StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

How Malware Infects a Computer - Essay Example

Cite this document
Summary
The author of the present essay "How Malware Infects a Computer" points out that Malware refers to malicious software that is used to disrupt the normal functioning and operations of a computer. The software gathers sensitive information and gains access to private computers…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
How Malware Infects a Computer
Read Text Preview

Extract of sample "How Malware Infects a Computer"

Malware Malware Malware refers to malicious software that is used to disrupt the normal functioning and operations of a computer. The software gathers sensitive information and gains access to private computers (Sikorski & Honig, 2012). Malwares can appear as scripts, codes or active content. Some of the most common malware include computer viruses, spyware, ransomware, scareware and adware. Most of the active malware threats are Trojans and worms (Bayuk, 2010). Some malware may be disguised as genuine software, which is supplied through official company website.

Malware may also be supplied as an attractive or useful program. In this case, the malware is used to track and gather statistics and information. Characteristics of Malware Malware have the ability to run without being shutdown, detected or deleted. Malware such as Adware has a privacy invasive characteristic. In this case, the malware displays, plays and downloads advertisements automatically. Malware such as Backdoor have secure remote computer access characteristics. In this case, they can circumvent regular authentication processes (Aquilina, Casey & Malin, 2008).

How Malware Infects a Computer Malware usually infect a computer through executable software. They target a system without the authorization or consent of a user. Running a software or system that is infected by a malware provides opportunities for the malware to spread. A malware needs a user to run an infected system or program in order to facilitate its spread to other executables (Dunham & Abu-Nimeh, 2009). For instance, the Valentine’s Day virus is spread when a user opens an email that has been infected with the virus (Skoudis & Zeltser, 2004).

Users are usually compelled to open these emails because they have enticing messages. The aim of the virus was to spread in the computer and capture financial and personal information. References Aquilina, J. M., Casey, E., & Malin, C. H. (2008). Malware forensics: Investigating and analyzing malicious code. Burlington, MA: Syngress Pub. Bayuk, J. L. (2010). CyberForensics: Understanding information security investigations. New York: Humana Press. Dunham, K., & Abu-Nimeh, S. (2009). Mobile malware attacks and defense.

Burlington, Mass: Syngress. Sikorski, M., & Honig, A. (2012). Practical malware analysis: The hands-on guide to dissecting malicious software. San Francisco: No Starch Press. Skoudis, E., & Zeltser, L. (2004). Malware: Fighting malicious code. Upper Saddle River, NJ: Prentice Hall PTR.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“How Malware Infects a Computer Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
How Malware Infects a Computer Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1648223-malware-essay
(How Malware Infects a Computer Essay Example | Topics and Well Written Essays - 250 Words)
How Malware Infects a Computer Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1648223-malware-essay.
“How Malware Infects a Computer Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1648223-malware-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF How Malware Infects a Computer

The Love Bug Virus

There are different kinds of a virus and each of them has a THE LOVE BUG VIRUS The Love Bug Virus Affiliation Explain the difficulty of creating a computer virus and discuss the frequency with which this happens.... reating a computer virus requires extensive programming skills.... Additionally, a computer virus is a kind of malware that can vary in harshness and damaging a system from causing slightly disturbing effects to destructing software programs or data and resulting denial-of-service (DoS) attacks....
2 Pages (500 words) Case Study

Malware and how it affects the system and the Victim also how it get into a Victim machine

The Ongoing Malware Threat: how malware infects Websites and Harms Businesses —and What You Can Do to Stop It.... A malicious software (in short Malware) is an illegitimate software that is designed and programmed by persons who want to gain access to other private computer systems, gather sensitive information and or disrupt the working of computer systems.... Over the last years, malware has… become a dominant feature within the computer systems and is not isolated to particular places but on the contrary, it is spread all over the globe (Reavis, 2012). Malicious software in general refer to a variety of software which are intrusive or even hostile and includes such MALWARE A malicious software (in short Malware) is an illegitimate software that is designed andprogrammed by persons who want to gain access to other private computer systems, gather sensitive information and or disrupt the working of computer systems....
2 Pages (500 words) Essay

Investigating Dynamic Malware Analysis Tool

Malware has evolved into a more lethal threat by use of multiple vectors to launch attacks and exploit both unknown and known computer vulnerabilities and can infest prescanned files and folders with lightning speed.... It will be expedient to equip scanners for the detection of… However, the current malware detection scanning techniques have serious limitations.... Since the pattern or the signature is obtained from a familiar malware, this detection technique is easily evaded by obfuscating a program such as junk insertion and packing (Mishra, 2010)....
4 Pages (1000 words) Research Proposal

The Analysis of the Security Policy

Malwares refer to types of software whose installation into a computer leads to the performance of undesired tasks.... There are many malware… Some of the serious damages and loses that could happen to a computer due to antivirus, spyware, and adware invasion include data loss, sharing In addition, certain malware programs are meant to transfer information regarding website activities to third parties (Vacca, 2013).... A spyware automatically gathers information from a computer and online activities and transfers it to other interested parties....
4 Pages (1000 words) Assignment

Mariposa Botnet and How It Works

urther, a computer virus normally differs from a botnet.... One computer can connect to a botnet in order to get files located in another botnet member's computer.... When infected by the malware, the computer is now like a zombie of the malware creator.... The malware culprit obeys the malware creator's instructions to hand in the personal data or information of the computer unit's owner or user.... When the computer owner gives instructions to the computer, the computer refuses to comply with the computer owner's instructions (Thompson, 2009)....
7 Pages (1750 words) Coursework

Malware Hiding and/or Spreading on Mobile Devices

This paper can be very useful to any person who wants to be acquainted more about the security of their mobile devices, it gives guidelines on how to prevent persona devices from being attacked and as how to deal with the threats associated with malware and another virus… Use of mobile devices has risen rapidly in the previous years.... Some organizations and even individuals store some very confidential data n the mobile devices This paper is very significant as it discusses various issues such as the different types of malware, the ways that malware infection can get into the mobile devices....
4 Pages (1000 words) Book Report/Review

Protecting against Serious Threats against Computer Systems and Networks

The author of the paper "Protecting against Serious Threats against computer Systems and Networks" states that we are no longer safe in this world we live in.... Even our computer systems are no longer safe.... We must stop these ruthless acts against our computer systems and say no more!... QUESTION 1 computer THREATS AND HOW THEY REMOVED The CompTIA organization has created a helpful certification to help IT professionals get in the game to help protect our computer systems....
5 Pages (1250 words) Assignment

Technology Advance and Networks Security

According to Harrington (2005), computer crime or cybercrime is a relatively new phenomenon in the world today.... It is caused by intentional or irresponsible actions of individuals who take advantage of the universality and vulnerability of computers and computer networks.... In light of this understanding, many organizations are aware of the dangers of computer-related crime and are taking measures to ensure network security in an effort to safeguard their valuable data and that of their clients....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us