Security Measures Against Trojan Horse Malware at Samsung Company
VerifiedAdded on 2023/06/03
|6
|1259
|61
AI Summary
This article discusses the Trojan horse malware and its potential to cause damage to computer systems. It also provides preventive measures to ensure that Samsung Company's computer systems are free from malware. The article suggests using strong passwords, avoiding pirating materials, and installing antivirus software. Additionally, biometric devices like fingerprint and facial recognition can heighten security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Security at Samsung Company
Student’s name
Institution Affiliation
Student’s name
Institution Affiliation
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Trojan horse
A trojan horse a malware that is disguised as legitimate software to cause damage to a computer
network or servers (Chakraborty 2017). It was developed by hackers to gain illegal access into a
targeted computer system and extract sensitive data. The virus is a programmed software that can
replicate in computer systems but they, however, don't replicate on themselves. They depend on
the end user of the computer to get installed into the system. It is programmed such that it tricks
the system users to be an innocent free download or an email attachment. It is however not
possible for the user to identify that the download program or the email attachment contains and
hidden programmed trojan virus. The virus attack is only noticed when the virus starts affecting
the computer system and its files.
When the users click on download the free program or email attachment, the trojan virus hidden
in the email attachment or the download is transferred to the user's computing device. Once it
gets inside the system, the attacker designer gain control over the system. The attacker can either
delete the data stored in the system, block the data transfer from the device to other users, modify
the already stored or even the data in transit and also make multiple copies of files within the
system.
Malware preventive measures
To ensure the computer system in Samsung company are free from any malware, it is essential to
consider the malware preventive measures. There are many preventive measures some of which
depend on a single user while others depend on the whole network under which various devices
operate. One of the best preventive measures is the user password setting (Crossler, Bélanger and
Ormond 2017). Within the company, there are any computers that connect and share files or
A trojan horse a malware that is disguised as legitimate software to cause damage to a computer
network or servers (Chakraborty 2017). It was developed by hackers to gain illegal access into a
targeted computer system and extract sensitive data. The virus is a programmed software that can
replicate in computer systems but they, however, don't replicate on themselves. They depend on
the end user of the computer to get installed into the system. It is programmed such that it tricks
the system users to be an innocent free download or an email attachment. It is however not
possible for the user to identify that the download program or the email attachment contains and
hidden programmed trojan virus. The virus attack is only noticed when the virus starts affecting
the computer system and its files.
When the users click on download the free program or email attachment, the trojan virus hidden
in the email attachment or the download is transferred to the user's computing device. Once it
gets inside the system, the attacker designer gain control over the system. The attacker can either
delete the data stored in the system, block the data transfer from the device to other users, modify
the already stored or even the data in transit and also make multiple copies of files within the
system.
Malware preventive measures
To ensure the computer system in Samsung company are free from any malware, it is essential to
consider the malware preventive measures. There are many preventive measures some of which
depend on a single user while others depend on the whole network under which various devices
operate. One of the best preventive measures is the user password setting (Crossler, Bélanger and
Ormond 2017). Within the company, there are any computers that connect and share files or
internet through the Wi-Fi connection. Sharing of the files or network among the computers can
lead to malware infection thus affecting the system. It is therefore essential for the company to
ensure the network is secured with a strong password. Broadcasting an open Wi-Fi connection or
an SSID should be avoided as it endangers the security to the system. The password can also be
strengthened by the use of either WPA or the WPA2.
The second malware preventive measure is think before click (Joshi et al. 2018). Malware
viruses such as the trojan horse enter and infect computer systems through clicking. It is,
therefore, important for the computer users within the organization to avoid any websites with
pirating materials. It is recommended that the users should not open an email attachment from
any other company or an individual without aware of its source. It is vital to hover over a link on
the internet to see where the link directs before making a click on the URL. The file downloaded
from an FTP site, internet, file sharing service, an email or any other source should be scanned
first before being run in the computer. This helps in identifying and removing any virus that can
affect other files in the company’s system. Although a good antivirus does the work
automatically, it is also essential to ensure that the scanning has been done.
Malware attacks can also be prevented by installing antivirus or the malware software in the
computers. An antivirus is responsible for checking of the security status of the computer system
through scanning, and if any virus found, the malware removes it (Golshan et al. 2017). The
company IT staffs should not assume that the computers are always safe without antivirus
software installed. Any computer system is prone to malware attacks, and this can be exempted
by installing antivirus software as it keeps computer free from virus. With this software, it is an
important step to ensure that it is always updated. This makes the software stronger such that it
lead to malware infection thus affecting the system. It is therefore essential for the company to
ensure the network is secured with a strong password. Broadcasting an open Wi-Fi connection or
an SSID should be avoided as it endangers the security to the system. The password can also be
strengthened by the use of either WPA or the WPA2.
The second malware preventive measure is think before click (Joshi et al. 2018). Malware
viruses such as the trojan horse enter and infect computer systems through clicking. It is,
therefore, important for the computer users within the organization to avoid any websites with
pirating materials. It is recommended that the users should not open an email attachment from
any other company or an individual without aware of its source. It is vital to hover over a link on
the internet to see where the link directs before making a click on the URL. The file downloaded
from an FTP site, internet, file sharing service, an email or any other source should be scanned
first before being run in the computer. This helps in identifying and removing any virus that can
affect other files in the company’s system. Although a good antivirus does the work
automatically, it is also essential to ensure that the scanning has been done.
Malware attacks can also be prevented by installing antivirus or the malware software in the
computers. An antivirus is responsible for checking of the security status of the computer system
through scanning, and if any virus found, the malware removes it (Golshan et al. 2017). The
company IT staffs should not assume that the computers are always safe without antivirus
software installed. Any computer system is prone to malware attacks, and this can be exempted
by installing antivirus software as it keeps computer free from virus. With this software, it is an
important step to ensure that it is always updated. This makes the software stronger such that it
can fight the virus attacking the system. Un-Updated antivirus software is considered to be weak
in fighting malware.
Biometric devices to heighten security
One of the biometric devices that offer security to the company is the fingerprint. This has highly
been used due to a higher level of security to any access compared to other measures such as the
use of a password which can be hacked. Fingerprints offer a zero probability of any illegal user
to access the system. None of the human beings have a similar fingerprint to the other, and the
system will only grant access to the only authorized person whose fingerprints were initially
taken and automated as the authorized system user (Gong, MacFarlane and Cyphort 2016).
Moreover, the company can use facial recognition to offer security to its properties. It helps in
identifying the suspects by providing a video of what took place from the beginning up to the
end of the scene. Having some of the facial recognition devices in the company such as the
CCTV cameras, it is, therefore, easier to ensure the security to the company and its property is
maintained. Through the CCTV, the company’s managers can monitor the progress of
operations in the whole working premise while at one room (Costin 2016, October). Any illegal
access is monitored therefore controlling the security of the entire company having sited at one
point.
in fighting malware.
Biometric devices to heighten security
One of the biometric devices that offer security to the company is the fingerprint. This has highly
been used due to a higher level of security to any access compared to other measures such as the
use of a password which can be hacked. Fingerprints offer a zero probability of any illegal user
to access the system. None of the human beings have a similar fingerprint to the other, and the
system will only grant access to the only authorized person whose fingerprints were initially
taken and automated as the authorized system user (Gong, MacFarlane and Cyphort 2016).
Moreover, the company can use facial recognition to offer security to its properties. It helps in
identifying the suspects by providing a video of what took place from the beginning up to the
end of the scene. Having some of the facial recognition devices in the company such as the
CCTV cameras, it is, therefore, easier to ensure the security to the company and its property is
maintained. Through the CCTV, the company’s managers can monitor the progress of
operations in the whole working premise while at one room (Costin 2016, October). Any illegal
access is monitored therefore controlling the security of the entire company having sited at one
point.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References
Chakraborty, S., 2017. A Comparison study of Computer Virus and Detection
Techniques. International Journal of Scientific Research in Computer Science, Engineering and
Information Technology, 2(1), pp.236-240.
Costin, A., 2016, October. Security of CCTV and video surveillance systems: threats,
vulnerabilities, attacks, and mitigations. In Proceedings of the 6th International Workshop on
Trustworthy Embedded Devices (pp. 45-54). ACM.
Crossler, R.E., Bélanger, F. and Ormond, D., 2017. The quest for complete security: An
empirical analysis of users’ multi-layered protection from security threats. Information Systems
Frontiers, pp.1-15.
Golshan, A., Gong, F., Jas, F., Bilogorskiy, N., Vu, N., Lu, C., Burt, A., Kenyan, M. and Ting,
Y., Cyphort Inc, 2017. Malware variant detection using opcode image recognition with small
training sets. Systems and methods for malware detection and mitigation, 8(3), pp.1005-1011.
Gong, F., MacFarlane, D., and Cyphort C., 2016. Detection techniques security threats. System
and Method for Threat Risk Scoring of Security Threats, 27(8), pp.2-10.
Joshi, S., Upadhyay, H., Lagos, L., Akkipeddi, N.S. and Guerra, V., 2018, April. Machine
Learning Approach for Malware Detection Using Random Forest Classifier on Process List Data
Chakraborty, S., 2017. A Comparison study of Computer Virus and Detection
Techniques. International Journal of Scientific Research in Computer Science, Engineering and
Information Technology, 2(1), pp.236-240.
Costin, A., 2016, October. Security of CCTV and video surveillance systems: threats,
vulnerabilities, attacks, and mitigations. In Proceedings of the 6th International Workshop on
Trustworthy Embedded Devices (pp. 45-54). ACM.
Crossler, R.E., Bélanger, F. and Ormond, D., 2017. The quest for complete security: An
empirical analysis of users’ multi-layered protection from security threats. Information Systems
Frontiers, pp.1-15.
Golshan, A., Gong, F., Jas, F., Bilogorskiy, N., Vu, N., Lu, C., Burt, A., Kenyan, M. and Ting,
Y., Cyphort Inc, 2017. Malware variant detection using opcode image recognition with small
training sets. Systems and methods for malware detection and mitigation, 8(3), pp.1005-1011.
Gong, F., MacFarlane, D., and Cyphort C., 2016. Detection techniques security threats. System
and Method for Threat Risk Scoring of Security Threats, 27(8), pp.2-10.
Joshi, S., Upadhyay, H., Lagos, L., Akkipeddi, N.S. and Guerra, V., 2018, April. Machine
Learning Approach for Malware Detection Using Random Forest Classifier on Process List Data
Structure. In Proceedings of the 2nd International Conference on Information System and Data
Mining (pp. 98-102). ACM.
Mining (pp. 98-102). ACM.
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.