logo

Information Security Assignment Sample (pdf)

   

Added on  2021-06-16

10 Pages3084 Words33 Views
Information Security
Information Security Assignment Sample (pdf)_1
ContentsAbstract:................................................................................................................................................2Introduction...........................................................................................................................................2Research Aim........................................................................................................................................1Research Objective................................................................................................................................1Research Questions...............................................................................................................................1Literature Reviews.................................................................................................................................1Research Gaps.......................................................................................................................................4Future Research Scope..........................................................................................................................5Conclusion.............................................................................................................................................6References.............................................................................................................................................6
Information Security Assignment Sample (pdf)_2
Title: Malwares Past, Present, and FutureAbstract:Millions of transactions are carried out in the fraction of seconds in the digital world which opens a door for cyber-criminal to hack the confidential information of the user. Every premise on the internet is coping up with the threat of attacks. Malware are the malicious software which can get associated with the software code of the application software to disrupt the functioning and modify and manipulate the data. The effective countermeasures should be prepared for coping with the future malware designed for the future of technological world. The literature review is performed to analyse the past, present, and future growth of the malwares which can adversely affects the functioning of the android applications.Keywords: Malware, Counter measure. Dynamic softwareIntroductionThe digital revolution has increased the threat to the attacks of malware and viruses. Every premise on the internet is coping up with the threat of attacks. Malware are the malicious software which can get associated with the software code of the application software to disrupt the functioning and modify and manipulate thedata. These malicious software are intentionally get attached by the hacker in the software to adversely affect the computer system. The malware attacks were recently grows with the development in the field of mobile phones and other electronic gadgets. The innovation of the smart phones connects the user with the global world. With the few clicks, the user can fulfil their requirement with the availability of digital market. The malwares are the biggest threat in the global market. The inclusion of the third party in the transaction process can result into the spreading of the malwares attack from the global electronic platform. The literature review is performed to analyse the past, present, and future growth of the malwares which can adversely affects the functioning of the electronic applications. The attackers take advantage of the electronic application for the spreading of the malware in the global market. The malwares are comprised of various types of viruses and worms such as Trojan horse,spyware, ransom ware, and others. These malicious programs are developed by the
Information Security Assignment Sample (pdf)_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security: Protecting the Integrity and Usability of Networking Services and Data
|25
|1420
|50

ITC595 - Information Security
|3
|3044
|93

Cyber Threats and Countermeasures in Financial Institutions
|3
|793
|490

Machine Learning for Fraud Detection Literature Review 2022
|12
|3319
|20

Understanding Access Control in Cyber Security
|24
|9360
|80

Cyber Security Name of the Student Name
|13
|2638
|440