IMAT5262 Research, Ethics & Professionalism: Viruses and Worms Attacks

Verified

Added on  2021/06/16

|28
|4390
|18
Project
AI Summary
This project proposal provides a detailed overview of computer viruses and worms, highlighting their impact on computer security and privacy. It addresses the increasing threat of cybercrimes facilitated by advancements in programming and explores the different types of viruses and worms, including polymorphic, boot sector, macro, file, multi-partite, email, internet and IRC worms. The proposal outlines research questions focusing on identifying virus and worm types, methods of protection, and removal techniques. Additionally, it discusses how viruses spread, symptoms of infection, and preventative measures, along with the harms caused by worms, such as identity theft and spam channels. The methodology section will review different research methodologies to use in the project. Appendices include a project plan, ethical review form, and consent form.
Document Page
MSc Information Systems Management
IMAT5262 Research, Ethics
& Professionalism in
Computing
Assignment - Project Proposal
Attacks on Software
through Viruses and
Worms
Pxxxxxxxx
De Montfort University
DO NOT INCLUDE YOUR
NAME AS THE WORK WILL
BE ANONYMOUSLY MARKED
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Abstract
In the present era of computer and communication technology, it has been observed that
computer security and privacy has been compromised over the last few years. Additionally,
the developments in the programming field have introduced a lot of expediencies to various
walks of life however they have as well produced cyber hackers and techniques to perform
computer related crimes at a great extent. In addition, at the present, computer viruses and
worms are considered as a very serious computer security threat. This report will present a
detailed overview of computer viruses and worms.
Key Words
Virus, Worm, Computer Crimes, ……..
1
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Table of Contents
1. Background...................................................................................................................3
2. Research questions......................................................................................................4
3. Literature Review..........................................................................................................4
3.1 Types of Computer Viruses...........................................................................................4
3.1.1 How virus spread.....................................................................................................5
3.1.2 Symptoms of Computer Virus................................................................................6
3.1.3 Methods of virus removal........................................................................................7
3.1.4 How to protect against virus...................................................................................7
3.2 Types of Computer Worms............................................................................................8
3.2.1 Harms of Computer Worms....................................................................................9
3.2.2 How to Protect Against Worms?............................................................................9
3.2.3 How to remove Computer Worm..........................................................................10
3.3 Difference between virus and worm...........................................................................10
4. Methodology Review...................................................................................................10
5. Conclusion................................................................................................................... 12
6. References................................................................................................................... 12
7. APPENDICES............................................................................................................... 13
Appendix (A): Project Plan................................................................................................13
Appendix (B): Ethical Review Form....................................................................................0
Appendix (C): Consent Form...............................................................................................5
Appendix (D): Pilot study.....................................................................................................7
2
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
1. Background
A virus is a computer program that affects other computer programs by replicating itself.
Additionally, a virus has the capability to duplicate itself by activation, with the intention that
it is able to grow, always looking for latest host platforms. The majority risk-free viruses
carry out operation in a way that they make their copies as well as extend to more computers.
In addition, a computer virus code may perhaps affect additional computer software or it can
totally change the data, conceivably self-devastating as performed. However, the only proof
computer virus similar to this is the devastation they have caused on the affected PCs. Just
because of this capability it becomes extremely hard to offer protection beside virus
programs.
Moreover, during the last few decades, it is observed that computer viruses have been in
action with the development of computer technology. A virus is perceived as “a self-copying
computer code or program which multiplies by copying it into further documents or .exe
files.” Similar to an actual virus, a computer virus changes the system of an available
computer program to “control” it as well as starts its replication. Frequently computer viruses
have a special task or attention, for example removing definite data files or causing harm to a
computer system.
A computer worm is a type of infection which has the capability to extend itself to one or
more computer systems with no need to be transmitted as an element of a host message.
Additionally, a computer worm has the potential to destroy the hosted data on a computer,
practical performance, or affect network utilization, at the moment it gets run. In most cases a
worm does not really damage either the computer programs or hardware, as a minimum in
assumption. In addition, at the present, mostly PCs are linked to the local area networks and
web based technology like internet, helping the distribution of wicked programs. In addition,
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
a number of sources utilize a substitute term in which a virus is declared as some type of self-
duplicating malware program. Most well-known examples of worms comprise Melissa,
Sobig, ILoveYou, Sasser and MyDoom worm.
2. Research questions
(i) What are the different types of computer viruses and worms?
(ii) How do we protect our computers, networks or systems from computer viruses
and worms?
(iii) How do we remove viruses and worms from infected computers, networks and
systems?
3. Literature Review
3.1 Types of Computer Viruses
There are many types of viruses, some of which comprise:
Polymorphic viruses: Polymorphic viruses alter their form with every attack. Additionally,
these types of encrypted viruses are typically hard to perceive as they are superior at
concealing themselves from anti-virus programs (Conklin,arthur et al., 2018).
Boot Sector Viruses: These viruses are the oldest kind of virus. The influence of these
viruses is observed on startup programs of computer and the virus activates itself with the
startup of computer. Boot sector viruses are the type of viruses that spoil the boot sector
(known as master boot record) of an infected system. These viruses initially change or over-
write the actual boot code, by swapping it with devastated boot code. They will then move
the actual boot sector data to an additional hard disk sector, then declaring that particular disk
sector like a spoiled mark on the storage disk with the intention that it will become useless for
future (Conklin, White, Williams, Davis, & Cothren, 2016).
4
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Macro Viruses: This kind of viruses utilizes commands known as macros those are fixed in
further computer programs to cause harm and extend to additional related files used by that
definite computer program. For example Microsoft applications such as Word and Excel use
macros, and macros viruses are able to grow through the utilization of these certain
commands.
File Viruses: File viruses have the capability to join themselves to further computer software
programs. As the program is executed, the file virus makes its way to the memory locations
so that it could be able to affect other executable files or start destructing the computer
system (Easttom & Taylor, 2011).
Multi-partite viruses: These viruses affect both .exe files and boot sector of hard disk. They
are the nastiest types of viruses since they are able to merge a few or all of stealth virus
methodologies, through polymorphism practice to avert its exposure to various antivirus
programs.
Stealth viruses: These types of viruses try to conceal from both the operating system
capabilities and antivirus program. However, to perform this activity, they have to reside in
computer memory so that they could be able to interrupt every effort to employ the operating
system (Easttom, 2016). Additionally, a stealth virus is able to conceal alterations it usually
creates to directory framework, file sizes, and further features related to an operating system.
Because portion of the virus stays in memory, resultantly users will experience less memory
usage.
3.1.1 How virus spread
Few cases which spread viruses are:
5
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
(i) A person installs game software to use it on a PC that someone has copied from a
home computer system. So without user knowledge, the game software was
already infected with a virus code (Gollmann, 2011).
(ii) Computer viruses as well spread by means of downloading malicious programs
over the internet.
(iii) A program acquired from a seller in agreement cover is spoiled since the actual
consumer had attempted to use the software on an infected computer.
(iv) Virus is extended by offering an infected storage media to a user.
(v) Someone provides us a disk consequently we are able to test the latest software.
(vi) Virus is spread by means of host files which are attached to an electronic mail as
well as transmitted over the web based technology like internet (Gregory, 2015).
3.1.2 Symptoms of Computer Virus
There are a number of prime factors that reveal that a computer system has been infected with
a virus program. Some of them are outline below: (Walker, 2013)
(i) The computer system works slowly as compared to the normal cases.
(ii) The computer system doesn’t take action, we may experience that it locks up
regularly.
(iii) The computer system hangs, and after that it begins to restart with regular
intervals.
(iv) Disks become unreadable and show various error messages.
(v) Software programs installed on the system do not execute accurately.
(vi) We observe extraordinary operating system related error messages.
(vii) We notice vague operating system dialog boxes.
6
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
(viii) Application software vanishes as of the machine albeit we did not deliberately
uninstall the software (Hess, 2015).
3.1.3 Methods of virus removal
Once a computer is infected with virus, it is important to remove the virus from the system so
that the system may work properly and without bugs. However, confiscating a computer virus
program is regarded as a complicated job lacking the support of computer virus deletion
programs (Walker, 2013). For facilitating the process of virus removal, it is necessary that we
keep our computer system up-to-date with the newest windows and antivirus updates, fixes,
antivirus tools, and patches as well as we must be aware about the most modern threats and
vulnerabilities, run our computer system as a regular user (not like an administrator), and
afterward we have to take into account a security policy while we use the internet, download
multiple files, and send files over the network. When we come to know that our system has a
virus, its category or the way it came to our system is not much significant like deleting it and
applying proper policies to stop its entrance into your system (In Munir, 2017).
3.1.4 How to protect against virus
In order to attain maximum security against viruses, we should have to consider the following
steps:
(i) On a Microsoft platform such as Windows we should have to turn the windows
firewall on as it helps to defend against unwanted interruption from external
network (Brown, 2011).
(ii) We should use most updated version of operating system.
(iii) We should utilize updates and approved antivirus programs such as Microsoft
Security Essentials, G-Data Antivirus, and Kaspersky etc.
(iv) We should utilize updated antispyware program on our machine.
7
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
3.2 Types of Computer Worms
File-sharing Networks Worms: A shared folder is used to hold the replication of this worm;
almost certainly this folder is placed on the local computer. Then the replica of the worm is
added into the shared folder with the name of file that looks to be secure. At this time the file
sharing worm is prepared for download using the Peer to Peer network as well as makes the
continuous sharing of infected file over the network (Kanopy (Firm), 2014).
Email Worms: In this type worm distribution is performed using sullied messages of
electronic mail. In this scenario, any type of website link or attachment within an email
message might include a degraded website link (Walker, 2013).
Internet Worms: These worms are considered as the malevolent worms. These worms will
scrutinize the entire accessible resources of the network with the help of neighboring OS
services or look into the wireless network like internet for defenseless computers. These
vulnerable computer systems then attempt to connect in order to obtain full control over these
computers (Kizza, 2015).
IRC Worms: In this type of worm chatting channels are the prime objective as well as the
similar distribution or contagion technique is employed like I have mentioned earlier i.e.
transferring tainted files or besmirched websites links (Stallings & Brown, 2015). In this
scenario, transmitting an infected file is considered as less successful since the receiver needs
to validate delivery, save the received file and open the file earlier than the infectivity will
occur on the computer.
Instant Messaging Worms: In IM worms the distribution is performed using instant
messaging application programs by transferring violated website connection to each one
8
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
whining the local contact list. The technique selected to send the link matters a lot in this type
of worm spreading (Kizza, 2017).
3.2.1 Harms of Computer Worms
Identity Theft: A large number of worms have been developed to duplicate on a computer
with the purpose of stealing that computer information and returning all this valuable
information to a user.
Spam Channels: A number of computer worms execute with the intention to share web
proxies’ information to a user at inaccessible site. This user is able to afterward "capture" our
email message otherwise Internet access as well as employ this information to send a spam to
the host websites that participate in illegitimate actions (Lehtinen & Sr, 2011).
Disturbing harms: Similar to any other task of stealing or destruction, these types of worm
not only take control of private resources and time to repair any harm, but as well makes the
casualty experience exposed and insecure.
Destruction and Data Decay: A few worms are planned to basically or erratically offer
destruction during their replication on a computer, as well as damage or remove vital data and
information on a computer (Stallings & Brown, 2015).
3.2.2 How to Protect Against Worms?
Computer worms those extend via weaknesses in network services could excellently be
defended by installing most modern patches offered by operating systems (Stallings &
Brown, 2015). This comprises computer worms for instance SQL Blaster and SQL Slammer.
On the other hand computer worms those extend like Trojan horses are able to superbly be
defended by deleting unwanted emails or not to download any electronic mail attachment.
These attachments include more than executable files. In this scenario, Microsoft Word and
9
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Excel files include macros which can provide huge harm to the data and information lying on
a specific computer (Mohanta, Velmurugan, & Hahad, 2018).
3.2.3 How to remove Computer Worm
At present, there exist a number of highly developed spyware remover programs those have
the potential to examine the computer in the same manner antivirus program carries out the
scanning process. In addition, these programs’ widespread signature databases are able to as
well distinguish and delete harmful computer worms and related nasty codes. The dominant
and most leading antispyware software like that Ad-Aware SE, eTrust PestPatrol, Microsoft
AntiSpyware Beta, SpyHunter, and Spyware Doctor are recognized as extremely reliable
worm detection and deletion tools. Moreover, these software programs have the capability to
strongly detect malicious type of computer worms and spywares and then remove them from
the computer (Panko & Panko, 2015).
3.3 Difference between virus and worm
The major difference between a virus and a worm is that a virus needs a user to execute it on
a computer which activates it to offer damages and troubles, whereas a computer worm
distributes as well as brings about a lot of harm without any involvement of a person. Thus
more generally, for our system to be affected through a computer virus code, we usually have
to perform a task, for instance open an infected file, even as by means of computer worms
our computer system is able to be collapsed yet we don’t execute any software or open an
email attachment (Pantels, 2017).
4. Methodology Review
SECTION 1 - REVIEW
10
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Questionnaire is a strategy for information accumulation that is both subjective and
quantitative; contingent upon the kind of inquiries utilized. It is subjective once open-finished
inquiries are utilized while it is quantitative once close-finished inquiries. The information
from respondents is regularly dissected utilizing programming, for example, SPSS (Statistical
Package for the Social Sciences) that is custom worked to investigate such information.
Questionnaires, once finished, are submitted for examination through a few methods. The
most prevalent is the utilization of a scale or record, because of its effortlessness (Ramírez,
2017).
The initial phase in breaking down questionnaire information is to make a basic lattice that
examines every one of the information in the questionnaire. The lattice is valuable since it
makes it less demanding to store, and in the meantime translate, the information from the
questionnaire. The lattice is typically inquiries against the reactions from the respondents.
Outlining a basic coding framework takes after straightaway. The framework is reliant on the
sort of inquiries utilized as a part of the examination. On account of shut inquiries, a
straightforward numerical scale is utilized. The scale utilized as a part of the questionnaire
will likewise be utilized as a part of the lattice. Amid the coding method, there ought to be
recompense for missing information or respondents choosing different classifications
(Piessens & Viganò, 2016).
SECTION 2 – SELECTION
In this research, Online Survey will be the methodology that will be utilized. This will be
done by creating an account with SurveyMonkey and then designing a survey. After
designing a complete survey then a web link is generated. This web link is sent via SMS,
email or any chat services that my target population can use. They will be required to click on
the link and in less than five minutes fill in the questions.
11
chevron_up_icon
1 out of 28
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]