Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

Malware Past, Present and Future

Executive Summary

The information security has become important for every IT user. There are various cases of information hacking and phishing that encountered by IT users. Through this report, we will discuss about an essential topic of cyber threats that put bad influence over security of information. The purpose of making this report on a particular topic of security threat is to build an understanding and insight of current hot topics in information security. The main points that we will cover in this report are challenges, problems, relevant technologies and applications of technologies, impact of information security issues on real life and other important points.

Introduction

The selected topic in information security is Malware: Present, Past and Future. Malware is a vulnerable cyber-attack on information systems, networks and databases. It is a malicious software and refers to any program that is deliberately created to perform an unauthorized and harmful action. Malware consists of various categories such as virus, spyware, Trojan horses, backdoor etc. The threat of malware is considered most recent threat for security of information. It has potential to cause loss of billions of dollars. Due to these reasons, malware is considered so much vulnerable (Bull, 2017).

Main Body

To get rid of malware attacks, it is necessary to defend information systems, networks and databases from this vulnerable software. While defending against malware various challenges are faced by developers or security professionals that are listed as below:

Challenges of Malware Detection

Lack of Encryption Services

Encryption is considered most effective technique to save data from cyber-attacks. But to achieve this, it is necessary to use of encryption techniques properly by network security experts. The lack of encryption services is a big challenge to defend information against malware attacks (Symantec.com, 2017).

No use of Anti-virus

Anti-virus is also an effective way to detect and scan malware or another viruses that are harmful for information systems and databases. No use of antivirus leads to heavy loss of information and enhance chances of malware attacks. It is also a main challenge to control malware and its vulnerable attack.

Lack of usage Backup Software

The information stored into database is high affected by malware attacks. In this case, it is better to keep secure that information by taking its backup into alternative storage device. This backup can be used to restore information that has lost due to malware. It is also a way to get defense against malware.

After knowing about these challenges to defend against malware attacks, now we will emphasize on problems that are faced by IT users due to malware attacks.

Problems faced by users due to Malware

  1. The first problem is of hardware failure that is faced by computer users due to malware attack. Trojan virus which is type of malware has potential to open and close CD/DVD tray and it can easily spread into root files and folders of computer system.
  2. Another problem is of data loss or data theft. The attackers inject malware scripts into systems or databases to access data. It is a common way for hackers of data theft (Magento, 2017).

Relevant Technologies

As we have discussed above harmful impacts of malware on information security and it is necessary to resolve this problem of malware attacks to sustain information security for long time. Here are some relevant technologies that we have found while analyzing prevention from malware.

  1. The first technology is to keep secure system and database with advanced anti-virus. If anti-virus will be installed into system then malware can detect and remove.
  2. Another technology to get rid of malware attacks is to use firewall. Firewall is an in-built software into our operating system and it gives alert to users about entry of unknown entity into system and also block that entity.
  3. Encryption technique must be used by developers to store encrypted information into database, so that it cannot be understood by hackers.

Applications of Technologies

The above discussion relevant technologies have various applications. These technologies can be used in any system, database and network where their users have detected cyber threats.

Clarify Vague Areas and Research Questions

Every computer user has knowledge about malware and its effects. But there are some vague points found in case of malware and these are in form of questions asked by IT users.

Question 1: Can a computer virus like malware spread behind firewall?

Answer: In different ways, computer viruses are spread into system. Firewall is important for system but it is possible that computer viruses like malware can spread over local network (Ask(leo.com. 2017).

Question 2: Can firewalls and security packages cause problems?

There is no doubt that firewalls and security packages are helpful to keep things secure. But they can add their own level of confusion (Heimdal Security Blog. (2017).

Issues of Malware discussed in Forum

The selected forum from which we have collected above discussed information regarding malware, its challenges and problems and vague areas, from that forum, we have also found issues of malware that are listed as below (Securelist.com, 2017).:

  • The main issue received regarding malware is that it appears to collect information from different fields of the checkout process such as credit and debit card information.
  • Another issue of malware is that attackers can use admin or database access to implement exploit. The specific information that is accessed by attackers by using malware is password, unpatched sites and accounts of admin.

The given information in forum is accurate, but if we would contribute in this forum by posting essential information about issue of malware then we can understand malware and it effects in different areas in more appropriate way.

Important Issue that not addresses in Forum

In selected forum, some essential malware issues are discussed but one issue that we would like add into given issues is that malware can corrupt boot file of computer system and can damage whole information stored into database. It means if malware has installed into our system then its early solution is required to protect computer from other vulnerabilities.

Impact of above discussed issues on real life

The above discussed malware issues are malicious enough and put harmful influence on our real life in following ways:

  1. The chances of less security and privacy of data increase and information becomes more insecure.
  2. Hackers can access authorized data from database anytime from remote locations.
  3. It will become difficult for users to send and receive data over network, if malware will be installed into database (Reilly, 2017).

Most Important Lesson Learnt from discussion

The most important thing that we have learnt from this discussion that malware is very much harmful for our computer systems and databases and can provide more vulnerable results if it will not be controlled on time. In above discussion we got to know essential challenges, problems and issues of malware that can damage information, files and folders from system. Therefore, all discussed prevention techniques should be used by every computer user to get rid of malware or any other attack (Cooney, & World, 2017).

Conclusion

At last we conclude that most of the people work with computers and networks but a few of them take care about security of their systems by using security tools and techniques. Due to these reasons issues of malware attacks occur and increasing continuously. Therefore, every computer user should use security tools and techniques to reduce issues of malware.

References

Ask-leo.com. (2017). Viruses and Malware. Retrieved 19 April 2017, from http://askleo.com/viruses_and_malware.html

Bull, D. (2017). The Past, Present, and Future of Phishing and Malware | McAfee Blogs. McAfee Blogs. Retrieved 19 April 2017, from https://securingtomorrow.mcafee.com/business/security-connected/past-present-andfuture-of-phishing/

Cooney, M., & World, N. (2017). 10 common mobile security problems to attack. PCWorld. Retrieved 19 April 2017, from http://www.pcworld.com/article/2010278/10-commonmobile-security-problems-to-attack.html

Heimdal Security Blog. (2017). 10 Warning Signs that Your Computer is Malware-Infected [Updated]. Retrieved 19 April 2017, from https://heimdalsecurity.com/blog/warningsigns-operating-system-infected-malware/

Magento.(2017). Important New Malware Issue | Magento. Retrieved 19 April 2017, from https://magento.com/security/news/important-new-malware-issue

Reilly, A. (2017). The Challenges in Defending Against Malware - Smallbiztechnology.com. SmallBizTechnology. Retrieved 19 April 2017, from http://www.smallbiztechnology.com/archive/2011/09/the-challenges-in-defendingagainst-malware.html/#.WPdSJGclHIU

Symantec.com. (2017). Malware Infection Vectors: Past, Present, and Future | Symantec Connect. Retrieved 19 April 2017, from https://www.symantec.com/connect/articles/malware-infection-vectors-past-presentand-future

Securelist.com. (2017). Damage caused by malware – Securelist – Information about Viruses, Hackers and Spam.

Cyber Security Homework Help

  • Ethical Hacking
  • Malware Analysis Homework Help
  • Networking Basics homework assignment help
  • Inter process Communication/Threads homework assignment help
  • Introduction, Framing homework assignment help
  • Error Detection homework assignment help
  • Flow Control, Reliability homework assignment help
  • Wireless - 802.11 homework assignment help
  • Wi-Fi Wireless homework assignment help
  • DSL homework assignment help
  • PACKET SWITCHING (Network Layer) homework assignment help
  • Routing - Link State and homework assignment help
  • Distance Vector homework assignment help
  • ATM homework assignment help
  • PROTOCOL homework assignment help
  • Network Hardware homework assignment help
  • Internet Connection homework assignment help
  • TCP Extensions and homework assignment help
  • Performance Enhancements homework assignment help
  • TCP/IP Networking homework assignment help
  • Bridge homework assignment help
  • IPv4, IPv6, ICMP, ARP homework assignment help
  • IP Routing - CIDR, OSPF homework assignment help
  • Proxy Server / Lists homework assignment help
  • Multicast homework assignment help
  • DNS homework assignment help
  • VPN homework assignment help
  • CONGESTION CONTROL homework assignment help
  • Congestion Avoidance homework assignment help
  • peer to peer (P2P) homework assignment help
  • Virtual Clock homework assignment help
  • Windows Network homework assignment help
  • Bluetooth homework assignment help
  • Free Practice Test homework assignment help
Copyright © 2009-2023 UrgentHomework.com, All right reserved.