Got a tricky question? Receive an answer from students like you! Try us!

Profit Implications of Malware - Annotated Bibliography Example

Author : makenzieruecker
Download 1


Course: Tutor: Date: Profit implications of malware Malware refers to any program or file that can harm a computer system. Despite the fact that there no standard categorization of malware, still they can be grouped based on their effects, behaviors and intentions (David A…

Extract of sample
Profit Implications of Malware

Viruses are small software programs that are designed to spread replicate from one computer to another (Karen Mercedes Goertzel). They are malicious as they interfere with the normal computer operations. A virus operates either by deleting or corrupting data. There are several categories of viruses these are macro virus, email virus, multi-variant virus and radio frequency virus. Macro viruses are viruses written in the macro scripting languages of word processing, accounting or editing applications. These viruses propagate by exploiting the macro language properties in order to transfer itself from the infected file containing the macro script to another file. The most popular victims are Microsoft office application. Because they are written in the code of the applications software, macro viruses are platform independent and can spread between Mac, Windows, Linux or any other targeted applications. Electronic mail viruses are those which are delivered via email transmission. This usually exploits email attachments as they can be executed immediately upon download (Karen Mercedes Goertzel). The multi-variant viruses are implemented with slight variations so that the anti-virus scanner cannot be able to detect the one of the variants. A computer worm refers to a self-replicating computer program. It relies on computer network to send copies of itself to other computers on the network in an automatic manner. ...
Download paper

Related Essays

Malware. PMDump and Holodeck.
So it stands to reason that their WinWord and the Notepad programs would be subject to attacks. For example, Data Rescue, a company that specializes in helping customers recover their vital information after an attack or disaster, analyzed one customer’s computer. They found that an executable program called MSMSGS.EXE was loaded on the customer network that played havoc with the WinWord application. With diligent research Data Rescue was able to determine the URL that had loaded the malware and noticed that by attaching itself to the Application Data folder the hostile code was actually…
3 pages (753 words)
Dynamic Analysis of Malware
A function comprises of a code that executes a certain task like creating a file or calculating factorial value of a number. In the use of functions easy code re-usability, and easier maintenance can result. The property that makes functions interesting for program analysis is that they are usually used to abstract from execution particulars to a semantically richer representation. …
4 pages (1004 words)
Survey about CWsandbox tool which used for dynamic malware analysis
General Sandbox Architecture: A sandbox is deployed to secure a computer system from external attacks that are attempted through malware (malicious program). According to Hoopes (2009), the approaches used are either to block the critical accessibility of a malware or to introduce a simulated environment with completely virtual computing resources like CPU, file system and the memory. This virtual environment enables the program to get executed in a completely isolated environment which is disconnected from the real execution environment within which it resides. The main idea is to monitor the…
4 pages (1004 words)
Economic Implications of IPhone5
It was desired that, with the launch of Iphone5, an estimated 3 billion dollars would be channelled into the United States economy by the end of 2012. In spite of this contribution by Iphone5, the expected economic growth of the United States is to be within a weak rate of 2-2.5% between the periods of October to December 2012 (Rushe, 2012). With the release of Iphone5, an estimated pre-order sale of over two million units was recorded, using these records, Apple hoped to sell more than forty million units by the fourth quarter of 2012. With such deliberations, it is evident that Iphone5 has…
Risk assessment for non-profit hospital
Generally, non-profit organizations do not perform risk assessments mainly due to insufficiency of funds. Since non-profit organizations have only limited sources to raise funds, they would find difficulties in their day to day operations if they allot money for risk assessment program. This paper will particularly perform a risk assessment for non-profit hospitals and discuss various aspects related to the issue. Importance of Hospital Data Hospital data may include a pool of documents including inpatient data, outpatient data, pricing data, hospital room rates, hospital financial data,…
4 pages (1004 words)
Malware and computer system.
Malware is every computer owner nightmare due to the known effects that come with them. The name malware which owe its derivation from the two names malicious and software has universally been used to refer to these softwares. This malicious software can be thought of us a program that is specifically created by someone who intendeds to disrupts normal operation of the computer. Some of these malware are intended to gather sensitive information from the computer or with the intention of accessing the private computer system. The history of these computer malware date back to as early as 1986…
6 pages (1506 words)
Information Technology Malware Management in the Enterprise
Every business or an enterprise ought to follow this classic approach with the “just-on-time” feature that entails malware information assessment and handling (IATAC, 2009). Background Malware problems are ever growing and continue to be a nuisance for computer users. Manufactures of malware programs have continued to increase over the years and by 2010, there were 14 million different malware programs recorded. An astonishing 60,000 sections of malicious code was being discovered every single day. A rather recent work known as the Koobface surfaced, its purpose was to target people on…
7 pages (1757 words)