Sunday, August 11, 2019
Malware and how it affects the system and the Victim also how it get Essay
Malware and how it affects the system and the Victim also how it get into a Victim machine - Essay Example software as rogue security software, spyware, worms, adware, dialers, Trojan, computer virus and key loggers among others which normally appear in the form of active contents, codes as well as scripts (Klaus, 2013). However, it is worth noting that malwares are different from defective software in the regard that defective software may be legitimate software which would have had defective bugs before release and which were not corrected. Malwares get access into a personal computer system through a variety of ways, which include through an exchange of contaminated files, accessing contaminated online materials or even through legitimate download of corrupted software from the online stores. Attackers or the developers of these malware are known to attach the malware onto legitimate software online and as such, unsuspecting victims purchase the software only to have the harmful software get into their computer system. However, such malware as spyware spread through individual installation by visiting security holes or even though installation of corrupted programs from harmful websites. Ill intentions by hackers or malware developers lead to the design and programming of the harmful software in order to access sensitive information from organizations or even private system. These software programs are used to steal sensitive financial, personal or even business information, which is targeted by the hackers. Besides the use of malware to gather or ââ¬Ëstealââ¬â¢ important information from corporate systems, the malicious software is used to disrupt the operations of computer systems and as a result bring about much suffering to organizations or corporate. The software has been used in many instances to target government operations, bank systems as well as corporate and private security systems for profit gains by the hackers (Reavis, 2012). The working of the different malicious software differs from one type to another. Worms and virus are known to target executable
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.