logo

Recent Trends in Malware Name of the Student Name of the University

   

Added on  2020-03-23

13 Pages2780 Words336 Views
Running head: RECENT TRENDS IN MALWARE
Recent Trends in Malware
Name of the Student
Name of the University
Author’s note
Recent Trends in Malware Name of the Student Name of the University_1
1RECENT TRENDS IN MALWARE
Executive Summary
This report discusses about the recent trends of the malware attacks that are taking place in this
era of technology. Malware attacks have become a serious security threat and a major concern
for the people. There are several types of malware attacks like viruses and ransomware. This
report has described the recent malware attack called WannaCry attack that took place in the
month of May, 2017. This report gave an overview of the challenges that are faced and the
relevant technologies like USB and Internet that play a major role in the malware attack. This
report also discussed about the lesson learnt regarding prevention of malware attacks.
Recent Trends in Malware Name of the Student Name of the University_2
2RECENT TRENDS IN MALWARE
Table of Contents
Introduction..........................................................................................................................3
Discussion............................................................................................................................3
Malware and its Types.....................................................................................................3
Recent Trends in Malware...............................................................................................4
Challenges and Problems.................................................................................................7
Relevant Technologies and its Applications in Malware................................................8
Issues Discussed..............................................................................................................8
Important Issues that are not addressed and its impact....................................................9
Important Lessons............................................................................................................9
Conclusion.........................................................................................................................10
References..........................................................................................................................11
Recent Trends in Malware Name of the Student Name of the University_3
3RECENT TRENDS IN MALWARE
Introduction
Malware or malicious software is a type of deliberate security threat. It has been designed
by the attacker with a malicious intention. Malware can harm and damage the system or network
in which it is injected (Uscilowski, 2013). Malware is capable of disrupting or denying
operations, exploiting vulnerabilities and gaining unauthorized access to the victim’s system. In
this era of ICT, malware threats are increasing at a fast pace. The developers of malware are
finding various advanced techniques for preventing or bypassing detection.
This report discusses about the recent trends in malware. It gives an overview about the
various types of malware that are present in the current market. This report also discusses about
the relevant technologies that play a major role in malware attacks and also figure outs its
application. This report discusses about the missed out issues that are not given much
importance. It also gives a brief explanation about the significance of these issues. This report
also talks about the lessons that are learnt from the recent trends in malware.
Discussion
Malware and its Types
Malware is one of the most important and harmful security threats in the present
generation (Wang, Streff & Raman, 2012). It is a malicious code that is injected in a system to
gain unauthorized access to sensitive and valuable data in order to gain money or harm the user.
There are various types of malware like:
Recent Trends in Malware Name of the Student Name of the University_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report on Recent and Current Trends in Malware
|13
|2836
|266

Understanding SQL Injection, Insider Attacks, and Malware Threats for Enhanced Cybersecurity
|7
|2711
|157

Crime-ware and Malware-Based Business Assignment
|12
|3635
|89

Malicious Software Protection Policy
|6
|1728
|181

Cyber Security Management
|14
|2652
|374

IT Security Risks and Securities of Ransomware
|14
|2848
|75