Report on Recent and Current Trends in Malware

Added on - 07 Apr 2020

  • 13

    pages

  • 2836

    words

  • 34

    views

  • 0

    downloads

Showing pages 1 to 4 of 13 pages
Running head: RECENT TRENDS IN MALWARERecent Trends in MalwareName of the StudentName of the UniversityAuthor’s note
1RECENT TRENDS IN MALWAREExecutive SummaryThe aim of this report is to discuss about the recent and current trends in malware. It gives a clearoverview of the various kinds of malware attacks that can take place. It describes about thechallenges that are faced due to malware attacks. It discusses the role of USB and Internettechnology in the spread of malware attacks. This report also discusses about the issue regardingransomware attacks and its impact on the society. At the end this report talks about the lessonslearnt regarding prevention of malware attacks.
2RECENT TRENDS IN MALWARETable of ContentsIntroduction..........................................................................................................................3Discussion............................................................................................................................3Malware and its Types.....................................................................................................3Recent Trends in Malware...............................................................................................5Challenges and Problems.................................................................................................7Relevant Technologies and its Applications in Malware................................................8Issues Discussed..............................................................................................................8Important Issues that are not addressed and its impact....................................................9Important Lessons............................................................................................................9Conclusion.........................................................................................................................10References..........................................................................................................................11
3RECENT TRENDS IN MALWAREIntroductionMalicious software can be defined as a kind of deliberate security risk or threat. Thedeveloper of such software has malicious intention. If a system is infected with a malicious codethen the system will get damaged and lose all its data (Uscilowski, 2013). Malware has severalcapabilities that include but is not limited to denial of operations, exploitation of vulnerabilitiesas well as gaining access to other system in an unauthorized manner.This report gives a clear overview of the recent and advanced trends in malware. Itdiscuses about different kinds of malware that are existing in the market at present. It also gives aclear idea about all the technologies that are relevant in this context. It also discusses about theproblems and challenging factor in malware attacks. This report figures out the important issuesand its impact on the society. It gives a clear explanation of the lessons that have been learntfrom the entire discussion about recent malware trends.DiscussionMalware and its TypesMalware or malicious codes can be considered to be one of the most harmful anddangerous security threats in this era of ICT (Wang, Streff & Raman, 2012). In malware attacksthe malicious program is entered into a system for the purpose of gaining unauthorized or illegalaccess to valuable and sensitive information. The main motto of the malware developers is toearn money or harm the users intentionally. There are several types of malware as follows:Virus: Virus is an executable program that has the capability to run or execute on anysystem without any permission. The execution process is carried on secretly so that the system
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document