logo

Crime-ware and Malware-Based Business Assignment

   

Added on  2020-03-16

12 Pages3635 Words89 Views
Crimeware andMalware-BasedBusiness

Crimeware and Malware-Based BusinessTable of ContentsIntroduction.................................................................................................................................................3Background of Crimeware and Malware.....................................................................................................3Recent Trends in Crimeware and Malware..................................................................................................4Types of Crimeware and Malware Activities..............................................................................................5Crimeware as an Organized Business..........................................................................................................7Conclusion...................................................................................................................................................9References.................................................................................................................................................112

Crimeware and Malware-Based BusinessIntroductionInformation is an integral part of the business organizations and is also of utmost significance forthe users. With the increase in the use of information and data sets, there are increased number ofrisks that have emerged in association with the information and network security. There arevarious agents and carriers that are associated with the occurrence of these risks and attacks. Oneof the widely occurring forms of these attacks is Crimeware and malware. With the occurrenceof the attacks, there are varied degrees of impacts that may result. These impacts may range fromthe low to severe degrees of impacts. The report describes the definition and meaning ofCrimeware and malware along with the description of the recent trends in the area of Crimewareand malware. The different types of the Crimeware and malware activities along with details onCrimeware as an organized business have been covered in the report. Background of Crimeware and MalwareThere are various forms of malevolent activities that are carried out by the attackers and hackers.One such activity that is illegal is termed as Crimeware. Crimeware is defined as an illegalactivity that is executed in an illegal manner and is done to cause damage to the party that isaffected. Some of the popular types of Crimeware include spyware, browser hijacking,keyloggers etc. Phishing kits have also been developed nowadays so that the phishing attacks canbe easily executed by the attackers that have little or limited technical knowledge (Snyder, 2015).Another form of such illegal security attacks are malware attacks. There are different types ofmalware that may be executed, such as, viruses, worms, Logic Bombs, spyware, ransomware,Trojan Horses etc. These are the malicious codes and programs that are written to cause damageto the systems or the networks on which the malware is launched. There may be a triggerrequired for the occurrence and execution of the malware. It may also be possible that themalware is caused without the need of a trigger. These malicious codes may or may not be self-replicating in nature; however, the impact that these codes have on the infected system can beextremely severe (Palmer, 2017). The primary motive of the attackers behind the execution ofthe malware attacks is to gain unauthorized access to the systems and the information and tocause damage to the affected party. 3

Crimeware and Malware-Based BusinessRecent Trends in Crimeware and MalwareThe trends in the area of Crimeware and malware keep on changing. Zombies which are alsoknown as botnets have started to impact a lot many systems in the present times. In this form ofthe security attack, Trojan viruses are used to infect the systems and the control of each of theinfected systems is taken. These systems are then connected in a network which is called as botand it is this bot which is then remotely controlled by the attacker. Cyber criminals tend to makesure that a larger network of computer systems get impacted and get covered in the network.These networks of hundreds and thousands of computer systems are then used to give shape tothe denial of service attacks or the distributed denial of service attacks. In this form of attacks,the availability of the systems is impacted (Welivesecurity, 2016). Trojan Horses are the malware that have the capability to impact a large number of systems andthe impact is also severe in nature. There are banking Trojan gangs that have emerged whichattempt to steal the banking details and information of the customers. These forms of malwareresult in legal obligations for the banks or the parties that are affected by the attack. Malware codes that are designed and executed have different forms but the goals of each of thesecodes are the same. These codes are designed to cause damage to the systems and theinformation channels along with the networks that are connected with the same. One of therecent forms of such attacks is the Point of Sale (PoS) malware. This is the malicious code thatattacks a particular business and the sales transactions that are executed in association with suchbusinesses (Scmagazine, 2017).Another form of malware attack is the ransomware attack. In this form of malware attack, theattackers gains unauthorized access and control to the system and the networks. As a result, theowner of the system are demanded to pay a ransom amount in return so that the control isprovided again. Recently, a ransomware attack was given shape by using worms as the malwareand the attack took place at a global level. It was termed as WannaCry and there were hundredsand thousands of systems that got impacted by the attack in over 150 countries. After theexecution of WannaCry, the attackers have been successful in creating many such attacks andoccurrences (Savage, 2015). Mobile devices and mobile applications are being increasingly used by the businessorganizations. These devices and applications are often the carriers as well as the victims of the4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(PDF) Study of Botnets and their threats to Internet Security
|8
|1126
|478

Malware Analysis Assignment PDF
|29
|6377
|378

Network Security: Protecting the Integrity and Usability of Networking Services and Data
|25
|1420
|50

Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management
|10
|3587
|73

Understanding SQL Injection, Insider Attacks, and Malware Threats for Enhanced Cybersecurity
|7
|2711
|157

Malware Analysis: Types, Prevention, and Task Analysis
|52
|8215
|322