Information Security Assignment | Trends in Malware
14 Pages2540 Words93 Views
Added on 2020-04-01
Information Security Assignment | Trends in Malware
Added on 2020-04-01
BookmarkShareRelated Documents
Information Security Recent Trends in MalwarePage | 1
Information Security Table of ContentsIntroduction....................................................................................................................................................................................Discussion.......................................................................................................................................................................................Challenges of Malware Trends....................................................................................................................................................Problems of Recent Malware Trends..........................................................................................................................................Relevant Technologies to control Malware Trends.....................................................................................................................Applications of Technologies......................................................................................................................................................Clarification of Vague Areas........................................................................................................................................................Research Questions.....................................................................................................................................................................Issues discussed in Selected Forum.............................................................................................................................................Issues that are not addresses in this Forum................................................................................................................................Impact of above discussed Issues on Real Life World.................................................................................................................Lesson Learnt from Discussion....................................................................................................................................................Conclusion.......................................................................................................................................................................................References......................................................................................................................................................................................Page | 2
Information Security Introduction Nowadays, in every business organization and at other workplaces IT applications are used to perform different tasks quickly and appropriately. With the help of these applications information sharing, communication, storage and management of data have become so easy. While using these applications, each and every user wants protection and security of data from vulnerable virus attacks such as malware. This attack is very harmful for computer systems and networks and can destroy whole server that stores hefty amount of information. These cyber-attacks happens due to lack of information security both at developers and users end. Therefore, these security issue should be controlled by experts. The purpose of making this report is to emphasize on recent trends in malware which is a vulnerable virus and has become a big issue for IT users. The main concepts that I will cover in this report are challenges, problems, relevant technologies and its applications, interpretation regarding vague areas of malware and research questions. Discussion As compare to past days, now malware is widespread, sophisticated and ambiguous. Due to this, security techniques are struggling to control major impacts of malware. Recently, various new trends are encountered in malware that are listed as below:1.Increase in violence and dodging of Malware.2.Target attacks of malware are will give mass exploitation. 3.By using cloud apps, malware is dodging more consumers (Recorded Future, 2017).Page | 3
Information Security Now further, in this segment of report, I will discuss above mentioned points in detail. Challenges of Malware Trends The above discussed potential trends of malware have caused several challenges to IT users. The main challenge is to maintain long term security and privacy of information. It means, there is requirement to have more advanced security tools to protect databases over network. Traditional tools are not so effective to control malware attacks. Another important challenge is detection of malware in computer systems or network. Very small virus programming scripts are used by cyber-criminals to spread virus into system that is too difficult to identify. In this case, without detection it is not possible to clean malware from system. Moreover, due to lack of users’ awareness, it becomes difficult for them to quickly understand impacts of malware and delay occur in getting solution. So it is necessary that users should be aware regarding these types of issues to get quick solution. Furthermore, improper usage of anti-virus, firewall and other security tools at users’ end is also achallenging factor to resolve at developers’ end because some users do not understand importance of using these tools (Tripwire, 2017). Problems of Recent Malware Trends The recent trends of malware have set forth many problems for users. The first problem is that new version of malware is vulnerable enough and by using this hackers can easily attempt an attack on databases. Besides this, problem of mobile-based users has also increased. As we knowthat mobile networks are sensitive as compare to broadband connections. Therefore, the usage old or new version of malware by attackers can easily hack information. Besides this, banking Page | 4
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Demonstration of a Cyber Security Threat: Ransomwarelg...
|19
|815
|500
IT Security Risks and Securities of Ransomwarelg...
|14
|2848
|75
Cyber Security Attacks and Techniqueslg...
|14
|1105
|277
Report on Recent and Current Trends in Malwarelg...
|13
|2836
|266
Security threats in cloud computing and preventive methodslg...
|9
|2288
|116
Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guidelinelg...