logo

ITC595 - Information Security

   

Added on  2021-06-15

3 Pages3044 Words93 Views
ITC595 Research Project (Malware: Past, Present &Future)Name of StudentName of University ABSTRACTMalware is basically a kind of malicious softwarewhich damages, disrupts, gains access of a computer and stealsimportant data from the victimized computer. There are varioustypes of malwares like ransomware, adware, botnets, spyware andso on. The history of malware dates back in 1949. Since thenmalwares have modified in to various forms like ransomware andadware. The first android malware was found in the year 2010 as afake windows media player which was a malicious fake link and itaffected several android devices. The recent malware that hitalmost 300000 computers worldwide was “wanna cry” ransomwarewhich spread in the year 2017. Apart from this IOT botnet is a hugethreat in today’s world (Arp et al., 2014). Many attacks were doneusing the botnet named “Mirai”. The malwares distributed throughmalvertising is also a new trend of spreading of malware, somekeyloggers, spywares also spread the malvertising (Sanz et al.,2013). Financial malware, point of scale malware is slowlyspreading. Android malware started from a “Trojan” that used tosend SMS to best services, apart from the worry and authorizationby the user to complicated code that can possibly infectauthenticated applications, encrypt data using symmetric-keyencryption (AES), circulate via the official Android play store. Thechallenges of malware are to stop it from spreading through varioustrusted sources of downloading software and upgrading theantivirus according to the latest malware vulnerabilities. The topichas been chosen for research because it is one of the most buzzingtopic in the world of cyber-security and ethical hacking. Theresearch has huge scope to understand the trend of malware infuture.KeywordsMalware, Malware history, futuristic malware,current malware scenarioINTRODUCTIONThe development of the digital trends and techniques havechanged the world and has offered significant benefit to theusers. The mass surge in the adoption of the digital industry isciting as an evident for the benefits it has offered. The mostprominent factor of the digital industry is the internet whichcan be considered as the most revolutionary innovation of theera. It has enabled the people to connect and communicatewith other users that are geographically away from them in aninstance. The internet has and even is acting as a platform fordifferent innovations. In the current scenario a majorpopulation of the earth are associated themselves with theinternet and it has developed given birth to a major problemfor the digital industry. The discussed challenge is malwarethat is abbreviation for malicious software.A.Research Problem The subject, malware stands for an extensive meaning thatcontains ransomware, computer viruses, spyware, botnet andseveral other tools or techniques that can interrupt in thecomputing process within it. The threat offered by the subjectis prominent because the most crucial activities are conductedthrough the computing services (that includes computer,servers, smart devices and other necessary means) and it alsoacts storage for the private and confidential data. The halt orhijacking of the computing systems can be result in greatchallenges for the individual, organisation, country or even thewhole world and hence, it is necessary to mitigate the deemchallenge as soon as possible.B.Research Justification The first step in devising a strategy to mitigate the discussedchallenge would be to earn a deep insight into the subject.Keeping the former statement in mind the discussed paper willattempt at gaining an insight into the past, present and futureof the subject. The paper will achieve its objective byreviewing the literature works from the past and present andwill conclude the paper by summarizing all the findings.LITERATURE REVIEWAccording to Suarez-Tangil, Tapiador, Peris-Lopez &Ribagorda, (2014), smart devices are equipped with featuressuch as powerful computing, sensing and capabilities ofnetworking that leads to malwares. The author describes thatsmart devices has features of incorporating external or thirdparty applications that leads to security issues as theapplications may be malicious ha According to Rudd, Rozsa,Günther & Boult, (2017), the professional, financial and socialaspects of an individual has given rise to digital world. This hasresulted in more targets for malware to attack. The malwaresare characterized as viruses, Trojan, rootkits, worms and othermalwares. These software are used to harm the maincomputer, compromise the access controls, steal data andbypass computer functions. Advertisements and pop up ads are some commonexamples of adware. Sometimes adware are provided withfree software. These bundled adware often act as a revenue-generating tool and sometimes they come preloaded withspywares (What Is Malware? (Malware Definition) - Lifewire,2018). The spywares are used for stealing information andtracking the activity of the user. For perform specific functions automatically, softwareprograms known as bots are used. Bots are used in videogames, online contests and internet auctions but often theyare used for malicious purposes. They are used for DDosattacks with the help of botnets and as spambots. Sometimesthey are used to capture server data with the help of wenspiders (Malware Detection in Cloud ComputingInfrastructures, 2018). To prevent these bots, some websitesuse the mechanism of CAPTCHA to determine if the user idactually human.Bugs are another type of Malware that has existed since the90s. These are flaws in the compiler or source code thatrenders undesired outcomes. These remain undetected andcan cause the system to freeze or crash. Some bugs are

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Malware Trends: Good News and Bad News
|8
|1895
|24

Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management
|10
|3587
|73

Malware Analysis Assignment PDF
|29
|6377
|378

Malware and their Analysis
|6
|2946
|81

Security Concerns of Ransomware
|13
|2895
|140

Malware: Types, Analysis Techniques, and Prevention
|13
|4069
|89