securities of Ransomwarelg...
|14
|2848
|75