StudentShare solutions
Got a tricky question? Receive an answer from students like you! Try us!

Annotated Bibliography example - Profit Implications of Malware

Annotated Bibliography
Information Technology
Pages 15 (3765 words)
Download 1
Course: Tutor: Date: Profit implications of malware Malware refers to any program or file that can harm a computer system. Despite the fact that there no standard categorization of malware, still they can be grouped based on their effects, behaviors and intentions (David A…

Extract of sample

Viruses are small software programs that are designed to spread replicate from one computer to another (Karen Mercedes Goertzel). They are malicious as they interfere with the normal computer operations. A virus operates either by deleting or corrupting data. There are several categories of viruses these are macro virus, email virus, multi-variant virus and radio frequency virus. Macro viruses are viruses written in the macro scripting languages of word processing, accounting or editing applications. These viruses propagate by exploiting the macro language properties in order to transfer itself from the infected file containing the macro script to another file. The most popular victims are Microsoft office application. Because they are written in the code of the applications software, macro viruses are platform independent and can spread between Mac, Windows, Linux or any other targeted applications. Electronic mail viruses are those which are delivered via email transmission. This usually exploits email attachments as they can be executed immediately upon download (Karen Mercedes Goertzel). The multi-variant viruses are implemented with slight variations so that the anti-virus scanner cannot be able to detect the one of the variants. A computer worm refers to a self-replicating computer program. It relies on computer network to send copies of itself to other computers on the network in an automatic manner. ...
Download paper
Not exactly what you need?

Related papers

Malware. PMDump and Holodeck.
So it stands to reason that their WinWord and the Notepad programs would be subject to attacks. For example, Data Rescue, a company that specializes in helping customers recover their vital information after an attack or disaster, analyzed one customer’s computer. They found that an executable program called MSMSGS.EXE was loaded on the customer network that played havoc with the WinWord…
3 pages (753 words)
Dynamic Analysis of Malware
A function comprises of a code that executes a certain task like creating a file or calculating factorial value of a number. In the use of functions easy code re-usability, and easier maintenance can result. The property that makes functions interesting for program analysis is that they are usually used to abstract from execution particulars to a semantically richer representation. …
4 pages (1004 words)
Survey about CWsandbox tool which used for dynamic malware analysis
General Sandbox Architecture: A sandbox is deployed to secure a computer system from external attacks that are attempted through malware (malicious program). According to Hoopes (2009), the approaches used are either to block the critical accessibility of a malware or to introduce a simulated environment with completely virtual computing resources like CPU, file system and the memory. This virtual…
4 pages (1004 words)
Economic Implications of IPhone5
It was desired that, with the launch of Iphone5, an estimated 3 billion dollars would be channelled into the United States economy by the end of 2012. In spite of this contribution by Iphone5, the expected economic growth of the United States is to be within a weak rate of 2-2.5% between the periods of October to December 2012 (Rushe, 2012). With the release of Iphone5, an estimated pre-order sale…
Risk assessment for non-profit hospital
Generally, non-profit organizations do not perform risk assessments mainly due to insufficiency of funds. Since non-profit organizations have only limited sources to raise funds, they would find difficulties in their day to day operations if they allot money for risk assessment program. This paper will particularly perform a risk assessment for non-profit hospitals and discuss various aspects…
4 pages (1004 words)
Malware and computer system.
Malware is every computer owner nightmare due to the known effects that come with them. The name malware which owe its derivation from the two names malicious and software has universally been used to refer to these softwares. This malicious software can be thought of us a program that is specifically created by someone who intendeds to disrupts normal operation of the computer. Some of these…
6 pages (1506 words)
Information Technology Malware Management in the Enterprise
Every business or an enterprise ought to follow this classic approach with the “just-on-time” feature that entails malware information assessment and handling (IATAC, 2009). Background Malware problems are ever growing and continue to be a nuisance for computer users. Manufactures of malware programs have continued to increase over the years and by 2010, there were 14 million different malware…
7 pages (1757 words)