Running Head: MALWARE 1
MALWARE 2
Malware
Name
Institution
Course
Date
Malware Attacks
Potential Malicious Attracts Against the Network Organization
In the world of technology, everything can just happen. Information can pass from one region to another with ease meaning that everything has been simplified. However, the information technology has also been affected by a few challenges that seem to recur from time to time. They include;
Trojan horse virus- Typically, a computer virus has been a challenge for most organizations, but the most common especially in such a company is the Trojan horse virus. The virus is not self-replicating like the majority of others, but it has terrible consequences if it affects the network server of an organization (Durairajan, Saravanan, & Chakkaravarthy, 2016). Apparently, the virus is used by hackers to get access to data from a specified user illegally. With the installation of the video game, other competitor servers can access such kind of data and reproduce a copy even before the initially programmed game gets into the market.
Effects of Trojan horse virus
The data within a user’s computer can be deleted or be modified by the hacker. With new businesses cropping out day in day out, the problem may affect the video game company. A hacker may eliminate valuable data from the program and install a fake one which will, in turn, nullify the whole project. The virus can also be used to steal valuable information from a company that is supposed to be classified.
Computer worms- The worst thing about computer worms is that they are self-replicating. Apparently, they utilize the space in the computer network and dispatch it there where they replicate. The copies of the worms are multiplied and therefore displace the data that was there. Additionally, computer worms don’t need to be attached to the case of Trojan horse virus, but they develop from the network of equipment bit by bit (Anwar, Bakhtiari, Zainal, Abdullah, & Qureshi, 2015). The video game is a program that is used by a lot of people, and there is a high possibility that some computer worms begin to develop slowly.
Impact of computer worms
One of the major troubles with the computer worms is that they replicate themselves on the host server and hence, eliminate valuable files. They apparently take the place of a file which will automatically cause a breakdown in the network system of a company. For instance, the video game has been programmed and is made of various files. If a computer worm takes the place of one of the critical files, it would be nearly impossible for the program to function normally.
Blended threat-The case happens when both the Trojan horse and the computer worms all attack at the same time. The attack by both can have very grave consequences as they require no human efforts. Apparently, the threat uses the internet vulnerabilities and the user to initiate and spread an attack within the system. Importantly, the attack is a ...
Science 7 - LAND and SEA BREEZE and its Characteristics
Running Head MALWARE1MALWARE2MalwareName.docx
1. Running Head: MALWARE 1
MALWARE 2
Malware
Name
Institution
Course
Date
Malware Attacks
Potential Malicious Attracts Against the Network Organization
In the world of technology, everything can just happen.
Information can pass from one region to another with ease
meaning that everything has been simplified. However, the
information technology has also been affected by a few
challenges that seem to recur from time to time. They include;
Trojan horse virus- Typically, a computer virus has been a
challenge for most organizations, but the most common
especially in such a company is the Trojan horse virus. The
virus is not self-replicating like the majority of others, but it
has terrible consequences if it affects the network server of an
organization (Durairajan, Saravanan, & Chakkaravarthy, 2016).
Apparently, the virus is used by hackers to get access to data
from a specified user illegally. With the installation of the
video game, other competitor servers can access such kind of
data and reproduce a copy even before the initially programmed
game gets into the market.
Effects of Trojan horse virus
2. The data within a user’s computer can be deleted or be modified
by the hacker. With new businesses cropping out day in day out,
the problem may affect the video game company. A hacker may
eliminate valuable data from the program and install a fake one
which will, in turn, nullify the whole project. The virus can also
be used to steal valuable information from a company that is
supposed to be classified.
Computer worms- The worst thing about computer worms is that
they are self-replicating. Apparently, they utilize the space in
the computer network and dispatch it there where they replicate.
The copies of the worms are multiplied and therefore displace
the data that was there. Additionally, computer worms don’t
need to be attached to the case of Trojan horse virus, but they
develop from the network of equipment bit by bit (Anwar,
Bakhtiari, Zainal, Abdullah, & Qureshi, 2015). The video game
is a program that is used by a lot of people, and there is a high
possibility that some computer worms begin to develop slowly.
Impact of computer worms
One of the major troubles with the computer worms is that they
replicate themselves on the host server and hence, eliminate
valuable files. They apparently take the place of a file which
will automatically cause a breakdown in the network system of
a company. For instance, the video game has been programmed
and is made of various files. If a computer worm takes the place
of one of the critical files, it would be nearly impossible for the
program to function normally.
Blended threat-The case happens when both the Trojan horse
and the computer worms all attack at the same time. The attack
by both can have very grave consequences as they require no
human efforts. Apparently, the threat uses the internet
vulnerabilities and the user to initiate and spread an attack
within the system. Importantly, the attack is always in multiple
forms, for example, creating problems from the email server and
also the file sharing set up.
Effects of blended threat
If not controlled, the threat can cause a computer to crash.
3. Control Measures of the Malware
It can be difficult to control a problem that is even not visible,
but it is only the effects of the problem that are felt. One of the
major control measures is to create a strategic diagram. The
diagram will clearly illustrate some of the key packet flows that
will be very useful to the user as far as putting security
mechanisms are concerned. Now, when the security mechanisms
are put in place on the strategic diagrams, possible threats are
detected and dealt with at the initial stages. Another control
measure would be to attain a network visibility program. The
malware cannot be seen, and it’s only a visible network control
system that can detect them. The system can be complicated as
it also requires experts trained specifically to deal with
malware.
Potential Concerns for Data Theft and Data Loss
The rise of Cloud computing- cloud computing mainly focuses
on the efforts to reduce the cost meant for IT infrastructure and
other related application. The video game company is likely to
use the program as it would also be interested in reducing the
costs while maximizing the profits. With such efforts, the
servers of the organizations are exposed to the net, and in one
way or another, the data may also be affected.
Effects
The cloud computing will bring a risk to the risk to the non-
regulatory compliance. It means that anyone can access the
information of the company and tamper with it. Such tricks may
cause deletion of the available data.
Unauthorized application use- it happens especially when there
are new employees within the firm. Typically, some may not be
aware of the security protocols that a company may be putting
in place. Essentially, the company may install other
unauthorized programs that at times may interfere with the
initial set up and thus cause some data to disappear.
Effects
4. The installed application may interfere with other valuable
programs that hold the video game together. A video game is a
program that should run without interference under the control
of the user. However, with some application in use, the video
program may translate into something else or even generate
come malware that would, in turn, affect the entire server. The
company is also likely to lose a portion of the market share.
Loss of physical asset- a certain program may be stored in a
laptop which is usually the case. If the laptop is accidentally
lost, the data within the laptop is also lost. It can accidentally
get to the long hands which may lead to the alteration or misuse
of that data. If the video program files are stored in a computer,
and by accident, the computer gets lost, the company would
have no access to the files, and any claim of ownership would
be a waste of time if they did not have backup files.
Effects
The major effect is the loss of valuable data within the company
which may be misused if it falls into the wrong hands. There
may also be significant losses concerning finances that may
affect the business.
Control for Data Loss and Data Theft
One of the measures of controlling data loss and theft would be
to put in place standard codes for all the employees.
Apparently, the corporate security mainly starts with them, and
they should beware of what to do and with what. With many
employees, some may be denied access to some information of
the company that requires protection (Cobb, Sudar, Reiter,
Anderson, Roesner, & Kohno, 2016). The standard codes are
meant to ensure that the enterprise data is safeguarded like any
other asset within the enterprise. Another way would be to
create awareness to all the employees. Training programs
should be put in place to educate all the staff on the care for the
available data and how it should be protected.
References
5. Anwar, R. W., Bakhtiari, M., Zainal, A., Abdullah, A. H., &
Qureshi, K. N. (2015). Enhanced trust aware routing against
wormhole attacks in wireless sensor networks. In Smart Sensors
and Application (ICSSA), , 56-59.
Cobb, C., Sudar, S., Reiter, N., Anderson, R., Roesner, F., &
Kohno, T. (2016). Computer Security for Data Collection
Technologies. In Proceedings of the Eighth International
Conference on Information and Communication Technologies
and Development , 2.
Durairajan, M. S., Saravanan, R., & Chakkaravarthy, S. S.
(2016). Low Interaction Honeypot: A Defense Against Cyber
Attacks. Journal of Computational and Theoretical Nanoscience,
13(8), , 5446-5453.
LEARNING ACTIVITY WORKSHEET - Week One
Please review the full assignment prompt and the Week 5 Final
Paper instructions located within the classroom and in the POL
201 Course Guide before beginning this assignment.
Utilizing the worksheet below, develop detailed paragraphs that
focus on the first main point for your final paper. For each
section, a minimum of one fully-developed paragraph is
required. A fully developed paragraph should be a minimum of
5-7 sentences in length. Each paragraph should include at least
one in-text APA citation that provides support for the topic.
At least two scholarly sources from the Ashford University
library (not including your textbook) with in-text citations
utilized within your paragraphs are required. Two new sources
should be utilized each week to meet the minimum of eight
required sources for the final. By finding and supporting your
material with these sources each week, you will have the
research necessary to construct a strong final paper. For help
with writing and citations, please review the handouts and
tutorials provided by the Ashford Writing Center.
1. The Constitution:
6. A. One strength of the U.S. Constitution
(Use the space below to complete this section.)
B. One weakness of the U.S. Constitution
(Use the space below to complete this section.)
C. One option to maintain the strength of the U.S. Constitution
(Use the space below to complete this section.)
D. One option to correct the weakness of the U.S. Constitution
(Use the space below to complete this section.)
2. Reference List (utilizing full APA citations)
(Use the space below to complete this section.)