logo

Malware and their Analysis

6 Pages2946 Words81 Views
   

Added on  2022-11-10

About This Document

This research project deals with the present, future and past of the malware. It covers various sections including an overview of the technology, relevant technologies used in the malware and gaps in the literature.

Malware and their Analysis

   Added on 2022-11-10

ShareRelated Documents
INFORMATION SECURITY 0
MALWARES AND THEIR ANALYSIS
Malware and their Analysis_1
INFORMATION SECURITY 1
Abstract- Malware can be defined as malicious
software or attachments or files that are spread across
the internet via various websites and also via email
attachments. The malware is associated with the data
loss, network breach and spyware in the systems of
the individuals and affects the computers and
networks across a wide range. The malware consists
of various kinds of viruses, worms, and Trojans
which might affect the individual's computers and
might damage important credentials. The malware in
the past was only associated with limitations of the
services of the network or computer and also with the
decrease in their operating speeds. However, the
present malware is more harmful and they provide
greater risks for the computer infrastructures. The
viruses nowadays can spread by itself and also can
multiple themselves without any human intervention.
This causes various problems in computers and can
permanently damage their information. The malware
in the modern world is mainly spread via the internet
and they affect the customers through email
attachments. When the users download the
attachments, the viruses affect the hardware as well
as the software parts of the system and sometimes the
viruses are programmed to multiply by itself, which
causes more problems. However, the future malware
is more focused on the spyware and ransomware and
they want ransom by locking down entire servers or
networks until the ransom are given. With the use of
more complex encryption techniques, the malware
are getting more complex and also harder to decrypt.
Thus this research project deals with the present,
future and past of the malware.
Keywords: malware, decrypt, internet
and so on.
Introduction
Malware is a kind of program which is harmful to the
computer systems because it helps the attackers for
accessing the personal data of the consumers without
their permission. The malware program is
able to perform hacking-related activities in the
computer devices and helps the attackers for
accessing the computing devices used by the
companies. The significance of this paper is to
identify the concept of malware and evaluate the
impacts of malware on the personal data of the
companies [1]. There are various kinds of malware
used in computer devices, for example, Trojan
horses, spyware, and computer viruses and so on. All
these malware are able to perform numerous
functions including encrypting or blocking
consumer’s data, hacking the accounts of the
consumers, reducing the performance of computer
devices, and so on. This report will cover several
sections for example; an overview of the technology,
relevant technologies used in the malware and gaps
in the literature.
Overview of the malware
It is computing software which is capable to access
the personal databases of the companies. It is
identified that malware utilizes numerous physical
and virtual means in order to spread malware which
infects computing devices and systems used by the
companies. Using the concept of malware the hackers
can easily perform security threats and risks in the
companies and reduce the effectiveness of the
computer devices [2]. It is identified that malware
programs may be transferred from one device to
another using the internet, mails and other resources.
The major issue faced by the companies is traffic
signals which are mainly developed by hackers using
malware tools. It is true that the utilization of
unauthorized networks in the computer systems can
lead the data breach problems in the companies.
From the previous study, it is found that malware is
any software that is mainly intended to cause injury
to a processor, client and computer devices. The
major significance of the malware is that it supports
the hackers for performing data breach issues and
reduces the effectiveness of the computing networks.
Malware and their Analysis
Malware and their Analysis_2
INFORMATION SECURITY 2
Arp, et al., (2014) argued that malware is often
created by teams of attackers that looking for
collecting the private data of the consumers.
Using the traffic signals developed by malware tools
helps the criminals to collect the accounts details of
the consumers including ID, passwords and profile
pictures that can easily detect in less time. The lack
of security is a major problem linked with computer
networks and malware is able to produce financial
issues in the business communities. From previous
literature, it is found that malware is a file mainly
delivered over the computing network which infects,
steals and explores any nature a hacker wants. The
key characteristic of malware is that it provides a
remote control for the hackers in order to utilize an
infected machine and send spam from the infected
machine for blocking the communication networks.
Relevant technologies used in malware
There are various kinds of technologies and networks
used in the malware which are described below:
Virus
It is a part of the malware attack which is a
communicable agent of minor size and humble
composition which may multiply only in alive cells
of bacteria or plants. In the context of malware, its
impact on computer networks and devices and reduce
the effectiveness of the developed systems [3]. It is
observed that many hackers use malicious tools in
order to collect the individual data of the consumers
and viruses are able to block the computing networks
linked with the IT systems.
Applications
Security attacks
Producing problems in the computer
systems
Spyware
It is another major technique used in the hacking that
collects sensitive information and passes it on to third
party servers without taking the permission of the
consumers. The term spyware is also defined as
Trojan viruses that are capable to handle and evaluate
the hacking related problems in the companies. In the
last two years, the rate of spyware has increased by
45% because of their capability to perform the
security attacks and help the hackers for accessing
the private databases of the companies without taking
their permission [4].
Applications
Accessing data of the consumers
Reducing the performance of the networks
Fake security software
In the context of fake security, the hackers produce
the third party networks and software that helps the
attackers to detect the data of the consumers
effectively. Such kind of technology poses as
legitimate computing tools in order to trick enter into
the computer systems used by the companies.
Moreover, such kind of process provides personal
information to the hackers and blocks the
communication channels used by the business
communities [5].
Application
Performing hacking related issues
Browser hijacking software
Such kind of computing technologies used in the
malware for performing the security issues in the
computer devices and help the hackers to detect the
personal information of the companies [6]. Mainly,
browser hijacking software changes the browser
setting of computer devices including home pages
and toolbars and collects the searching history and
saved passwords through malware tools.
Applications
Perform data breach issues
Helps for blocking communication channels
Challenges and issues linked with malware
A data breach is a major problem linked with the
malware software that may be performed by
transferring the unauthorized networks and unwanted
signals to the computer servers. It is observed that
more than 67% of the companies are suffering from
the malware and DDOS attacks that negatively
impact on the computer networks and servers of the
companies [8]. It is observed that the rate of
cybersecurity attacks are growing day by day that
impacts on the privacy of the sensitive data of the
clients and produces breach issues in the
organizations [5].
Recent literature identified that the denial of service
is one of the largest attacks that occurred in the
systems that have the capability to reduce the
effectiveness of the systems and produce the hacking
related problems in the computing devices [12]. It is
true that lack of privacy is the biggest issue linked
with the computing networks and systems and
malware helps the criminals for accessing the
sensitive data of the consumers. Moreover, malware
attack produces unwanted signals and traffic
Malware and their Analysis_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ANALYSIS OF MALWARES.
|3
|446
|97

Malware Analysis: Types, Prevention, and Task Analysis
|52
|8215
|322

Cyber Crime: Types, Impact, and Prevention
|6
|1317
|227

Information Security Assignment Sample (pdf)
|10
|3084
|33

Computer Security Report 2022
|14
|3515
|48

ITC595 - Information Security
|3
|3044
|93