StudentShare solutions
Triangle menu

Profit Implications of Malware - Annotated Bibliography Example

Extract of sample
Profit Implications of Malware

A computer worm refers to a self-replicating computer program. It relies on computer network to send copies of itself to other computers on the network in an automatic manner. Worms are known to exploit a zero-day vulnerability that allows them to execute their copies within the same network (Effects of Malware Infections: Avoid the Dangers of Malware Programs ). There are several types of worms these are: The internet Relay Chat worms that exploit the Internet Relay Chat (IRS) unlike the Instant messenger worm that exploit the IM channel. The web or internet worm spreads via user access to a web page, file transfer protocol or by use of other internet sources. We also have the file-sharing (Peer-to-peer) worm that copies itself into a shared folder, it then use its peer-to-peer mechanism to make its existence known with the hope that a user will download it. As for the flash form these refers to the theoretical worms that spread within seconds upon activation to all vulnerable hosts on the internet.
A Trojan horse is a non-self-replicating type of malware that tends to perform normal beneficial functions for the user though it facilitates unauthorized access to the user’s computer system. Recently Trojan horse is released as payloads by computer worms that give the attackers full control of the victims’ personal computer (Effects of Malware Infections: Avoid the Dangers of Malware Programs ). There are several factors that make Trojans dangerous, first of all Trojans are not visible in the traditional process viewer. including windows and task managers, this coupled with the fact that most virus and Trojan scanners find it difficult detecting the Trojan code. Also the Trojan code is very difficult to unload hence making it hard cleaning it. The most common type of Trojan is the proxy Trojan that once it attacks the victims computer it turns it into a proxy server (Zombie) which then operates on behalf of the remote attacker. This makes it even more difficult tracing the attack to the attacker as the trail often leads to the victim in most cases. A rootkit is a software system that is composed of several of one or more computer programs that are designed to hide the fact that a computer system has been compromised. Usually an attacker ...Show more

Summary

Malware refers to any program or file that can harm a computer system. Despite the fact that there no standard categorization of malware, still they can be grouped based on their effects, behaviors and intentions…
Author : makenzieruecker
Profit Implications of Malware essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the annotated bibliography on your topic
"Profit Implications of Malware"
with a personal 20% discount.
Grab the best paper

Related Essays

Implementation of Strategy and Power Politics
The middle managers can be motivated or de-motivated depending on how much they believe the organization can achieve the planned outcomes, whether it is feasible for them to support it and how will it impact on their individual and career growth prospects. The manager can take a position and then support or resist the implementation efforts.
4 pages (1000 words) Annotated Bibliography
Sibling separation
off by describing the various roles that siblings can play, for instance comforters, role models, caretakers, faithful allies, spurs to achievement as well as best friends. The article also clearly describes how the bond between the siblings develops and is nurtured by both the
2 pages (500 words) Annotated Bibliography
Implementation of strategy power politcal
le managers can be motivated or de-motivated depending on how much they believe the organization can achieve the planned outcomes, whether it is feasible for them to support it and how will it impact on their individual and career growth prospects. The manager can take a
2 pages (500 words) Annotated Bibliography
Write summery about what these websites are about
The society is determined to work for community based solutions by funding for the children on reserve. The First Nations Child and Family Caring Society is of the view that Aboriginal Affairs
3 pages (750 words) Annotated Bibliography
Annotated Bibliography
This article is thus reliable as the authors consider using reliable data, the implications of children being involved in the divorce
3 pages (750 words) Annotated Bibliography
The impact of technology on the health care field
The source goes ahead to predict the future of healthcare given the technological advancements that have so far been realized. One of the points this source raises is the
7 pages (1750 words) Annotated Bibliography
Linguistic variation
The research article is the sociolinguistic study of different immigrant groups focusing on the relationship between linguistic variations and different aspects of identity.The researchers have conducted the study in particular cultural and social setting in order to study how different people use linguistic variations and the way it predicts their identity
2 pages (500 words) Annotated Bibliography
Eating disorder and dental implications
The method used to obtain the results consisted of self-administered questionnaires together with the Bulimic Investigatory Test of Edinburgh as well as
1 pages (250 words) Annotated Bibliography
Social Implications of Medical Issues: Modern and Alternative Medicine
The achievement of the goal has been enhanced through exploiting the natural products available in the environment while also receiving a boost from increasingly developing scientific methods. The result has in return led to a situation where individuals feel comfortable
6 pages (1500 words) Annotated Bibliography
Inventory Management
This book discusses the scope of inventory management including the carrying cost of the inventory forecasting, inventory visibility, physical inventory among other aspects. Additionally, the book discusses the importance of inventory
3 pages (750 words) Annotated Bibliography
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation