Ask a question from expert

Ask now

Information Security Assignment | Trends in Malware

14 Pages2540 Words93 Views
   

Added on  2020-04-01

Information Security Assignment | Trends in Malware

   Added on 2020-04-01

BookmarkShareRelated Documents
Information Security Recent Trends in MalwarePage | 1
Information Security Assignment | Trends in Malware_1
Information Security Table of ContentsIntroduction....................................................................................................................................................................................Discussion.......................................................................................................................................................................................Challenges of Malware Trends....................................................................................................................................................Problems of Recent Malware Trends..........................................................................................................................................Relevant Technologies to control Malware Trends.....................................................................................................................Applications of Technologies......................................................................................................................................................Clarification of Vague Areas........................................................................................................................................................Research Questions.....................................................................................................................................................................Issues discussed in Selected Forum.............................................................................................................................................Issues that are not addresses in this Forum................................................................................................................................Impact of above discussed Issues on Real Life World.................................................................................................................Lesson Learnt from Discussion....................................................................................................................................................Conclusion.......................................................................................................................................................................................References......................................................................................................................................................................................Page | 2
Information Security Assignment | Trends in Malware_2
Information Security Introduction Nowadays, in every business organization and at other workplaces IT applications are used to perform different tasks quickly and appropriately. With the help of these applications information sharing, communication, storage and management of data have become so easy. While using these applications, each and every user wants protection and security of data from vulnerable virus attacks such as malware. This attack is very harmful for computer systems and networks and can destroy whole server that stores hefty amount of information. These cyber-attacks happens due to lack of information security both at developers and users end. Therefore, these security issue should be controlled by experts. The purpose of making this report is to emphasize on recent trends in malware which is a vulnerable virus and has become a big issue for IT users. The main concepts that I will cover in this report are challenges, problems, relevant technologies and its applications, interpretation regarding vague areas of malware and research questions. Discussion As compare to past days, now malware is widespread, sophisticated and ambiguous. Due to this, security techniques are struggling to control major impacts of malware. Recently, various new trends are encountered in malware that are listed as below:1.Increase in violence and dodging of Malware.2.Target attacks of malware are will give mass exploitation. 3.By using cloud apps, malware is dodging more consumers (Recorded Future, 2017).Page | 3
Information Security Assignment | Trends in Malware_3
Information Security Now further, in this segment of report, I will discuss above mentioned points in detail. Challenges of Malware Trends The above discussed potential trends of malware have caused several challenges to IT users. The main challenge is to maintain long term security and privacy of information. It means, there is requirement to have more advanced security tools to protect databases over network. Traditional tools are not so effective to control malware attacks. Another important challenge is detection of malware in computer systems or network. Very small virus programming scripts are used by cyber-criminals to spread virus into system that is too difficult to identify. In this case, without detection it is not possible to clean malware from system. Moreover, due to lack of users’ awareness, it becomes difficult for them to quickly understand impacts of malware and delay occur in getting solution. So it is necessary that users should be aware regarding these types of issues to get quick solution. Furthermore, improper usage of anti-virus, firewall and other security tools at users’ end is also achallenging factor to resolve at developers’ end because some users do not understand importance of using these tools (Tripwire, 2017). Problems of Recent Malware Trends The recent trends of malware have set forth many problems for users. The first problem is that new version of malware is vulnerable enough and by using this hackers can easily attempt an attack on databases. Besides this, problem of mobile-based users has also increased. As we knowthat mobile networks are sensitive as compare to broadband connections. Therefore, the usage old or new version of malware by attackers can easily hack information. Besides this, banking Page | 4
Information Security Assignment | Trends in Malware_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Demonstration of a Cyber Security Threat: Ransomware
|19
|815
|500

IT Security Risks and Securities of Ransomware
|14
|2848
|75

Cyber Security Attacks and Techniques
|14
|1105
|277

Report on Recent and Current Trends in Malware
|13
|2836
|266

Security threats in cloud computing and preventive methods
|9
|2288
|116

Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
|9
|2240
|285