logo

Malware Virus: Types, Analysis, and Prevention

14 Pages3926 Words1 Views
   

Added on  2023-01-17

About This Document

This document provides an in-depth understanding of malware viruses, including their types, analysis methods, and prevention techniques. It explores the life cycle of malware and the significance of reverse engineering in testing malware. The document also discusses the impact of malware attacks and offers insights into protecting your system.

Malware Virus: Types, Analysis, and Prevention

   Added on 2023-01-17

ShareRelated Documents
Malware Virus
Due Date: Tutorial, Week 6
Faculty: Science and Technology
Department: Computing & Technology
Module Code:
Academic Year: 2018/2019
Semester:
1
Malware Virus: Types, Analysis, and Prevention_1
Table of Content
1. Title Page
2. Table of Content
3. Executive Summary
4. Introduction
5. Methodology
5.1 Analysis
6. Implementation
6.1 Analysis of Malware Life cycle
6.2 Reverse Engineering Testbed
6.3 Static Analysis / Dynamic Analysis Tool
7. Summary / Recommendation
8. Reference
2
Malware Virus: Types, Analysis, and Prevention_2
Executive Summary
A computer program named as the virus affects the confidential data of a desktop by
infecting the stored files on it. A terminology virus is misunderstood by other kinds of
malware that affect the data stored on a computer. But two of the malware such as
adware and spy computer programs did not have its own generation ability. In a real
sense, a virus that infects information stored in the data from one pc to another in the
form of execution coding when the main computer is considered as the target. For
example, a user uses internet or CD, DVD, USB or a floppy disk in transferring data
from one pc to another that attracts virus from one computer to another.
When a user transfers the stored information from one pc to another then it will get
increases the chances of spreading the viruses to another desktop. This will get infect
the files shared from one server to another which increases the difficulty to access the
file. A computer virus is a very eye-catching term that attracts the attention of all the
users in knowing about this phrase that this consists of all the malware that does not
contain a re-generation feature. The term malware comprises of several viruses such
as viruses in the computer, worms, Trojan horses, rootkits, spyware and adware. All
these are a malicious program that affects the information in the computer as all these
are the unnecessary softwares spreads in the computers and infects its data.’
Worms malware in the computer affects the security of a desktop as this will target’
the weaknesses lies in the security of a computer which will directly spread to
different pcs by entering into its network lines. On another hand, Trojan horses
pretend as an unaffected malware but in reality, this carries the important files from
the computer and hides the malicious functions to infect the confidentiality of a
computer program (Niemelä, Hyppönen & Kangas, 2016). The difficulty for resource-
constrained IT departments gets increases in managing the multiple points by utilizing
the traditional endpoint security options.
Majority of the endpoint security protections options are not easy to put into action
and manage the same (Al-Saleh & Al-Huthaifi, 2017). Traditional endpoint
protections solutions utilize on a default allow mechanism which will allow a user to
3
Malware Virus: Types, Analysis, and Prevention_3
access the endpoint security systems to fights against the malware attacks on a
computer.
A unique solution that will spontaneously identify and overcome the unnecessary
software in the computer is referred to as Comodo Advanced Endpoint Protection.
This system will work secretly across all the endpoint security points without
affecting the end-user experience.
Introduction
Malware is any piece of software which is intended to cause harm to your system or
network. Malware is different from normal programs in a way that they most of them
can spread itself in the network, remain undetectable, cause changes/damage to the
infected system or network, persistence. They can bring down the machine's
performance to knees and can destroy the network. Consider the case when the
computer becomes infected and is no longer usable, the data inside becomes
unavailable these are some of the malware damage scenarios. Malware attacks can be–
traced back to the time, even before the internet became widespread. Below are some
of the malware attacks in history:
Melissa: Melissa was created and released by David L. Smith in the year 1999.
It was a macro virus embedded inside a word file. The file was posed to
contain passwords for various websites which made the people curious to open
it and execute the macro. Once executed the macro would resend the virus to
first 50 people in the users address book. The virus was later tracked back to’
the creator and Smith was sentenced to 10 years of prison time.
My Doom: My Doom was worm and not a virus. Hence it required no human
intervention to spread in the network. It was one of the fastest spreading email
worms in 2004. It was spread by spammers and contained a text. The malware
was initially supposed to be a variant of Mimail worm, but the theory was
rejected. It was named MyDoom basis the presence of the word doom in one
of the lines of the code. It affected companies like Google and Microsoft
causing damage in billions.
Stuxnet (2010): The destruction of a nuclear plant in Iran has occurred due to
the advanced malware system uses by a user named as Stuxnet. This had
entered the system through a USB stick and infected all the windows
machines; the code used a digital counterfeit certificate which helped to avoid
detection. Stuxnet travelled the network to check for control line systems
4
Malware Virus: Types, Analysis, and Prevention_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Malware Analysis Assignment PDF
|29
|6377
|378

Understanding Malware: Types, Detection, and Analysis
|12
|899
|33

Types of Malicious Software - PDF
|25
|4952
|204

Malware Trends: Good News and Bad News
|8
|1895
|24

Assignment on Risks and Risk Management
|11
|781
|13

COS30015 IT Security : Malware Analysis
|12
|4290
|62