Malicious Code

In: Computers and Technology

Submitted By morganr
Words 490
Pages 2
Running head: MALICIOUS CODE

Malicious Code
Randy W. Morgan, Sr.
CIS Management of Information Systems

Malicious Code

This research paper attempts to explain the methodologies used in the creation of viruses, the frequency of their development, and the skill level required in creating this code. Although we live in a society that presents various malicious threats that includes virus, worms, Trojan programs, and logic bombs, the focus of this paper will concentrate on the comparison of viruses and worms. I will also examine the question as to weather of not non-Microsoft operating systems as less prone to virus threats.
Malicious code threats are primarily programmed to create havoc or major problems within the computing and networking environment. Exploitation of internet based services and applications are probably the hardest hit because of the increase in everyday usage and the unfamiliarity of threat countermeasures of many users.
Virus and other malicious are created only to create problems; nothing more. There are various levels that indicate the proficiency in developing or writing the program for viruses. These levels range from low skilled students to program researchers who have acquired many years of experience in developing their programming skills. The researchers are the group that introduces highly complex and sometimes anti-virus resistant code into computing/networking systems.
Although they differ, most users do not distinguish virus and worms; the term virus is simply used by some as a catch-all for both threats. A virus is basically a self-replicating program that causes damage by attaching itself to files. Normally, A virus is spread to various computers through human actions, particularly files sharing and email. Worms are similar to virus in some respect but they are more sophisticated in nature. Worms are often referred…...

Similar Documents

Code

...Pseudocode syntax, descriptions and examples Overview: This table provides a reference for commonly used pseudocode for introductory computer program design courses. You should use this as your reference and copy and paste code examples into your projects to ensure you are using proper syntax. Be sure to indent your code to make it more readable and use modify and enhance from the examples as needed. Also, capitalize the first letter of your pseudocode (e.g. While, not while). Pseudocode Write/Prompt Description Displays messages and other information on the screen Flowchart equivalent Write “What is your name?” Input Pauses execution, allowing the user to enter data Input FirstName Input FirstName Compute/Set Assigns a value to a variable Set Avg=(num1+num2)/2 Declare Example usage Write “What is your name?” Write “Your name is “ +YourName + “.” Prompt for ItemName, Price, Quantity Declares a variable to be of a specific type Input Number1, Number2 Compute average value: Set Avg= (num1 + num2)/2 Compute total cost: Set TotalCost= 1.25*Songs Declare FirstName As String Declare FirstName as String Declare Num1, Num2 As Integer Possible datatypes may include: String 1 Call Requests a module, subprogram, or function be executed Call WriteNums(num1, num2)) If End If Tests if a condition is met. If the test condition is true, the statements are executed. Enter Is Number < 5? Character Integer Float Main Module Write “Enter 2 numbers” Input Num1,Num2 Call......

Words: 712 - Pages: 3

Codes

...ALT Codes - Alt Codes for Maths / Mathematics Welcome to Useful Shortcuts, THE Alt Code resource! If you are already familiar with using alt codes, simply select the alt code category you need from the table below. If you need help using alt codes find and note down the alt code you need then visit our instructions for using alt codes page. List of Alt Codes for entering Mathematical Symbols ALT Codes for Mathematical Symbols | Alt Code | Symbol | Description | Alt 48 - 57 | 0 - 9 | zero to nine | Alt Codes for Basic Operators | Alt Code | Symbol | Description | Alt 43 | + | Plus Sign | Alt 45 | - | Minus Sign | Alt 0215 | × | Multiplication Sign | Alt 0247 | ÷ | Obelus / Division ign | Alt Codes for Pers | Alt Code | Symbol | Description | Alt 37 | % | Percentage Sign | Alt 0137 | ‰ | Per mille (per thousand) | Alt Codes for Bracketing | Alt Code | Symbol | Description | Alt 40 | ( | Open Bracket | Alt 41 | ) | Close Bracked | Alt Codes for Degree of Accuracy | Alt Code | Symbol | Description | Alt 241 | ± | Plus or Minus | Alt Codes for Fractions | Alt Code | Symbol | Description | Alt 47 | / | Fraction seperator | Alt 0188 | ¼ | Quarter | Alt 0189 | ½ | Half | Alt 0190 | ¾ | Three quarters | Alt 46 | . | Decimal Point | Alt Codes for Equality | Alt Code | Symbol | Description | Alt 240 | ≡ | Exactly Identical | Alt 61 | = | Equals ...

Words: 513 - Pages: 3

Summary Report on a Malicious Code Attack

...SUMMARY REPORT ON A MALICIOUS CODE ATTACK CIH VIRUS The CIH virus (which also has names known as CIH, Spacefiller, and Win32.CIH) is a virus that was developed in 1998 that infected the 32-bit Windows 95, Windows 98 and Windows NT operating system executables files having the .EXE extension. The contents of this virus can damage the contents of the BIOS flash memory chip and completely ruin the configurations set or even the default. Most of the newer computers sold around this time have had their BIOS programmed into the flash memory chips. (Portland Software 2007) Various strains of this virus have been reported to exist such as: • CIH v1.2/CIH.1103 – which contains the string CIH v1.2 TTIT and was activated on the 26th of April. • CIH v1.3/CIH.1010A and CIH1010.B – which contains the string CIH v1.3 TTIT and was also activated on that same day. • CIH v1.4/CIH.1019 – which contains the string CIH v1.4 TATUNG and is not a common virus but is activated on the same day. • CIH.1049 – which activated on August 2nd as opposed to the April 26th date. (Wikipedia 2012) Concerning infections that have been reported, there have been at least four underground pirate software groups got infected with the CIH virus during summer 1998. They inadvertently spread the virus globally in new pirated softwares they released through their own channels. These releases included some new games which spread world-wide very quickly. There's also a persistent......

Words: 572 - Pages: 3

Malicious Attacks and Threats

...Malicious Attacks and Threats Malicious Attacks and Threats As the lead Information Systems Security Engineer it is my job to ensure that the ongoing threat of malicious attacks and vulnerabilities to the organizations computer network are kept to a minimum so that highly sensitive data will continue to remain protected. However, recent reports from the CIO suggest that there has been a small amount of malicious activity reported on the network. The CIO is requesting I look into the current network infrastructure and make necessary changes to the network so that the system remains free from the threat and vulnerability of future malicious activity that would impact the organizations network. Attacks on computer systems and networks occur by the billions every year and are on a dramatic increase. Many organizations have invested vast amounts of money in computer networks, only to find out that although it is providing means of improving the efficiency and productivity of the organization it also exposes the organization to possible malicious attacks and threats. Such attacks have been the most challenging issue for a majority of Information System Security Engineers where they utilize the necessary resources to protect the network from these vulnerabilities. The greatest overall threat to computer systems and their information comes from humans, through actions that are either malicious or ignorant. When the action is malicious, some motivation or......

Words: 1172 - Pages: 5

Summary of the Effects of Virus and Malicious Software

...Executive Summary on the effects of computer Virus and Malicious software Introduction This paper is intended to outline the effects of computer viruses and malicious software. The paper will start by describing what a virus is and what malicious software is. it will then outline some of the common types of viruses and malicious software; the effects both threats could potentially have on ABC’s computer networks and finally suggest ways in which ABC estate agency may protect itself from such threats. Definitions Malicious software often referred to as Malware is as its name implies malicious software that is intended to cause some type of damage or do some unwanted action to a computer system often without the user’s knowledge or consent. Some types of malware are disguised as honest piece of software which does what it is intended to do, however malicious code has been embedded which tracks a user’s activity for marketing purposes A virus is a type of malicious software. A virus is a computer program capable of attaching itself to hard disks or other files and replicating itself repeatedly, typically without the user’s knowledge or permission (Stair, Reynolds and Chesney 2012). The virus often hides itself in memory or attaches itself to another program waiting to be executed. Once executed it performs some type of harmful action on the infected system, such as freezing up the CPU, eating up disk space, accessing personal information, corrupting important files and......

Words: 902 - Pages: 4

Code

..."The code of the streets is actually a cultural adaptation to a profound lack of faith in the police and the judicial system. The police are most often seen as representing the dominant white society and not caring to protect inner- city residents. When called, they may not respond, which is one reason many residents feel they must be prepared to take extraordinary measures to defend themselves and their loved ones against those who are inclined to aggression. Lack of police accountability has in fact been incorporated into the status system: the person who is believed capable of "taking care of himself" is accorded a certain deference, which translates into a sense of physical and psychological control. Thus the street code emerges where the influence of the police ends and personal responsibility for one's safety is felt to begin. Exacerbated by the proliferation of drugs and easy access to guns, this volatile situation results in the ability of the street oriented minority (or those who effectively "go for bad") to dominate the public spaces." (Anderson, Code of the Street). Anderson main argument in his research is that the behavior of many youths is influenced by the street culture or code. This “code” governs how youth from the inner city will react in a violent manor when faced with impersonal attacks or any show of disrespect. Through Anderson’s study he was able to give us the day to day struggle for some inner city children, and why they were unable to express......

Words: 381 - Pages: 2

Malicious Prosecution

...Discussion I. Can our client satisfy the first requirement for a malicious prosecution suit that requires that the termination of the earlier suit be in the plaintiff’s favor when in our client’s case their termination was due to a voluntary dismissal by the initial plaintiff who changed her mind about her claim? To meet the first element –favorable termination- a plaintiff cannot rely on a settlement of the case that both parties agree to. Once the litigation ends by settlement there is no favorable termination for the purpose of pursuing a malicious prosecution. A favorable termination is satisfied by abandonment or dismissal and without any final determination merits. However there are preceding cases that require that adjudication on the merits is necessary for a determination that a termination was in the plaintiff’s favor. If there is a withdrawal of proceedings by the person who is bringing them it is considered a favorable termination in the plaintiff’s favor. In our case our client should succeed because the defendant dismissed the suit on his own. So our client will satisfy this element. The cases discussed below seem to agree on the main elements of malicious prosecution: (1) termination of the earlier suit in the plaintiff’s favor, (2) lack of probable cause for the suit, (3) malice on the defendant part, and (4) a special injury flowing from the earlier suit. Frey v. Stoneman, 722 P. 2d 274, 277 (Ariz. 1986); Young v. Motor City Apartments, 133 Mich. App....

Words: 1611 - Pages: 7

Malicious Code Attack

...Week 4: Essay 4.1 Malicious Code Attack Harold Streat Jr (15813476) NT2580: Introduction to Information Security March 2, 2014 DeVon Carter Malicious Code Attack The Code Red virus didn't kill the Internet, but it did prove that there is a long way to go in the war against cyber-attacks, and, if the future is anything like the past, it is a war the good guys will never win (Burnett & Gomez, 2001). The Code Red worm is one example where knowledge of emerging vulnerabilities and implementation of security patches plus overall watchfulness of network activity could have saved many systems from falling prey to a well-publicized attack (Burnett & Gomez, 2001). The Code Red or Red Wiggler Worm, as it was known, was a self-replicating program designed to consume computer and network resources creating a Denial of Service (DoS) to the user community. The Code Red worm exploited a known vulnerability in Microsoft Windows NT and Windows 2000, popular operating systems in the business environment. The vulnerability was related to Internet Information Server (IIS), which runs on many Windows-based World Wide Web servers throughout the world. Code Red spread through several variants with mixed effectiveness. As the worm code was mutated, updated and re-released, infection rates increased (Burnett & Gomez, 2001). The worm began by scanning networks to identify hosts running IIS and accepting information on TCP port 80....

Words: 520 - Pages: 3

Malicious Code Attack

...Karen Barber ITM – 5600 – Information and Communications Security Assignment: Summary Report on a Malicious Code Attack Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a computer or system without the owner’s knowledge or consent. Upon entering the system, there are much exploitation of vulnerabilities, like viruses, worms, Trojan horses, spyware, adware, and rootkits. Malicious code is an application security threat that cannot be efficiently controlled by conventional antivirus software alone. Malicious code can either activate itself or activate after a user perform an action, such as clicking on something or opening an email attachment. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content. The Spamhaus Project is a cyber attack that is described as the largest in history apparently starting over an argument over spam. The prolonged denial-of-service assault is targeting The Spamhaus Project; a nonprofit European filtering service that helps organizations to fight spam by weeding out unwanted emails has gone after CyberBunker, a Dutch data-storage company that offers hosting to any websites/content "except child porn and anything related to terrorism." On March 18, 2013, Spamhaus added CyberBunker (whose servers shows......

Words: 728 - Pages: 3

Malicious Code Attack

...A Trojan horse (also known as a Trojan) is one of several kinds of malware you might find on your computer after a successful virus attack. Trojans are a particularly sneaky kind of malware because they look harmless or even beneficial and trick you into installing them on your system. Trojans fall into the category of “social engineering” attacks because they trick people. Trojans are typically used by cybercriminals for online fraud and theft. Antivirus software and anti-malware help protect you by keeping Trojans off your computer system by recognizing that they’re actually malware. But don’t rely on antivirus software alone. It is called a Trojan horse because the Greeks won the Trojan War by building a hollow horse, filling it with soldiers and leaving it for the Trojans, supposedly as a gift. A Trojan priest was suspicious of the “gift” and said to “beware of Greeks bearing gifts” but the Trojans ignored him and brought the horse through the gates into the city. Later, when the Trojans were asleep the Greek soldiers jumped out, captured the city and burned it to the ground. And so the “Trojan horse” came about. In the world of viruses and malware, cybercriminals create viruses or malware that look harmless or useful but actually aren’t. Just like the Trojan horse, it’s really hiding something that’s meant to attack you once it’s inside your system. Antivirus and security software helps protects you by looking inside the “horse” to see what’s really there. And if your...

Words: 411 - Pages: 2

Malicious Attacks

...elements of your paper. All numbers in the abstract, except those beginning a sentence, should be typed as digits rather than words. To count the number of words in this paragraph, select the paragraph, and on the Tools menu click Word Count. Title of Paper In this assignment, I will write a four to five report in how to thwart a malicious attacks, threats, vulnerabilities to a game system. I have just been hired as an Information System Engineer for a videogame development company. The organization network structure have been identified by the company as having 2- firewall, 1- Web/FTP server, 1-Microsoft Exchange Email Server, Network Intrusion Detection System(NIDS), 2-Windows Server 2012 Active Directory Domain Controllers(DC) 3-File servers 1-Wireless access point(WAP) 100-Desktop/Laptop computers VoIP telephone system. The CIO of this company has just received a report of malicious activities on the rise and has become extremely concerned with the protection of intellectual property and highly sensitive data maintained by his organization. As part of my job task with the organization, I will identify and draft a report identifying potential malicious attacks, threats, and the vulnerabilities that is specific to his organizations. It has been requested that in the report, I give a brief scenario explanation and how what kind of potential impact it will have on the organization. Any threat is alarming because it could damage the assets of the company if this is true......

Words: 401 - Pages: 2

Week 4 Essay: Malicious Code Attack

...CIH VIRUS The CIH virus (which also has names known as CIH, spacefiller, and Win32.CIH) is a virus that was developed in 1998 that infected the 32-bit Windows 95, Windows 98 and Windows NT operating system executables files having the .EXE extension. The contents of the virus can damage the contents of the BIOS flash memory chip and completely ruin the configurations set or even the default. Most of the newer computers sold around this time have their BIOS programmed into the flash memory chips (Portland Software 2007) Various strains of the virus have been reported to exist such as: • CIH v1.2/CIH.1103 – which contains the string CIH v1.2 TTIT and was activated on the 26th of April. • CIH v1.3/CIH.1010A and CIH1010.B – which contains the string CIH v1.3 TTIT and was also activated on the same day. • CIH v1.4/CIH.1019 – which contains the string CIH v1.4 TATUNG and is not a common virus but is activated on the same day. • CIH.1049 – This activated on August 2nd as opposed to the April 26th date. Concerning infections that have been reported, there have been at least four underground pirate software groups that where infected with CIH virus during summer 1998. They inadvertently spread the virus globally in new pirated software they released though their own channels. These releases included some new games which spread world-wide very quickly. There’s also a persistent rumor about a “PWA-cracked copy” of Windows 98 which would be infected by the CIH virus, but......

Words: 553 - Pages: 3

Malicious Attacks and Threats

...Malicious Attacks and Threats     As the lead Information Systems Security Engineer it is my job to ensure that the ongoing threat of malicious attacks and vulnerabilities to the organizations computer network are kept to a minimum so that highly sensitive data will continue to remain protected.   However, recent reports from the CIO suggest that there has been a small amount of malicious activity reported on the network.   The CIO is requesting I look into the current network infrastructure and make necessary changes to the network so that the system remains free from the threat and vulnerability of future malicious activity that would impact the organizations network.     Attacks on computer systems and networks occur by the billions every year and are on a dramatic increase.   Many organizations have invested vast amounts of money in computer networks, only to find out that although it is providing means of improving the efficiency and productivity of the organization it also exposes the organization to possible malicious attacks and threats.   Such attacks have been the most challenging issue for a majority of Information System Security Engineers where they utilize the necessary resources to protect the network from these vulnerabilities.   The greatest overall threat to computer systems and their information comes from humans, through actions that are either malicious or ignorant.   When the action is malicious, some motivation or goal is generally behind the attack.  ......

Words: 305 - Pages: 2

Crypto Malicious

...Stopping Malicious Behavior What is the problem? Can the field of fraud detection (and cyber security in general) be improved by new technology and approaches? If companies develop a program that searches for unusual activity by looking at risk factors then they could improve how they detect fraud. Since a lot of fraud detection is rule based, they have to develop a system that addresses the gray areas of their rules. For instance if a bank is looking for someone who transfers over $10,000 for one transaction in a day as an alert, then what happens if they separate the $10,000 into smaller payments? What happens if the malicious person makes sure to deposit just under $10,000 to avoid having alerts for their illegal actions? Addressing different patterns of new gray flavors of activity can help address management issues, overlapping issues and detection issues. Also developing better anomaly, link and predictive analysis can help guide fraud detection into greater improvements. Anomaly analysis consists of being able to identify risk using certain behaviors when someone doesn’t do things the normal way. The main issue with anomaly detection is there is a great challenge on managing the detection systems, certain behavior that you think is odd may be normal to a certain group of people, and that it is hard to make generalizations on new data. Link analysis develops relationships between different kinds of entities. Links can be made with how entities relate to...

Words: 2974 - Pages: 12

Code

...States by corporations, institutions, and other organizations. For more information, please contact the Special Markets Department at the Perseus Books Group, 11 Cambridge Center, Cambridge MA 02142, or call (617) 252-5298, (800) 255-1514 or e-mail special.markets@perseusbooks.com. CIP catalog record for this book is available from the Library of Congress. ISBN-10: 0–465–03914–6 ISBN-13: 978–0–465–03914–2 06 07 08 09 / 10 9 8 7 6 5 4 3 2 1 Code version 1.0 FOR CHARLIE NESSON, WHOSE EVERY IDEA SEEMS CRAZY FOR ABOUT A YEAR. Code version 2.0 TO WIKIPEDIA, THE ONE SURPRISE THAT TEACHES MORE THAN EVERYTHING HERE. C O N T E N T S Preface to the Second Edition Preface to the First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles from Cyberspace PART I: “REGULABILITY” ix xiii 1 9 Chapter 3. Is-Ism: Is the Way It Is the Way It Must Be? Chapter 4. Architectures of Control Chapter 5. Regulating Code PART II: REGULATION BY CODE 31 38 61 Chapter 6. Cyberspaces Chapter 7. What Things Regulate Chapter 8. The Limits in Open Code PART III: LATENT AMBIGUITIES 83 120 138 Chapter 9. Translation Chapter 10. Intellectual Property Chapter 11. Privacy Chapter 12. Free Speech Chapter 13. Interlude PART IV: COMPETING SOVEREIGNS 157 169 200 233 276 Chapter 14. Sovereignty Chapter 15. Competition Among Sovereigns 281 294 PART V: RESPONSES Chapter 16. The Problems We Face Chapter 17. Responses Chapter 18. What Declan Doesn’t Get Appendix Notes......

Words: 190498 - Pages: 762