Cyber Security Report: Adware, Executable Programs, and User Risks

Verified

Added on  2023/06/01

|4
|838
|113
Report
AI Summary
This report delves into the risks associated with adware and executable programs within the realm of cyber security. It identifies various sources of unwanted software installation, including malicious websites and third-party installations, and discusses the threats posed by programs such as viruses, worms, and Trojan horses, which can lead to data breaches and information leakage. The report highlights the legal complexities of adware, differentiating between unwanted programs and malicious software, and emphasizes the user's responsibility in safeguarding their systems through the use of antivirus software and cautious downloading practices. Additionally, the report touches upon the philosophical concept of humans as image bearers of God, linking ethical behavior and intrinsic human value to the protection of digital integrity. It stresses the importance of ethical conduct, responsible software usage, and the reflection of core values to mitigate cyber threats and maintain data security.
Document Page
Cyber Security
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1 | P a g e
Cyber security
There are various sources through which unwanted software gets installed on a user machine
by the mean of developer and the other is via sites that are not authenticated. Theses
unwanted programs come from various sources or gets installed using third party user.
Unwanted program gets installed in the system by various gateways and silently performs
activities like monitoring the actions, reading the files or listening to the communication
(Urban, Tatang, Holz & Pohlmann, 2018). In this report some the detail is carried about the
adware’s and that human are image bearer of god.
The type and risks associated with executable programs and adware to the user are discussed.
The risk associated with executable programs and adware is that they breach the confidently
and integrity of data. There are chances that information gets leaked and is modified by the
unauthorised user. The types of such programs are viruses, worms and Trojan horse. These
are the types due to which false ads occur on the computer screen. These programs hijack the
ads that are created by other computers by replacing it with their own ads. They are unwanted
software’s that tracks the activities that are performed on the browser and report this on a
central server (Urban, Tatang, Holz & Pohlmann, 2018). These adware’s are considered legal
as some companies use it as an antivirus so that activities could be blocked. It is legal as it is
not malicious software it is an unwanted programs. It is a not illegal but if used in a negative
way can harm the system and security concern (Birajdar, et. al, 2015).
There are possibilities that users download the software from any sources, the software or
program can be unwanted that can have negative impact on the system. Once I downloaded
software from a source that was not authenticated, once I downloaded and installed that
software in the system there were negative impacts on the system (Ismael, Yie, Manni, Amin
Document Page
2 | P a g e
& Mahbod, 2014). Like some of my important files gets corrupted and the system
performance gets degraded. The blame of these activities is of the user as they should
download antiviruses and other soft wares so that viruses could be removed from entering the
system. Thus, it is recommended that downloads should not be made from any unauthorised
sites as it can cause security breach and chances of information leakage (Ismael, Yie, Manni,
Amin & Mahbod, 2014).
Humans are considered as God's image bearer as they develop their dignity and values by
doing the rights things and following the right direction. The value of human life is intrinsic
as it is derived from image of god. The basic idea behind this is that the image of god
underlies the dignity, worth and value of human being (Windowcluv, 2016). It means
offering an individual about his creator. It is true that as an image bearer allow human to have
intrinsic dignity and value as it comes by the value they reflect. Performing some bad and
evil activities is attacking on god’s creation or saying wrong about god image. As image-
bearers, humans reflect God’s glory in a way like mirror (Art lindsley, 2016). Humans are
finite beings incapable of fully reflecting the image of an infinite creator although; it may
remain incorrectly and indistinctly due to sin and limitations.
Document Page
3 | P a g e
References
Art lindsley. (2016). What You Need to Know about Being Made in God’s Image. Retrieved
from https://tifwe.org/what-you-need-to-know-about-being-made-in-gods-image/.
Birajdar, M. N. D., Dhuppe, M. M. N., Hegade, M. T. M., Jadhav, M. N. S., & Shelar, M. M.
D. (2015). Review Paper On Adware Detection Using Instruction Sequence
Generation. International Journal of Engineering and Techniques, 1(6).
Ismael, O. A., Yie, S., Manni, J., Amin, M., & Mahbod, B. (2014). U.S. Patent No.
8,793,787. Washington, DC: U.S. Patent and Trademark Office.
Urban, T., Tatang, D., Holz, T., & Pohlmann, N. (2018, September). Towards Understanding
Privacy Implications of Adware and Potentially Unwanted Programs. In European
Symposium on Research in Computer Security (pp. 449-469). Springer, Cham.
Windowcluv. (2016). Potentially Unwanted Programs and how to avoid installing PUPs.
Retrieved from https://www.thewindowsclub.com/potentially-unwanted-programs-
pup.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]