Malware Review

Published on June 2016 | Categories: Documents | Downloads: 51 | Comments: 0 | Views: 480
of 3
Download PDF   Embed   Report

Malware, Anti-virus, Pc,

Comments

Content


Malware: How
does Malware
affect devices in
Computer
Technology?


CST 3510
Malware
Brooklyn, NY, USA

Abstract—This Article is \will be
discussing how malware affects
different devices for different purposes.
In each discussion will be discussed on
how malware affect devices for each
component. We will discuss how
malware affect computers differently
than smartphones and tablets. Do
malware affect devices differently?

I.INTRODUCTION (HEADING 1)

The definition of Malware issue that faces
many users today. With the boost of the
smartphone market and expanding computer
worldwide, malware is the leading force of many
virus and detection systems. Malware is a
continuing problem for both consumers and
enterpriser environments. In most environments,
malware is a leading disaster rate for most
devices and computers. China is the number one
is malware distribution. There are many ways to
fight and block malware as well as detecting as
soon as users are hit by one.
The computer virus is the most well-
known and infamous malware out there to date.
Every time you turn around there is a news story
about a virus infection. It is so popular that even
your grandmother has heard of it! The term
“virus” comes from its similarity with biological
viruses. Just as biological viruses enter the
human body and infect a cell, which in turn
infects new cells, computer viruses enter
computers and infect files by inserting their code.
When the infected program is run, the code is
activated and the virus begins to spread. A
computer virus carries instructional code that
allows it to make complete copies of itself and
attaches itself on a computer program. This virus
replicates and propagates all through the system
infecting other computers. Viruses do require
user intervention to spread, unlike worms that
spread automatically.
Viruses rely on a user opening a file or
email to infect the system. Almost all viruses
attach to an executable file and may reside on a
system unnoticed and inactive until a user runs or
opens a malicious host file or program.
Once the host file is executed, the virus is
executed as well. Some viruses are programmed
to activate on specific dates or when a user
performs a particular function. Some viruses use
up system memory and bring the system to a halt
while other viruses bypass system security and
travel across networks. Viruses can be
categorized by several criteria to include their
functionality, the techniques used to infect, the
types of files they infect, and the platforms they
attack. Viruses can range in severity from
causing mildly annoying effects to damaging
effects such as destroying data or causing a
denial-of-service.
Viruses can be spread by a variety of
ways such as being transferred by email,
removable disk, or file sharing. After attack the
infected computer continues to function unless
the program is overwritten by the virus and is
totally destroyed. Viruses can also be used along
with worms and Trojans in a blended attack. A
computer virus has three parts: an infection
mechanism, a trigger and a payload and during
its lifetime goes through four phases: Dormant
phase, Propagation phase, Triggering phase, and
an Execution phase.
Bots, derived from the word robots, also
known as zombies or drones, is program that
takes over another networked computer. Bots are
typical used to gather information and can be
used for either good or malicious intent. Often
bots are used with malicious intent and can infect
and unsuspecting computer in many different
ways such as file sharing and emails. Bots can
install themselves on the system and turn off all
antivirus software so that the user in unaware.
One of the most common ways to infect is
through an IRC (internet relay chat). The bot
connects to an IRC channel and then lets the
author know that it is there and ready to carry out
any commands. The author sends out a specific
function or command such as spam emails or
phishing over the IRC to the bot, and the bot or
zombie obeys, sending out thousands of spams or
phishing attacks. Bots typically are planted on
hundreds or thousands of computers and are then
collectively known as a Botnet. A botnet exhibits
three characteristics: the bot functionality, a
remote control facility and a spreading
mechanism to propagate the bots and construct
the botnet. Stallings Bots can log keystrokes,
launch denial-of-service attacks, gather
passwords, capture and analyze packets,
manipulate online polls, open back doors, or
simply spread new malware to name a few
Many anti-Virus companies give facts for
consumers about various anti-virus and Trojan
viruses as well. One virus that is popular is the
Lamadai. The Lamadai is A Backdoor targeting
Tibetan NGOs This was a malware attack
targeting Tibetan NGOs (Non-Governmental
Organizations). The attack consisted of luring the
victim into visiting a malicious website, which
then would drop a malicious payload on the
target’s computer using Java CVE-2011-3544
vulnerability and execute it.
For many years, malware virus has
evolved for many different types of computers.
For some, malware is targeted for business
enterprise to disrupt their network and personal
data. These types of malware that targets
network infrastructure is called worms. Worms
uses Wired or wireless communication to travel
to different computers and infect them without
the user evening knowing it. This moves the
malware quickly without the user having
knowledge of their computer.
Malware was intended to be used for pranks
and humor. As people understood the power of
malware, it became to infect and disrupt user’s
computers and data for their own use. With the
introduction of smartphones, malware has
targeted open source programs such as Android.
Android is the leading Mobile OS with the
highest Malware infection. One of the reasons
Malware is infected in open source is because
anyone can tinker with the OS and make it their
own. People can customize it their own way as
needed. The most popular malware on Android is
“Security.Android.Apk.” is a legitimate website
(teaching life insurance classes) that has been
hacked. The hacked website redirects to a
distribution website. The distribution website has
a hidden iframe that detects what kind of device
is accessing the webpage. If the device accessing
the webpage uses an android browser the user is
redirected to a site and the code is injected
through the device browser. The Android device
then automatically downloads the malware
(security.update.apk). The .apk extension
describes a packaged Android app.
Malware on tablets have increased
dramatically including version of both Android
and Windows Tablets. Both OS are open source
and users can customize them in any way. Open
Source OS are not closely guarded and apps can
be downloaded in various ways. For example,
Android apps can be downloaded from the
Amazon website. Having different platforms to
download a variety of apps can lead to different
malware to compromise data and sensitive
security. In November 2011, there were 2,000
Android malicious apps that belong to 80
different companies. That number has increased
tremendously.
Malware can prevented in number of ways.
One of the ways malware can be prevented is to
educate users on different apps and how to
download them from legit programs. Without
educating users, they will constantly make the
same mistake and not learn anything. Users can
have the latest Anti-virus, OS but if do not
understand how to navigate of find eerie
malware, it will always come back and hurt users
down the road. Making sure users know how to
pinpoint malware is the single most important
aspect to defeating it. Another way users can
avoid malware is to be able update their devices
to the latest updates. If users have a Windows
PC, advice users to install Windows updates on
their computer. Thus will patch up holes in their
computer and block any malware on their
computer. If users have an Android devices,
users should update their device to the latest
version. Updating it will make it difficult for
hackers to disrupt the device. The latest Android
version is KitKat. Having the latest device will
make it harder for hackers to take advantage of
users. Another way users can avoid malware is to
configure security settings on their device.
Update their Web browser to make the most of
their settings. Users should block certain cookies
on their web browser and a “Do Not Tracking”
option to disallow third-party websites to see
your content.
There are different ways to educate users to
avoid malware. Show them a way not to replicate
the same issue so it can happen twice. Allow
users to feel comfortable with asking the
administrator questions. Users need to have trust
factor when solving problems. Most anti-virus
are come pre-installed on computers. Some of
the best anti-virus is Norton, Nod32, and more.
Having the latest Anti-Virus will allow users to
fell protected in areas such as bank statements,
social media and finance.
Users can install anti-install on their
computers but they can install it on their favorite
smartphone. If users have Android smartphone,
users can use the Google Play to install free
Anti-Virus or use different sources such as
Amazon to download their favorite security
software on their devices. It may cost some
money but it can save you a ton of money in the
long run.
Overall, users need to understand how to
avoid malware. It can a long process to remove it
and cost effective for the users. The worst case
scenario for users with malware is to back up
their data and reinstall the OS on their computer.
This will clean out their computer and start their
computers from scratch. This will protect them
for next issue against malware.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close