Malware, Viruses, and Spam

In: Computers and Technology

Submitted By SpaceDreamerII
Words 375
Pages 2
IS3110 Risk Management in Info Tech Security
Malware and Viruses: Probability = 8, Impact = 9
Malware is short for malicious software. It is used to disrupt normal computer operation, gather sensitive information, or gain access to private computer systems. Viruses are a type of malware. Other types include, ransom ware, worms, trojan horses, key loggers, spyware, adware, and rogue security software. Malware impacts productivity, increases support costs, and can result in the compromise or loss of data and reputation. It can originate from a range of sources, spread quickly, and require an extensive approach to ensure the risk it poses is effectively managed.
The most common approach to combating malware is firewalls and anti-virus software. Policies should also be put in place to make the Staff and Students aware of the potential threat and ways to keep it at bay. This approach requires the full co-operation of all college Staff, Faculty, and Students to make it work.
Spam: Probability = 3, Impact = 2
Spamming is the use of electronic messaging systems to send unsolicited bulk messages (spam), especially advertising, at random. While the most commonly used form of spam is e-mail spam, it has also been appearing in other forms of media such as: instant messaging, Web search engine, spam in blogs, wiki spam, online classified ads, mobile phone messaging spam, (phone) call spam, social networking spam, and file sharing spam. The name is believed to come from a Monty Python sketch in which Spam is included in almost every dish.
While spam is inevitable, the impact is negligible. The most spam does is to use an organization’s bandwidth and reduce productivity (as it will take Staff and Students more time to sort out the real messages from the spam). Because the Internet is public domain, there is not much that can be done to stop spam. To help minimize…...

Similar Documents


...MALWARE PROJECT ROOT KIT A root kit refers to a specialized set of programs normally used by crackers in order to subvert control of an operating system of a computer system. A rootkit enables breaking in security of a computer system and gaining root access for various operating systems such as Unix, Linux, Solaris, Microsoft Windows, Mac OS etc. A root kit is a set of tools used by a hacker to infiltrate a computer system without the knowledge or consent of the system's owner. These tools help the intruder gain access to the system in order to perform malicious activities at a later date without being detected. WHAT MAKES IT DIFFERENT FROM A VIRUS? Most often, rootkits are used to control and not to destroy. Of course, this control could be used to delete data files, but it can also be used for more nefarious purposes. More importantly, rootkits run at the same privilege levels as most antivirus programs. This makes them that much harder to remove as the computer cannot decide on which program has a greater authority to shut down the other. DETECTING AND PREVENTING ROOTKITS One issue with rootkits is that they are constantly updated; even with all sorts of computer security protocols programmed every day to specifically eliminate rootkits, people who program them continue to develop and update the rootkit, or make new ones. It doesn’t mean, though, that they cannot be prevented. Methods through which RootKits can be prevented are: * Anti-virus software.......

Words: 1362 - Pages: 6

Malware Lifecycle

...Today we will come to understand how to find, interpret, and explain the materials released by major antivirus vendors about new malware threats. In addition we will show how you will be able to document the malware lifecycle; in addition to explaining the threats that the malware creates both at the current time and how they may change. One of the sites that we have taken a look at is, the portion of information we are looking at today is the virus definition, what it is a how it will affect you the consumer. One virus we will be looking at will be RDN/BackDoor-FBSA!a!EFA0D651938C. This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc. The indication of having this infection would mean your machine would have the files, registry, and network communication referenced in the characteristics section. However not to worry the following is a plan of attack as per instructions of McAfee: Please use the following instructions for all supported versions of Windows: 1. Disable Windows System Restore. For instructions, please refer to:......

Words: 772 - Pages: 4

How Two Banks Stopped Scams, Spams and Cybercriminals

...CNB are as follows • Malware • Malicious software • Unprecedented of Spam Malware, short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software. Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software, and other malicious programs; the majority of active malware threats are usually worms or trojans rather than viruses. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. States. Malware is different from defective software, which is a legitimate software but contains harmful bugs that were not corrected before release. However, some malware is disguised as genuine software, and may come from an official company website in the form of a useful or attractive program which has the harmful malware embedded in it along with additional tracking software that gathers marketing statistics. Software such as anti-virus, anti-malware, and firewalls are relied upon by users at home, small and large organizations around the globe to safeguard against malware attacks which helps in identifying and preventing the further spread of malware in the......

Words: 830 - Pages: 4

Computer Viruses

...------------------------------------------------- Computer Viruses are a major threat to business information systems April 23, 2013 Computer Viruses are a major threat to business information systems Computer viruses are programs that infect your system and multiply. Viruses have many symptoms: some can simply slow down your computer whilst others can have more severe effects like moving documents and/or deletion of documents or programs. No matter the severity of the virus and its symptoms they should be dealt with by an up-to-date anti-virus program and security software, as systems with out-of-date protection are more susceptible and at risk. I agree that computer viruses are a major threat to business information systems because it is a way for hacker to gather useful information about a company and harm them. According to CNN workplace computer virus infections are up forty-eight percent over last year due to the increased spread of macro viruses usually found in files attached to E-mail, according to the International Computer Security Association, Inc. The number of infections per one thousand personal computers was twenty-one point fourty-five in nineteen ninty-seven; it's now at thirty-one point eighty-five, said the ICSA, in Carlisle, Pa. The study is based on a survey of some 300 corporations and corporate sites, representing some 750,000 PCs and servers. The rising virus epidemic can be blamed on macro viruses in Microsoft Word documents sent......

Words: 2647 - Pages: 11

Computer Viruses

...hosts for computer viruses are: – Executable files (such as the ‘.exe’ files in Windows machines) that may be sent around as email attachments – Boot sectors of disk partitions – Script files for system administration (such as the batch files in Windows machines, shell script files in Unix, etc.) – Documents that are allowed to contain macros (such as Microsoft Word documents, Excel spreadsheets, Access database files, etc.) ✓ Any operating system that allows third-party programs to run can support viruses. ✓ Because of the way permissions work in Unix/Linux systems, it is more difficult for a virus to wreak havoc in such machines. Let’s say that a virus embedded itself into one of your script files. The virus code will execute only with the permissions that are assigned to you. For example, if you do not have the permission to read or modify a certain system file, the virus code will, in general, be constrained by the same restriction. ✓ At the least, a virus will duplicate itself when it attaches itself to another host document, that is, to another executable file. But the important thing to note is that this copy does not have to be an exact replica of itself. In order to make more difficult the detection by pattern matching, the virus may alter itself when it propagates from host to host. In most cases, the changes made to the viral code are simple, such as rearrangement of the order independent instructions, etc. Viruses that are capable of...

Words: 2382 - Pages: 10

What Is Malware

...Table of Contents What Is Malware? ..………………………………………………………… 3 History of Malware …………………………………………………………. 4 Types of Malware …………………………………………………………… 5 How to Prevent Malware …………………………………………………… 7 Attacks on Mobile Devices …………………………………………………. 9 Conclusion …………………………………………………………………. 11 References ……………………………………………………………………. 14 What is malware Malware, short for malicious software, is any type of software that is used in order to disrupt regular computer operations, gather sensitive information, or gain access to private computer systems. Malware is not something new to computers; it is as old as software itself. Programmers have been creating it for as long as they have been creating legitimate software. There are many different reasons as to why a programmer would create such malware. Some programmers create malware for reasons as simple as pranks and experiments or more serious and organized Internet crime malware. There are many different types of malware that will be explained later but one must know that each type of malware attacks a computer in a different way and causes different levels of damage. (What is Malware, 2014) Creating malware is a very vicious thing to do. It attacks an individual’s computer without the knowledge of the user and before they know it, personal information is stolen and the computer is damaged. What would make someone want to create such a thing? In the earlier stages of......

Words: 3391 - Pages: 14


...Malware 1. Trojan Horses For a malicious program to accomplish its goals, it must be able to run without being detected, shut down, or deleted. When a malicious program is disguised as something normal or desirable, users may unwittingly install it. This is the technique of the Trojan horse or Trojan. In broad terms, a Trojan horse is any program that invites the user to run it, concealing harmful or malicious executable code of any description. The code may take effect immediately and can lead to many undesirable effects, such as encrypting the user's files or downloading and implementing further malicious functionality. 2. Rootkits Once a malicious program is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a malicious process from being visible in the system's list of processes, or keep its files from being read. Some malicious programs contain routines to defend against removal, not merely to hide them. 3. Adware Adware is a form of malware which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-up. While some sources rate adware only as an "irritant" others classify it as an "online threat" or even rate it as seriously as computer viruses and Trojans. The precise definition of the......

Words: 292 - Pages: 2


...Aaron McGrew Malware Malware is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of executable code, scripts, active content, and other software. Malware is a general term used to refer to a variety of forms of hostile or intrusive software. Malware includes computer viruses, worms, Trojan horses, ransom ware, spyware, adware, scare ware, and other malicious programs. As of 2012 approximately 60 to 70 percent of all active malware used some kind of click fraud to monetize their activity. A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes. However, not all viruses carry a destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating computer programs which install themselves without the user's consent. For a malicious program to accomplish its goals, it must be able to run without being detected, shut down, or...

Words: 638 - Pages: 3

Malware is considered the precursor to computer viruses. In 1972, Robert Thomas Morris created the first virus as such: Creeper, which could infect IBM 360 on the ARPANET (the predecessor of the Internet) and show an on-screen message saying “I’m the creeper, catch me if you can”. To eliminate it, a virus called Reaper was created to search for it and destroy it”…………………...PANDA SECURITY ( 2011) Malware Overview Retrieved from Malicious software, better known as Malware, is the most sophisticated type of threat to a computer system. Malware is simply code that is designed with purpose and intent to destroy, steal, disrupt or damage someone’s data, computer system or network. Malware is software that is written to do detriment to the data that resides on a computer or network, and is designed to secretly gain access to the system without the owner's knowledge or consent. Once installed, malware can run and stay resident on the system. This disruption, infection, or damage results in system degradation and performance and a loss of security. Before we had the Internet, a virus infected computer systems via the executable boot sectors of floppy disks and would execute whenever a program was run or a disk was booted. Today, malware infects a computer system in various......

Words: 3874 - Pages: 16


...Malware CMGT/230 January 11, 2016 Malware Today’s computer systems are exposed to numerous kinds of malware threats. The goal of malware is to enter the computer system in a hidden way. The main purpose of malware is achieving monetary gain at the expense of the victims. There are a few categories of malware: Adware, Bot, Bug, Ransomware, Rootkit, Spyware, Trojan Horse, Virus, and Worm. Each one of these types of malware has a specific function and effect on the end user’s computer system. Adware is an application that usually comes bundled with an application downloaded from the internet, in which it monitors the internet activity and provides advertisement according to the internet browsing behaviors. Bots are programs designed to run automated tasks. Bots gain popularity in being used on systems to run DDoS attacks. Bugs are flaws within the applications that an attacker can take advantage to exploit the computer system. Ransomware is an application that infects the computer system and encrypts files and holds the system hostage until the end user pays a fee for the unlocking mechanism. Rootkit is a malicious piece of software that is very stealth and allows the attacker to collect all kinds of information from the system and even remote control it. Spyware is related to Adware in which spies on the user’s activity without their knowledge and collects data such as keystrokes, logins, monitoring internet activity, etc. Trojan Horse is an application that disguises......

Words: 1143 - Pages: 5


...• The only way in which viruses are like organisms is that they are able to multiply. • Although viruses can multiply, they do so differently than organisms. Viruses can multiply only when they are inside a living cell. • The organism that a virus enters and multiplies inside is called a host. • A host is an organism that provides a source of energy for a virus or another organism. • A virus acts like a parasite, an organism that lives on or in a host and causes it harm. • Almost all viruses destroy the cells in which they multiply. Virus Shapes: • Viruses vary widely in shape. • Some viruses are round, while some are rod-shaped. • Other viruses are shaped like bricks, threads, or bullets. • There are even viruses that have complex, robotlike shapes, such as the bacteriophage. • A bacteriophage is a virus that infects bacteria. In fact, its name means “bacteria eater.” Virus Sizes: • Just as viruses vary in shape, they also vary in size. • Viruses are smaller than cells and cannot be seen with the microscopes you use in school. • Viruses are so small that they are measured in units called nanometers (nm), which is one billionth of a meter. (video clip) The Structure of a Virus • All viruses have two basic parts: a protein coat that protects the virus and an inner core made of genetic material. • A virus’s genetic material contains the instructions for making new viruses. • Like keys, a virus’s proteins fit only into certain “locks,” or......

Words: 258 - Pages: 2

Technology and Spam

...Spam is easily defined as unsolicited emails. There is a fine line between advertising and exploitation of privacy. Spammers (a company who does sends out the spam emails) finds email address’s by looking though internet forums, message boards, blogs, and news groups. People will often leave their email addresses when posting or responding in those online communities and spammers take advantage of those emails. How does spam work? Spam is a business in itself, well know companies come into into an agreement with a spammer, who generates email advertisements to a group of unsuspecting recipients. Spammers may also obtain one’s email address by purchasing them from companies that record email addresses and sell CD's full of them. The internet is a very vulnerable place where people can have their personal information expose. Majority of spam emails people receive are either junk or viruses. Spam is nothing but an annoying internet telemarketer. Most spam emails contains fake offers that require personal information, such as postal address, so they have another way to promote business by advertising to a new location. Every time someone receives a spam email their email address is exposed and distributed to other people. Businesses use a software which sends an email message to millions of people at the same time over bare mailboxes with useless junk and unnecessary requirements from the receiver that burden the recipients. Spam may be deleted by pushing the delete key, but......

Words: 513 - Pages: 3

Security Updates for Malware

...Security Updates for Malware and Anti-virus Protection Security for the remote sites needs to be a top priority, due to the recent Malware infection at one of the sites this is an area that needs to be addressed. The Anti-virus software on the client computers is another issue that needs to be updated. After discussing the situation with the different employees, the following recommendations should be implemented to ensure the future security of each of the sites. Recommendations include firewalls, software security for viruses and malware, and remote access for automatic updates. Firewalls are programs that keep out hackers, viruses, and worms from reaching the computers of employees. There are 2 types of firewalls, a hardware firewall and a software firewall. Commercial software firewalls are usually more powerful than those that come with the operating system. These are installed on each computer from a CD or by downloading it from the internet. Hardware firewalls is a physical device that attaches to the computer and is configured through a cable connection. A hardware router installed between client computers and the internet will help with external security issues. A software firewall should also be installed on each computer to prevent the spread of viruses that might infect the network if a computer becomes infected. Firewalls work by closing ports that are unused by the computers and regulating the traffic in ports that are used by the computer. Several......

Words: 1342 - Pages: 6

Malware: Evil Software

...Malware: Evil Software Malicious software, or Malware for short, is designed to access computer systems secretly without the owner’s knowledge or consent. Malware is a general term used by professionals in the computer industry to describe a variety of hostile, invasive, or aggravating software programs. Software is considered to be malware based on the suspected intentions of the designer rather than any particular features the software may or may not have. Malware, also known as computer containment, has grown to include computer viruses, worms, Trojan horses, spyware, dishonest adware, crimeware, and other malicious and unwanted software programs. Symantec published in 2008 that “the release rate of malicious codes and other unwanted programs may be exceeding that of legitimate software applications”. According to F-Secure, “As much malware was produced during 2007 as in the previous 20 years altogether.” Malware has become the most common pathway on the Internet for criminals to access users: especially through e-mail and the World Wide Web. The frequency of malware use for organized Internet crime, along with the inability of anti-malware protection products to protect against the incessant stream of newly produced malware, has encouraged a new mind-frame for business owners who operate on the Internet. Business owners acknowledge that a large percent of Internet customers will always be infected for one reason or another, and they need to continue doing......

Words: 1653 - Pages: 7

Computer Viruses

...multi-million dollar world of computer crimes. New revenue streams have been realized and viruses in choice Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware. As firms of all sizes, industrial orientation, and geographic location increasingly rely on computers to operate, concerns about computer crime have also risen, in part because the practice appears to be thriving despite the concerted efforts of both the law enforcement and business communities to stop it. But computer experts and business consultants alike note that both international corporations and modest family-owned businesses can do a great deal to neutralize computer "viruses" and other manifestations of computer crime. “” Many analysts believe, however, that small business owners are less likely to take steps to address the threat of computer crime than are larger firms. Indeed, many small businesses admit that they are passive about the threat because of costs associated with implementing safeguards and the perception that computer "hackers" and other threats are far more likely to pick on bigger companies. But as Tim McCollum flatly stated in Nation's Business, "companies increasingly are falling prey to hackers, computer thieves, software viruses, and, in particular, unauthorized and often illegal activities by their own employees.......

Words: 4313 - Pages: 18