1
Running Head: COMPUTER WORMS MALWARE IN CYBER SECURITY
14
COMPUTER WORMS MALWARE IN CYBER SECURITY
COMPUTER WORMS MALWARE IN CYBER SECURITY
Praveen Ranghavajhala
201696
Abstract
Generally, there are numerous current research which deals with diverse types of computer worms in both the computing as well as the technological world. This respective report will therefore analyze the current research done on the computer works. In addition, it will reflect on the various malware attacks which may be a subsequent of any given cyber security breach (Sari, 2018). The research conducted will essentially have an integral objective of locating the characteristics of the various computer worms as well as diverse types of computer malware that generally affects the functioning of the computing field.
This prospective research conducted will additionally facilitate the impact of such malware attacks on the computers as well as the networking systems. To effectively analyze these phenomena, the research utilized secondary data collection mechanism in its various navigated data acquisition (Sari, 2018). The research significantly employed the use of exploratory approach as well as the deductive research design which was majorly utilized by the respective researchers who conducted this prospective research. It will conclusively prescribe various methods to hibernate and reduce such malware and worms attack on the computers. This will exclusively minimize the rampant effects of malware attacks on computers hence improving the computer functioning.
Introduction
Cyber security can be described as an inclusion of various tactics that are meant to protect computers, networks, program as well as data from any illicit access or breach hence resulting to malware attacks. Such attacks can be elaborated as an aim for the corruption. Cyber security in addition can be termed to be a protective measure towards the consumption ability, veracity as well as the respective security of the network. There are various parameters that can be put in place to protective massive threats from assessing their intended targets. Such parameters include using the anti-virus as well as anti-spyware. In addition, other measures can be taken such as mounting firewalls to repel or resist any unauthorized admission to the computer system. Other preventive actions that can be essentially utilized include intrusion prevention systems. These intrusion prevention systems generally identify quick affecting risks such as zero-hour attacks hence lessening occurrences of such attacks.
Generally, the protection of personal as well as professional data from cyber threats is basically an urgent necessity in the world today. This is where the cyber security interrupts in for the rescue of such protection of personal information as wel.
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
This document discusses several new methods for detecting malware, including CPU analyzers, holography, eigenvirus detection, differential fault analysis, and whitelist protection. It notes that due to a focus on deobfuscation, these ideas have only recently been explored and are still underdeveloped. Specific methods like CPU analyzers and holography are examined in more detail.
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSIJNSA Journal
This document summarizes a survey paper on malware detection and analysis tools. It provides an overview of different types of malware like viruses, worms, Trojans, rootkits, spyware and keyloggers. It describes techniques for malware analysis, including static analysis which examines code without execution, and dynamic analysis which analyzes behavior during execution. It also lists some limitations of static analysis and the need for dynamic analysis. Finally, it discusses various tools available for malware detection, analysis, reverse engineering and debugging.
Optimised malware detection in digital forensicsIJNSA Journal
On the Internet, malware is one of the most serious threats to system security. Most complex issues and
problems on any systems are caused by malware and spam. Networks and systems can be accessed and
compromised by malware known as botnets, which compromise other systems through a coordinated
attack. Such malware uses anti-forensic techniques to avoid detection and investigation. To prevent systems
from the malicious activity of this malware, a new framework is required that aims to develop an optimised
technique for malware detection. Hence, this paper demonstrates new approaches to perform malware
analysis in forensic investigations and discusses how such a framework may be developed.
Optimised Malware Detection in Digital Forensics IJNSA Journal
This summarizes a research paper that proposes developing a new framework to optimize malware detection in digital forensics investigations. The paper discusses challenges with existing detection methods, such as signature-based approaches requiring extensive manual analysis. Through a market research survey of forensics professionals, the paper finds weaknesses in current skills, tools, and accuracy rates. Most respondents agreed a new customized detection tool is needed that employs both dynamic and static analysis methods. The proposed framework aims to address these issues to more effectively detect and analyze malware.
This document discusses using data mining techniques to detect spyware. It begins by defining spyware and artificial intelligence. It then discusses three AI approaches that have been applied to spyware detection: heuristic technology, neural network technology, and data mining techniques. It focuses on using breadth-first search (BFS) within a data mining approach. The document finds that data mining techniques achieve an overall accuracy of 90.5% in detecting spyware, performing better than traditional signature-based or heuristic-based methods.
Utilization Data Mining to Detect Spyware IOSR Journals
This document discusses using data mining techniques to detect spyware. It begins by defining spyware and artificial intelligence. It then discusses three AI approaches that have been applied to spyware detection: heuristic technology, neural network technology, and data mining techniques. It focuses on using breadth-first search (BFS) within a data mining approach. The document finds that data mining techniques perform better than traditional signature-based or heuristic-based detection methods, achieving an overall accuracy of 90.5% at detecting spyware using BFS algorithms.
An efficient control of virus propagationUltraUploader
This document discusses the development of an Efficient Control of Virus Propagation (ECOVP) system using case-based reasoning and object-oriented methodology. It conducted a questionnaire survey that found many computer users in Malaysia lack awareness of computer viruses and there is a need for an effective system to guide users in handling virus incidents. The ECOVP system was developed to educate users and help control virus propagation by providing customized solutions based on the symptoms users describe. It was tested for accuracy and usability and found to successfully help users clean infected machines and prevent future infections.
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...IJCI JOURNAL
With a text mining and bibliometrics approach, this study reviews the literature on the evolution
of malware classification using machine learning. This work takes literature from 2008 to 2022
on the subject of using machine learning for malware classification to understand the impact of
this technology on malware classification. Throughout this study, we seek to answer three main
research questions: RQ1: Is the application of machine learning for malware classification
growing? RQ2: What is the most common machine-learning application for malware
classification? RQ3: What are the outcomes of the most common machine learning
applications? The analysis of 2186 articles resulting from a data collection process from peerreviewed databases shows the trajectory of the application of this technology on malware
classification as well as trends in both the machine learning and malware classification fields of
study. This study performs quantitative and qualitative analysis using statistical and N-gram
analysis techniques and a formal literature review to answer the proposed research questions.
The research reveals methods such as support vector machines and random forests to be
standard machine learning methods for malware classification in efforts to detect maliciousness
or categorize malware by family. Machine learning is a highly researched technology with
many applications, from malware classification and beyond.
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
This document discusses several new methods for detecting malware, including CPU analyzers, holography, eigenvirus detection, differential fault analysis, and whitelist protection. It notes that due to a focus on deobfuscation, these ideas have only recently been explored and are still underdeveloped. Specific methods like CPU analyzers and holography are examined in more detail.
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSIJNSA Journal
This document summarizes a survey paper on malware detection and analysis tools. It provides an overview of different types of malware like viruses, worms, Trojans, rootkits, spyware and keyloggers. It describes techniques for malware analysis, including static analysis which examines code without execution, and dynamic analysis which analyzes behavior during execution. It also lists some limitations of static analysis and the need for dynamic analysis. Finally, it discusses various tools available for malware detection, analysis, reverse engineering and debugging.
Optimised malware detection in digital forensicsIJNSA Journal
On the Internet, malware is one of the most serious threats to system security. Most complex issues and
problems on any systems are caused by malware and spam. Networks and systems can be accessed and
compromised by malware known as botnets, which compromise other systems through a coordinated
attack. Such malware uses anti-forensic techniques to avoid detection and investigation. To prevent systems
from the malicious activity of this malware, a new framework is required that aims to develop an optimised
technique for malware detection. Hence, this paper demonstrates new approaches to perform malware
analysis in forensic investigations and discusses how such a framework may be developed.
Optimised Malware Detection in Digital Forensics IJNSA Journal
This summarizes a research paper that proposes developing a new framework to optimize malware detection in digital forensics investigations. The paper discusses challenges with existing detection methods, such as signature-based approaches requiring extensive manual analysis. Through a market research survey of forensics professionals, the paper finds weaknesses in current skills, tools, and accuracy rates. Most respondents agreed a new customized detection tool is needed that employs both dynamic and static analysis methods. The proposed framework aims to address these issues to more effectively detect and analyze malware.
This document discusses using data mining techniques to detect spyware. It begins by defining spyware and artificial intelligence. It then discusses three AI approaches that have been applied to spyware detection: heuristic technology, neural network technology, and data mining techniques. It focuses on using breadth-first search (BFS) within a data mining approach. The document finds that data mining techniques achieve an overall accuracy of 90.5% in detecting spyware, performing better than traditional signature-based or heuristic-based methods.
Utilization Data Mining to Detect Spyware IOSR Journals
This document discusses using data mining techniques to detect spyware. It begins by defining spyware and artificial intelligence. It then discusses three AI approaches that have been applied to spyware detection: heuristic technology, neural network technology, and data mining techniques. It focuses on using breadth-first search (BFS) within a data mining approach. The document finds that data mining techniques perform better than traditional signature-based or heuristic-based detection methods, achieving an overall accuracy of 90.5% at detecting spyware using BFS algorithms.
An efficient control of virus propagationUltraUploader
This document discusses the development of an Efficient Control of Virus Propagation (ECOVP) system using case-based reasoning and object-oriented methodology. It conducted a questionnaire survey that found many computer users in Malaysia lack awareness of computer viruses and there is a need for an effective system to guide users in handling virus incidents. The ECOVP system was developed to educate users and help control virus propagation by providing customized solutions based on the symptoms users describe. It was tested for accuracy and usability and found to successfully help users clean infected machines and prevent future infections.
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...IJCI JOURNAL
With a text mining and bibliometrics approach, this study reviews the literature on the evolution
of malware classification using machine learning. This work takes literature from 2008 to 2022
on the subject of using machine learning for malware classification to understand the impact of
this technology on malware classification. Throughout this study, we seek to answer three main
research questions: RQ1: Is the application of machine learning for malware classification
growing? RQ2: What is the most common machine-learning application for malware
classification? RQ3: What are the outcomes of the most common machine learning
applications? The analysis of 2186 articles resulting from a data collection process from peerreviewed databases shows the trajectory of the application of this technology on malware
classification as well as trends in both the machine learning and malware classification fields of
study. This study performs quantitative and qualitative analysis using statistical and N-gram
analysis techniques and a formal literature review to answer the proposed research questions.
The research reveals methods such as support vector machines and random forests to be
standard machine learning methods for malware classification in efforts to detect maliciousness
or categorize malware by family. Machine learning is a highly researched technology with
many applications, from malware classification and beyond.
A framework for modelling trojans and computer virus infectionUltraUploader
This document proposes a framework for modeling trojans and computer viruses. It begins by noting the limitations of viewing computers as finite state machines like Turing machines, as viruses require interaction between systems. The document then outlines different categories of trojans before defining the three core components of a viral infection: a trojan component to do unwanted things, a dormancy component to conceal itself, and an infective component to spread to other programs/systems. The goal is to understand these phenomena without relying on biological metaphors or limited experiences.
X-ware: a proof of concept malware utilizing artificial intelligenceIJECEIAES
Recent years have witnessed a dramatic growth in utilizing computational intelligence techniques for various domains. Coherently, malicious actors are expected to utilize these techniques against current security solutions. Despite the importance of these new potential threats, there remains a paucity of evidence on leveraging these research literature techniques. This article investigates the possibility of combining artificial neural networks and swarm intelligence to generate a new type of malware. We successfully created a proof of concept malware named X-ware, which we tested against the Windows-based systems. Developing this proof of concept may allow us to identify this potential threat’s characteristics for developing mitigation methods in the future. Furthermore, a method for recording the virus’s behavior and propagation throughout a file system is presented. The proposed virus prototype acts as a swarm system with a neural network-integrated for operations. The virus’s behavioral data is recorded and shown under a complex network format to describe the behavior and communication of the swarm. This paper has demonstrated that malware strengthened with computational intelligence is a credible threat. We envisage that our study can be utilized to assist current and future security researchers to help in implementing more effective countermeasures.
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Darshan Gorasiya
Analysis of Malware Infected Systems with MapReduce, Pig, Hive, SparkSQL & Classification with Spark MLlib Gradient-boosted Tree on Big Data Platform (Hadoop)
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET Journal
The document discusses a proposed method for detecting viruses and malware that evade existing antivirus software. It uses a combination of analyzing files with VirusTotal's database of known threats and applying natural language processing techniques like suffix trees and TF-IDF to identify malicious patterns in files. An evaluation shows the proposed method can detect viruses that existing antivirus and VirusTotal miss, achieving a 97% accuracy rate in testing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that proposes new schemes called Power Spectral Density (PSD) and Spectral Flatness Measure (SFM) to detect camouflaging worms (C-worms). C-worms are a new type of worm that can hide their traffic patterns to avoid detection by existing anti-worm software. The proposed schemes aim to differentiate C-worm traffic from normal background traffic and normal worm traffic in the frequency domain, since their traffic patterns cannot be differentiated in the time domain. The results of applying PSD and SFM showed they were effective in detecting C-worms while existing detection systems could not distinguish C-worm and normal worm traffic.
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...IOSR Journals
This document summarizes a research paper that proposes new schemes called Power Spectral Density (PSD) and Spectral Flatness Measure (SFM) to detect camouflaging worms (C-worms). C-worms can hide their scan traffic to avoid detection by traditional anti-worm software. The schemes are based on analyzing differences between normal worm traffic and C-worm traffic in the frequency domain, since they cannot be differentiated in the time domain. Experimental results showed that PSD and SFM were effective at detecting C-worms by identifying differences in their scan traffic patterns compared to normal worms when analyzed in the frequency domain. The document provides background on worms, C-worm modeling and propagation, and evaluates the
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIESIJNSA Journal
This document compares two methodologies for malware analysis: MARE and SAMA. MARE was the first structured malware analysis methodology, introduced in 2010, and consisted of four phases: detection, isolation/extraction, behavioral analysis, and code analysis/reverse engineering. SAMA was introduced more recently in 2020 to address challenges posed by increasingly sophisticated malware. It retains the same four phases but renames and restructures them. The document analyzes the phases of each methodology and compares their approaches. It finds that SAMA's initial phase of establishing an analysis environment before beginning analysis is preferable to MARE's approach of starting with detection.
Cyber Malware Programs And The InternetHeidi Maestas
Malware programs have increased with greater internet usage, infecting systems and threatening security. There are various types of malware like viruses, trojans, worms, spyware and adware that infect systems through emails, downloads and other methods. While technologies like firewalls, antivirus software and encryption help secure systems and networks, the growing sophistication of malware poses ongoing challenges to internet security. Teaching users about malware types and prevention methods is important for protecting systems and information.
This document summarizes a research paper on developing a honey pot intrusion detection system. The paper introduces cyber warfare as a growing threat and the need for effective network security. It then describes designing and implementing a honey pot IDS to detect potential threats on a host system by emulating network services and monitoring connections. The IDS would use event correlation, log analysis, alerting and policy enforcement. The document provides background on intrusions, IDS testing methodology, and reasons why only creating secure systems is not enough to prevent all intrusions.
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...CSCJournals
Some malware are sophisticated with polymorphic techniques such as self-mutation and emulation based analysis evasion. Most anti-malware techniques are overwhelmed by the polymorphic malware threats that self-mutate with different variants at every attack. This research aims to contribute to the detection of malicious codes, especially polymorphic malware by utilizing advanced static and advanced dynamic analyses for extraction of more informative key features of a malware through code analysis, memory analysis and behavioral analysis. Correlation based feature selection algorithm will be used to transform features; i.e. filtering and selecting optimal and relevant features. A machine learning technique called K-Nearest Neighbor (K-NN) will be used for classification and detection of polymorphic malware. Evaluation of results will be based on the following measurement metrics-True Positive Rate (TPR), False Positive Rate (FPR) and the overall detection accuracy of experiments.
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSIJNSA Journal
Malware writers have employed various obfuscation and polymorphism techniques to thwart static analysis
approaches and bypassing antivirus tools. Dynamic analysis techniques, however, have essentially
overcome these deceits by observing the actual behaviour of the code execution. In this regard, various
methods, techniques and tools have been proposed. However, because of the diverse concepts and
strategies used in the implementation of these methods and tools, security researchers and malware
analysts find it difficult to select the required optimum tool to investigate the behaviour of a malware and to
contain the associated risk for their study. Focusing on two dynamic analysis techniques: Function Call
monitoring and Information Flow Tracking, this paper presents a comparison framework for dynamic
malware analysis tools. The framework will assist the researchers and analysts to recognize the tool’s
implementation strategy, analysis approach, system-wide analysis support and its overall handling of
binaries, helping them to select a suitable and effective one for their study and analysis.
Biologically inspired defenses against computer virusesUltraUploader
This document discusses two biologically inspired approaches to computer virus detection and removal: a neural network virus detector that learns to identify infected and uninfected programs, and a computer immune system that can automatically identify, analyze, and remove new viruses from a system. The neural network technique has been incorporated into an IBM commercial antivirus product, while the computer immune system is still in prototype form. Both aim to replace human analysis of viruses to allow faster response times needed to address increasing rates of new virus creation and spread.
Security against Web Application Attacks Using Ontology Based Intrusion Detec...IRJET Journal
The document presents a proposed ontology-based intrusion detection system to provide security against web application attacks. The system aims to address limitations of existing signature-based intrusion detection systems, such as high false positive and negative rates. The proposed system uses an ontology created with Protege to model web application attacks, vulnerabilities, threats and security controls. Rules are also defined to allow the system to predict and classify attacks based on the ontology. The system architecture includes components for system analysis, interface, rule engine, ontology generation and a knowledge base. The system is evaluated on its ability to detect common web attacks like SQL injection, cross-site scripting and buffer overflow attacks.
Abstract: The exponential growth of the internet and new technology lead today's world in a hectic situation both positive as well as the negative module. Cybercriminals gamble in the dark net using numerous techniques. This leads to cybercrime. Cyber threats like Malware attempt to infiltrate the computer or mobile device offline or internet, chat(online), and anyone can be a potential target. Malware is also known as malicious software is often used by cybercriminals to achieve their goal by tracking internet activity, capturing sensitive information, or blocking computer access. Reverse engineering is one of the best ways to prevent and is a powerful tool to keep the fight against cyber attacks. Most people in the cyber world see it as a black hat—It is said as being used to steal data and intellectual property. But when it is in the hands of cybersecurity experts, reverse engineering dons the white hat of the hero. Looking at the program from the outside in –often by a third party that had no hand in writing the code. It allows those who practice it to understand how a given program or system works when no source code is available. Reverse engineering accomplishing several tasks related to cybersecurity: finding system vulnerabilities, researching malware &analyzing the complexity of restoring core software algorithms that can further protect against theft. It is hard to hack certain software.
Keywords: Malware, threat, vulnerablity, detection, reverse engineering, analysis.
Title: Malware analysis and detection using reverse Engineering
Author: B.Rashmitha, J. Alwina Beauty Angelin, E.R. Ramesh
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Vol. 10, Issue 2, Month: April 2022 - June 2022
Page: (1-4)
Published Date: 01-April-2022
Research Publish Journals
Available at: www.researchpublish.com
You can Direct download full research paper at given below link:
https://www.researchpublish.com/papers/malware-analysis-and-detection-using-reverse-engineering
Academia Link: https://www.academia.edu/76069664/Malware_analysis_and_detection_using_reverse_Engineering_Available_at_www_researchpublish_com_journal_name_International_Journal_of_Computer_Science_and_Information_Technology_Research
Running head: Project Plan 1
PROJECT PLAN 7
Network Security Project Plan
Student Name
University Affiliation
Network Security Project Plan
Wireless networks have increased chances of security attacks either passively or actively. The attacks usually have the ability to affect the function of the network and expose the users to additional security risks as well. Attackers and online hackers prefer phishing out classified information and using the information acquired to target the website or institution and its clients. Therefore, there is much need for additional security measures to secure company websites and guarantee effective and successful navigations in the respective networks. The paper seeks to determine the possible forms of user attacks that can be launched by the hackers and determine the degree of severity it can have on online operations. The research will be based on available readings as well as data obtained from the selected users. The selected users will be required to participate in a survey and fill out an online questionnaire on security measures. The questionnaire used is such that it allows for dual data collection. In that, it can be used to obtain critical information for both network users and hackers as well.
The use of research to determine causal factors of wireless networks insecurity
The research will rely on available materials to determine the causes and determinants of network risks. The readings will help provide additional information on the various factors that attract attackers and how networks can be set up to avoid such instances and mitigate the effects of cyber and network attacks. The lack of enough information calls for additional research on network insecurities to enable researchers to understand the factors that enhance and attract malicious network activities. Also, the research will help determine the types of networks that are most susceptible to attacks and how the hackers and phishers perceive various information system networks (Silva, Santos &Nogueira, 2015). This information will help the reader understand the importance of an effective network security plan and how organizations and systems can be tailored to offer secure connections to the various users of the networks. The resources used for research are peer reviewed journals and books that offer additional insight on network security risks. The resources used are diverse to ensure that enough information is obtained on the various threats and possible remedies as well.
At this stage, the research method will be designed based on the required data. First, after determining the scope of the research, the researchers at this stage should conduct intense analysis on the most appropriate ...
Invesitigation of Malware and Forensic Tools on Internet IJECEIAES
Malware is an application that is harmful to your forensic information. Basically, malware analyses is the process of analysing the behaviours of malicious code and then create signatures to detect and defend against it.Malware, such as Trojan horse, Worms and Spyware severely threatens the forensic security. This research observed that although malware and its variants may vary a lot from content signatures, they share some behaviour features at a higher level which are more precise in revealing the real intent of malware. This paper investigates the various techniques of malware behaviour extraction and analysis. In addition, we discuss the implications of malware analysis tools for malware detection based on various techniques.
The document presents a two-layer epidemic model for analyzing malware propagation in large-scale networks. The model calculates how many networks have been compromised over time based on the susceptible-infected model, and then calculates how many hosts within each compromised network have been infected. Theoretical analysis of the model finds that malware distribution follows an exponential distribution early on, a power law distribution with a short exponential tail later, and a pure power law distribution finally. Experiments on real-world Android and Conficker malware datasets confirm these theoretical findings. The two-layer model provides a better representation of malware propagation in large-scale networks compared to traditional single-layer epidemic models.
Case Study RubricCriterionStrongAverageWeakInt.docxdrennanmicah
Case Study Rubric
Criterion
Strong
Average
Weak
Introduction / Primary Problem, Issue or Question Identification
States the case objective and clearly defines the problem, issue or question
Minimally describes the case, includes only the problem, issue or question
Bypasses the introduction and moves directly to commentary on the case
Understanding of Primary Problem, Issue or Question
Identifies and demonstrates a sophisticated understanding of the primary issues and or problems in the case study
Identifies and demonstrates an accomplished understanding of most of the issues/problems
Identifies and demonstrates acceptable understanding of some of the issues/problems in the case study
Analysis and Evaluation of Issues/Problems
Presents an insightful and thorough analysis of all identified problems, issues or questions; includes all necessary calculations
Presents a thorough analysis of most of the problems, issues or questions identified; missing some necessary calculations
Presents a superficial or incomplete analysis of some of the identified problems, issues or questions; omits necessary calculations
Recommendations on Effective
Solution
s/Strategies
Supports diagnosis and opinions with convincing arguments and evidence; presents a balanced and critical view; interpretation is both reasonable and objective
. Recommendations logically supported
Supports diagnosis and opinions with limited reasoning and evidence; presents a one‐sided argument; demonstrates little engagement with ideas presented. Illogical recommendations
Little or no action suggested, and/or ineffective or disconnected solutions proposed to the issues in the case study. No attempt at logical support for recommendations
Links to Course Readings and Additional Research
Makes appropriate and powerful connections between identified issues/problems and the strategic concepts studied in the course readings and lectures; supplements case study with relevant and thoughtful research and identifies all sources of information
Makes appropriate but vague connections between identified issues/problems and concepts studied in readings and lectures; demonstrates limited command of the analytical tools studied; supplements case study with limited sources
Makes ineffective connections or shows no connection between issues identified and the concepts studied in the readings; supplements case study, if at all, with incomplete information and sources
Writing Mechanics and Formatting Guidelines
Demonstrates a clear understanding of the audience for the case. Utilizes formatting, clarity and structure to enable the audience to readily see and understand recommended actions. Writing is logical, grammatically correct, spelling is error free
Demonstrates a limited understanding of the audience for the case. Ineffective structuring of response making it difficult to readily see and understand recommended actions. Writing shows poor logic, grammatical and spelli.
Case Study Rubric Directly respond to each questi.docxdrennanmicah
Case Study Rubric
Directly respond to each question providing background to support your
response. (2 points)
Apply at least 2 concepts from the chapter material in the class text,
“Leadership; theory. Application and Skill Development.” Reference to,
“The Handbook of Leaders,” is a welcome addition. (2 points)
Apply your critical thinking skills. (2 points)
o A well cultivated critical thinker:
Raises vital questions and problems, formulating them
clearly and precisely;
Gathers and assesses relevant information, using abstract
ideas to interpret it effectively comes to well-reasoned
conclusions and solutions, testing them against relevant
criteria and standards;
Thinks open-mindedly within alternative systems of thought,
recognizing and assessing, as need be, their assumptions,
implications, and practical consequences; and
Communicates effectively with others in figuring out
solutions to complex problems.
o Taken from Richard Paul and Linda Elder, The Miniature Guide to
Critical Thinking Concepts and Tools, Foundation for Critical
Thinking Press, 2008
Case Studies must be submitted in the following format:
o Clearly title each in a word document with name, date, week etc.
o Must include clearly written and thoughtful narrative
o Post as a response in Blackboard
66352_FM_ptg01_i-xxviii.indd 4 10/21/14 12:16 AM
Australia • Brazil • Mexico • Singapore • United Kingdom • United States
Robert N. Lussier, Ph.D.
Spring field College
Christopher F. Achua, D.B.A.
University of Virginia’s College at Wise
S I X T H E D I T I O N
Leadership
THEORY, APPLICATION,
& SKILL DE VELOPMENT
66352_FM_ptg01_i-xxviii.indd 1 10/21/14 12:16 AM
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
66352_FM_ptg01_i-xxviii.indd 4 10/21/14 12:16 AM
This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.
Important Notice: Media content referenced within the product description or the product
text may not be a.
More Related Content
Similar to 1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
A framework for modelling trojans and computer virus infectionUltraUploader
This document proposes a framework for modeling trojans and computer viruses. It begins by noting the limitations of viewing computers as finite state machines like Turing machines, as viruses require interaction between systems. The document then outlines different categories of trojans before defining the three core components of a viral infection: a trojan component to do unwanted things, a dormancy component to conceal itself, and an infective component to spread to other programs/systems. The goal is to understand these phenomena without relying on biological metaphors or limited experiences.
X-ware: a proof of concept malware utilizing artificial intelligenceIJECEIAES
Recent years have witnessed a dramatic growth in utilizing computational intelligence techniques for various domains. Coherently, malicious actors are expected to utilize these techniques against current security solutions. Despite the importance of these new potential threats, there remains a paucity of evidence on leveraging these research literature techniques. This article investigates the possibility of combining artificial neural networks and swarm intelligence to generate a new type of malware. We successfully created a proof of concept malware named X-ware, which we tested against the Windows-based systems. Developing this proof of concept may allow us to identify this potential threat’s characteristics for developing mitigation methods in the future. Furthermore, a method for recording the virus’s behavior and propagation throughout a file system is presented. The proposed virus prototype acts as a swarm system with a neural network-integrated for operations. The virus’s behavioral data is recorded and shown under a complex network format to describe the behavior and communication of the swarm. This paper has demonstrated that malware strengthened with computational intelligence is a credible threat. We envisage that our study can be utilized to assist current and future security researchers to help in implementing more effective countermeasures.
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Darshan Gorasiya
Analysis of Malware Infected Systems with MapReduce, Pig, Hive, SparkSQL & Classification with Spark MLlib Gradient-boosted Tree on Big Data Platform (Hadoop)
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET Journal
The document discusses a proposed method for detecting viruses and malware that evade existing antivirus software. It uses a combination of analyzing files with VirusTotal's database of known threats and applying natural language processing techniques like suffix trees and TF-IDF to identify malicious patterns in files. An evaluation shows the proposed method can detect viruses that existing antivirus and VirusTotal miss, achieving a 97% accuracy rate in testing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that proposes new schemes called Power Spectral Density (PSD) and Spectral Flatness Measure (SFM) to detect camouflaging worms (C-worms). C-worms are a new type of worm that can hide their traffic patterns to avoid detection by existing anti-worm software. The proposed schemes aim to differentiate C-worm traffic from normal background traffic and normal worm traffic in the frequency domain, since their traffic patterns cannot be differentiated in the time domain. The results of applying PSD and SFM showed they were effective in detecting C-worms while existing detection systems could not distinguish C-worm and normal worm traffic.
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...IOSR Journals
This document summarizes a research paper that proposes new schemes called Power Spectral Density (PSD) and Spectral Flatness Measure (SFM) to detect camouflaging worms (C-worms). C-worms can hide their scan traffic to avoid detection by traditional anti-worm software. The schemes are based on analyzing differences between normal worm traffic and C-worm traffic in the frequency domain, since they cannot be differentiated in the time domain. Experimental results showed that PSD and SFM were effective at detecting C-worms by identifying differences in their scan traffic patterns compared to normal worms when analyzed in the frequency domain. The document provides background on worms, C-worm modeling and propagation, and evaluates the
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIESIJNSA Journal
This document compares two methodologies for malware analysis: MARE and SAMA. MARE was the first structured malware analysis methodology, introduced in 2010, and consisted of four phases: detection, isolation/extraction, behavioral analysis, and code analysis/reverse engineering. SAMA was introduced more recently in 2020 to address challenges posed by increasingly sophisticated malware. It retains the same four phases but renames and restructures them. The document analyzes the phases of each methodology and compares their approaches. It finds that SAMA's initial phase of establishing an analysis environment before beginning analysis is preferable to MARE's approach of starting with detection.
Cyber Malware Programs And The InternetHeidi Maestas
Malware programs have increased with greater internet usage, infecting systems and threatening security. There are various types of malware like viruses, trojans, worms, spyware and adware that infect systems through emails, downloads and other methods. While technologies like firewalls, antivirus software and encryption help secure systems and networks, the growing sophistication of malware poses ongoing challenges to internet security. Teaching users about malware types and prevention methods is important for protecting systems and information.
This document summarizes a research paper on developing a honey pot intrusion detection system. The paper introduces cyber warfare as a growing threat and the need for effective network security. It then describes designing and implementing a honey pot IDS to detect potential threats on a host system by emulating network services and monitoring connections. The IDS would use event correlation, log analysis, alerting and policy enforcement. The document provides background on intrusions, IDS testing methodology, and reasons why only creating secure systems is not enough to prevent all intrusions.
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...CSCJournals
Some malware are sophisticated with polymorphic techniques such as self-mutation and emulation based analysis evasion. Most anti-malware techniques are overwhelmed by the polymorphic malware threats that self-mutate with different variants at every attack. This research aims to contribute to the detection of malicious codes, especially polymorphic malware by utilizing advanced static and advanced dynamic analyses for extraction of more informative key features of a malware through code analysis, memory analysis and behavioral analysis. Correlation based feature selection algorithm will be used to transform features; i.e. filtering and selecting optimal and relevant features. A machine learning technique called K-Nearest Neighbor (K-NN) will be used for classification and detection of polymorphic malware. Evaluation of results will be based on the following measurement metrics-True Positive Rate (TPR), False Positive Rate (FPR) and the overall detection accuracy of experiments.
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSIJNSA Journal
Malware writers have employed various obfuscation and polymorphism techniques to thwart static analysis
approaches and bypassing antivirus tools. Dynamic analysis techniques, however, have essentially
overcome these deceits by observing the actual behaviour of the code execution. In this regard, various
methods, techniques and tools have been proposed. However, because of the diverse concepts and
strategies used in the implementation of these methods and tools, security researchers and malware
analysts find it difficult to select the required optimum tool to investigate the behaviour of a malware and to
contain the associated risk for their study. Focusing on two dynamic analysis techniques: Function Call
monitoring and Information Flow Tracking, this paper presents a comparison framework for dynamic
malware analysis tools. The framework will assist the researchers and analysts to recognize the tool’s
implementation strategy, analysis approach, system-wide analysis support and its overall handling of
binaries, helping them to select a suitable and effective one for their study and analysis.
Biologically inspired defenses against computer virusesUltraUploader
This document discusses two biologically inspired approaches to computer virus detection and removal: a neural network virus detector that learns to identify infected and uninfected programs, and a computer immune system that can automatically identify, analyze, and remove new viruses from a system. The neural network technique has been incorporated into an IBM commercial antivirus product, while the computer immune system is still in prototype form. Both aim to replace human analysis of viruses to allow faster response times needed to address increasing rates of new virus creation and spread.
Security against Web Application Attacks Using Ontology Based Intrusion Detec...IRJET Journal
The document presents a proposed ontology-based intrusion detection system to provide security against web application attacks. The system aims to address limitations of existing signature-based intrusion detection systems, such as high false positive and negative rates. The proposed system uses an ontology created with Protege to model web application attacks, vulnerabilities, threats and security controls. Rules are also defined to allow the system to predict and classify attacks based on the ontology. The system architecture includes components for system analysis, interface, rule engine, ontology generation and a knowledge base. The system is evaluated on its ability to detect common web attacks like SQL injection, cross-site scripting and buffer overflow attacks.
Abstract: The exponential growth of the internet and new technology lead today's world in a hectic situation both positive as well as the negative module. Cybercriminals gamble in the dark net using numerous techniques. This leads to cybercrime. Cyber threats like Malware attempt to infiltrate the computer or mobile device offline or internet, chat(online), and anyone can be a potential target. Malware is also known as malicious software is often used by cybercriminals to achieve their goal by tracking internet activity, capturing sensitive information, or blocking computer access. Reverse engineering is one of the best ways to prevent and is a powerful tool to keep the fight against cyber attacks. Most people in the cyber world see it as a black hat—It is said as being used to steal data and intellectual property. But when it is in the hands of cybersecurity experts, reverse engineering dons the white hat of the hero. Looking at the program from the outside in –often by a third party that had no hand in writing the code. It allows those who practice it to understand how a given program or system works when no source code is available. Reverse engineering accomplishing several tasks related to cybersecurity: finding system vulnerabilities, researching malware &analyzing the complexity of restoring core software algorithms that can further protect against theft. It is hard to hack certain software.
Keywords: Malware, threat, vulnerablity, detection, reverse engineering, analysis.
Title: Malware analysis and detection using reverse Engineering
Author: B.Rashmitha, J. Alwina Beauty Angelin, E.R. Ramesh
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Vol. 10, Issue 2, Month: April 2022 - June 2022
Page: (1-4)
Published Date: 01-April-2022
Research Publish Journals
Available at: www.researchpublish.com
You can Direct download full research paper at given below link:
https://www.researchpublish.com/papers/malware-analysis-and-detection-using-reverse-engineering
Academia Link: https://www.academia.edu/76069664/Malware_analysis_and_detection_using_reverse_Engineering_Available_at_www_researchpublish_com_journal_name_International_Journal_of_Computer_Science_and_Information_Technology_Research
Running head: Project Plan 1
PROJECT PLAN 7
Network Security Project Plan
Student Name
University Affiliation
Network Security Project Plan
Wireless networks have increased chances of security attacks either passively or actively. The attacks usually have the ability to affect the function of the network and expose the users to additional security risks as well. Attackers and online hackers prefer phishing out classified information and using the information acquired to target the website or institution and its clients. Therefore, there is much need for additional security measures to secure company websites and guarantee effective and successful navigations in the respective networks. The paper seeks to determine the possible forms of user attacks that can be launched by the hackers and determine the degree of severity it can have on online operations. The research will be based on available readings as well as data obtained from the selected users. The selected users will be required to participate in a survey and fill out an online questionnaire on security measures. The questionnaire used is such that it allows for dual data collection. In that, it can be used to obtain critical information for both network users and hackers as well.
The use of research to determine causal factors of wireless networks insecurity
The research will rely on available materials to determine the causes and determinants of network risks. The readings will help provide additional information on the various factors that attract attackers and how networks can be set up to avoid such instances and mitigate the effects of cyber and network attacks. The lack of enough information calls for additional research on network insecurities to enable researchers to understand the factors that enhance and attract malicious network activities. Also, the research will help determine the types of networks that are most susceptible to attacks and how the hackers and phishers perceive various information system networks (Silva, Santos &Nogueira, 2015). This information will help the reader understand the importance of an effective network security plan and how organizations and systems can be tailored to offer secure connections to the various users of the networks. The resources used for research are peer reviewed journals and books that offer additional insight on network security risks. The resources used are diverse to ensure that enough information is obtained on the various threats and possible remedies as well.
At this stage, the research method will be designed based on the required data. First, after determining the scope of the research, the researchers at this stage should conduct intense analysis on the most appropriate ...
Invesitigation of Malware and Forensic Tools on Internet IJECEIAES
Malware is an application that is harmful to your forensic information. Basically, malware analyses is the process of analysing the behaviours of malicious code and then create signatures to detect and defend against it.Malware, such as Trojan horse, Worms and Spyware severely threatens the forensic security. This research observed that although malware and its variants may vary a lot from content signatures, they share some behaviour features at a higher level which are more precise in revealing the real intent of malware. This paper investigates the various techniques of malware behaviour extraction and analysis. In addition, we discuss the implications of malware analysis tools for malware detection based on various techniques.
The document presents a two-layer epidemic model for analyzing malware propagation in large-scale networks. The model calculates how many networks have been compromised over time based on the susceptible-infected model, and then calculates how many hosts within each compromised network have been infected. Theoretical analysis of the model finds that malware distribution follows an exponential distribution early on, a power law distribution with a short exponential tail later, and a pure power law distribution finally. Experiments on real-world Android and Conficker malware datasets confirm these theoretical findings. The two-layer model provides a better representation of malware propagation in large-scale networks compared to traditional single-layer epidemic models.
Similar to 1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx (20)
Case Study RubricCriterionStrongAverageWeakInt.docxdrennanmicah
Case Study Rubric
Criterion
Strong
Average
Weak
Introduction / Primary Problem, Issue or Question Identification
States the case objective and clearly defines the problem, issue or question
Minimally describes the case, includes only the problem, issue or question
Bypasses the introduction and moves directly to commentary on the case
Understanding of Primary Problem, Issue or Question
Identifies and demonstrates a sophisticated understanding of the primary issues and or problems in the case study
Identifies and demonstrates an accomplished understanding of most of the issues/problems
Identifies and demonstrates acceptable understanding of some of the issues/problems in the case study
Analysis and Evaluation of Issues/Problems
Presents an insightful and thorough analysis of all identified problems, issues or questions; includes all necessary calculations
Presents a thorough analysis of most of the problems, issues or questions identified; missing some necessary calculations
Presents a superficial or incomplete analysis of some of the identified problems, issues or questions; omits necessary calculations
Recommendations on Effective
Solution
s/Strategies
Supports diagnosis and opinions with convincing arguments and evidence; presents a balanced and critical view; interpretation is both reasonable and objective
. Recommendations logically supported
Supports diagnosis and opinions with limited reasoning and evidence; presents a one‐sided argument; demonstrates little engagement with ideas presented. Illogical recommendations
Little or no action suggested, and/or ineffective or disconnected solutions proposed to the issues in the case study. No attempt at logical support for recommendations
Links to Course Readings and Additional Research
Makes appropriate and powerful connections between identified issues/problems and the strategic concepts studied in the course readings and lectures; supplements case study with relevant and thoughtful research and identifies all sources of information
Makes appropriate but vague connections between identified issues/problems and concepts studied in readings and lectures; demonstrates limited command of the analytical tools studied; supplements case study with limited sources
Makes ineffective connections or shows no connection between issues identified and the concepts studied in the readings; supplements case study, if at all, with incomplete information and sources
Writing Mechanics and Formatting Guidelines
Demonstrates a clear understanding of the audience for the case. Utilizes formatting, clarity and structure to enable the audience to readily see and understand recommended actions. Writing is logical, grammatically correct, spelling is error free
Demonstrates a limited understanding of the audience for the case. Ineffective structuring of response making it difficult to readily see and understand recommended actions. Writing shows poor logic, grammatical and spelli.
Case Study Rubric Directly respond to each questi.docxdrennanmicah
Case Study Rubric
Directly respond to each question providing background to support your
response. (2 points)
Apply at least 2 concepts from the chapter material in the class text,
“Leadership; theory. Application and Skill Development.” Reference to,
“The Handbook of Leaders,” is a welcome addition. (2 points)
Apply your critical thinking skills. (2 points)
o A well cultivated critical thinker:
Raises vital questions and problems, formulating them
clearly and precisely;
Gathers and assesses relevant information, using abstract
ideas to interpret it effectively comes to well-reasoned
conclusions and solutions, testing them against relevant
criteria and standards;
Thinks open-mindedly within alternative systems of thought,
recognizing and assessing, as need be, their assumptions,
implications, and practical consequences; and
Communicates effectively with others in figuring out
solutions to complex problems.
o Taken from Richard Paul and Linda Elder, The Miniature Guide to
Critical Thinking Concepts and Tools, Foundation for Critical
Thinking Press, 2008
Case Studies must be submitted in the following format:
o Clearly title each in a word document with name, date, week etc.
o Must include clearly written and thoughtful narrative
o Post as a response in Blackboard
66352_FM_ptg01_i-xxviii.indd 4 10/21/14 12:16 AM
Australia • Brazil • Mexico • Singapore • United Kingdom • United States
Robert N. Lussier, Ph.D.
Spring field College
Christopher F. Achua, D.B.A.
University of Virginia’s College at Wise
S I X T H E D I T I O N
Leadership
THEORY, APPLICATION,
& SKILL DE VELOPMENT
66352_FM_ptg01_i-xxviii.indd 1 10/21/14 12:16 AM
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
66352_FM_ptg01_i-xxviii.indd 4 10/21/14 12:16 AM
This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.
Important Notice: Media content referenced within the product description or the product
text may not be a.
Case Study Scenario Part 3IntroductionThis media piece exp.docxdrennanmicah
Case Study Scenario Part 3
Introduction
This media piece explains four ethical theories in order to prepare you for the Unit 3 assignment,
Case Study Resolution
. This media piece also includes parts 1 and 2 of the case study videos for your review.
Part 3
Deontology
The ethical position to do what is right out of duty or obligation. It is often called rule-based ethics.
Deontology has been described as "absolutist," "universal," and "impersonal" (Kant, 1785/1959). It prioritizes absolute obligations over consequences. In this moral framework, ethical decision making is the rational act of applying universal principles to all situations irrespective of specific relations, contexts, or consequences. This reflects Immanuel Kant's conviction that ethical decisions cannot vary or be influenced by special circumstances or relationships. Rather, a decision is "moral" only if a rational person believes the act resulting from the decision should be universally followed in all situations. For Kant, respect for the worth of all persons was one such universal principle. A course of action that results in a person being used simply as a means for others' gains would ethically unacceptable.
With respect to deception in research, from a deontological perspective, since we would not believe it moral to intentionally deceive individuals in some other context, neither potential benefits to society nor the effectiveness of participant debriefing for a particular deception study can morally justify intentionally deceiving persons about the purpose or nature of a research study. Further, deception in research would not be ethically permissible since intentionally disguising the nature of the study for the goals of research violates the moral obligation to respect each participant's intrinsic worth by undermining individuals' right to make rational and autonomous decisions regarding participation (Fisher & Fyrberg, 1994).
Utilitarianism
The ethical position depends on the consequences of the action with the goal being producing the most good.
Utilitarian theory prioritizes the consequences (or utility) of an act over the application of universal principles (Mill, 1861/1957). From this perspective, an ethical decision is situation specific and must be governed by a risk-benefit calculus that determines which act will produce the greatest possible balance of good over bad consequences. An "act utilitarian" makes an ethical decision by evaluating the consequences of an act for a given situation. A "rule utilitarian" makes an ethical decision by evaluating whether following a general rule in all similar situation would create the greater good. Like deontology, utilitarianism is impersonal: It does not take into account interpersonal and relational features of ethical responsibility. From this perspective, psychologists' obligations to those with whom they work can be superseded by an action that would produce a greater good for others (Fisher, 1999).
A ps.
Case Study RubricYour case study will be assessed as follows•.docxdrennanmicah
The document discusses Chevron Corporation's evolution of IT infrastructure to better support its global energy operations. It describes how Chevron uses Supervisory Control and Data Acquisition (SCADA) systems and sensors to monitor and optimize operations at its refineries. It also discusses Chevron's use of enterprise applications like SAP ERP and its move to cloud computing and business-focused web services. Finally, it outlines Chevron's vision for future infrastructure including increased use of mobility, analytics, and social media.
Case study RubricCriterionOutstanding 3.75Very Good 3 .docxdrennanmicah
Case study Rubric
Criterion
Outstanding 3.75
Very Good 3
Good 2.5
Unacceptable 1
Score
Completeness
Complete in all respects; reflects all requirements
Complete in most respects; reflects most requirements
Incomplete many respects; reflects few requirements
Incomplete in most respects; does not reflect requirements
Understanding
Demonstrates excellent understanding of the topic(s) and issue(s)
Demonstrates an accomplished understanding of the topic(s) and issue(s)
Demonstrates an acceptable understanding of the topic(s) and issue(s)
Demonstrates an inadequate understanding of the topic(s) and issue(s)
Analysis
Presents an insightful and through analysis of the issue (s) identified
Presents a thorough analysis of most of the issue(s) identified
Presents a superficial analysis of some of the issue(s) identified
Presents an incomplete analysis of the issue(s) identified.
Evaluation
Makes appropriate and powerful connections between the issue(s) identified and the concept(s) studied
Makes appropriate connections between the issue(s) identified and the concept(s) studied
Makes appropriate but somewhat vague connections between the issue(s) identified and the concept(s) studied
Makes little or no connection between the issue(s) identified and the concept(s) studied.
Opinion
Supports opinion with strong arguments and evidence; presents a balanced and critical view; interpretation is both reasonable and objective
Supports opinion with reasons and evidence; presents a fairly balanced view; interpretation is both reasonable and objective
Supports opinion with limited reasons and evidence; presents a somewhat one-sided argument
Supports opinion with few reasons and little evidence; argument is one-sided and not objective.
Recommendations
Presents detailed, realistic, and appropriate recommendations clearly supported by the information presented and concepts studied
Presents specific, realistic and appropriate recommendation supported by the information presented and the concepts studied
Presents realistic or appropriate recommendation supported by the information presented and the concepts studied
Presents realistic or appropriate recommendation with little, if any, support from the information and the concepts studied.
Grammar and Spelling
Minimal spelling and grammar errors
Some spelling and grammar errors
Noticeable spelling and grammar errors
Unacceptable number of spelling and grammar errors
APA guidelines
Uses APA guidelines accurately and consistently to cite sources
Uses APA guidelines with minor violations to cite sources
Reflects incomplete knowledge of APA guidelines
Does not use APA guidelines
Total
.
CASE STUDY RUBRIC MICROBIOLOGY For the Case Study assig.docxdrennanmicah
CASE STUDY RUBRIC MICROBIOLOGY
For the Case Study assignment the current pathogen selections may be requested by sending
an email to your instructor!
Assigned Case Study Problem:
You will create a case study for a microbial infection selected from the current pathogen list. Your case
study will be assembled using a detailed rubric (see below). Upon completion, you will submit your
case study to the Blackboard gradebook in Unit 5 and to SafeAssign.
How to create a case study
The case studies are meant to be an enjoyable, interesting, and informative assignment. This is your
chance to show that you understand the key teaching points about a microbe and to communicate
these points in a written format.
What information belongs in my case study?
Have at least 3-4 key referenced points in each of the five areas shown in the Case Study Information
Chart (see below). The left-hand heading in the chart suggests the type of information requested for the
pathogen. Outlines can be in whatever form you prefer (bullets/charts/outlines/diagrams or a mix). Be
sure to include two discussion questions (and provide complete answers) that you can incorporate
into your case study (place them at the end of your write-up). These questions should help connect your
case to other material in the course. For example, what other microbes have an A-B toxin? What other
viruses are transmitted by fecal-oral spread?
How much information should I provide for my case study?
For the Case Study, you are asked to provide at least the information requested in the chart below. The
boxed questions are suggestions for the minimum amount of information within each category. The
more detailed the information, the better the study. You may consult your textbook, CDC, WHO, Access
Medicine, Google Scholar, NCBI, WebMD, etc. to find the information. For example, if you perform a
Google search using the name of the pathogen and the word ‘vaccine’, you will find information on
current vaccines (if any), those in clinical trials, vaccines used only in animals, etc.
Case Study Information Chart
Typical Case What does a typical case look like? Use the standard format for a
patient presentation with chief complaint (CC), history of present illness
(HPI), key physical exam details (PE), lab findings, signature signs, and
any other important findings.
Description of the infectious
agent
If it is a bacterium, how is it classified? If it is a virus, what kind of
nucleic acid does it have? Does it target specific cellular types
(tropism)? Does it form a spore? Is it aerobic? Is it intracellular? Can it
only be grown in a specific type of media? How is it distinguished from
other members of the species? Does the pathogen have a significant
history with humans or animals?
Epidemiology What do you feel are the most important points about the
epidemiology of the disease? Incidence? Portal of entry? Source? Is it a
normal microb.
Case Study Rubric Criteria / Score
Distinguished
Competent
Basic/Pass
Poor
Failing
Content Knowledge
20
18
15
13
0
Case is addressed expansively in reference to assignment instructions, and demonstrates mastery of the subject matter appropriate to the assignment.
Case is addressed according to assignment instructions, and demonstrates mastery of the subject matter appropriate to the assignment.
Case is addressed according to assignment instructions but does not demonstrate mastery of the subject matter appropriate to the assignment.
Case is addressed but does not adhere to assignment instructions and does not demonstrate mastery of the subject matter appropriate to the assignment.
Case is not addressed and/or does not adhere to assignment instructions and does not demonstrate mastery of the subject matter appropriate to the assignment.
Use of Evidence
10
9
8
6
0
Ideas are supported with evidence and demonstrate a clear understanding of the research and theory behind the topic.
Ideas are somewhat supported with evidence to demonstrate a basic understanding of the research and theory behind the topic.
Ideas are not fully supported with evidence and demonstrate some confusion about the research and theory that support the case study topic.
Ideas are not fully supported with evidence and lack understanding of the research and theory behind the topic.
Ideas are not supported with evidence.
Writing
10
9
8
6
0
Assignment is well written and well organized. Mechanics (spelling and punctuation) and grammar are excellent.
Assignment is well written and well organized and contains few minor errors in mechanics and/or grammar.
Assignment is well written and well organized but contains some minor errors in mechanics and/or grammar.
Assignment is not clear and/or lacks organization and/or contains several errors in mechanics and/or grammar.
Assignment lacks evidence of clear, organized scholarly writing and needs extensive additional work to meet assignment needs.
Standard Writing Style
6
5
4.5
4
0
Assignment demonstrates appropriate in-text citations of sources (where appropriate) and references in proper formatting style.
Assignment demonstrates appropriate in-text citations of sources (where appropriate) and references in proper formatting style and contains few minor formatting errors.
Assignment demonstrates appropriate in-text citations of sources (where appropriate) and references in proper formatting style but contains some minor formatting errors.
Assignment does not provide either in-text citations (where appropriate) or reference sources and/or contains several formatting errors.
Timeliness
4
3.5
3
2.5
0
*Students who initiate communication regarding individual circumstances for lateness will be graded at instructor’s discretion.
Assignment submitted on time.
Assignment submitted one day late.
Assignment submitted two days late.
Assignment submitted three days late.
Assig.
Case Study ReflectionWrite a 4-5 page paper. Your written assi.docxdrennanmicah
Case Study Reflection
Write a 4-5 page paper. Your written assignments must follow APA guidelines. Be sure to support your work with specific citations from this week’s Learning Resources and additional scholarly sources as appropriate. Refer to the Pocket Guide to APA Style to ensure that in- text citations and reference list are correct. Submit your assignment to the Dropbox by the end of this Unit.
In 2007 San Francisco began its Healthy San Francisco Plan designed to provide health care for all San Francisco citizens. In 2007, it was estimated that San Francisco had 82,000 uninsured citizens. Under the plan, all uninsured citizens residing in San Francisco can seek care at the city's public and private clinics and hospitals. The basic coverage includes lab work, x-rays, surgery, and preventative care. The city plans to pay for this $203 million coverage by rerouting the $104 million the city currently spends treating the uninsured in the emergency rooms, mandating business contributions, and requiring income-adjusted enrollment fees. The plan requires all businesses with more than 20 employees to contribute a percentage toward the plan. Many business owners consider this a burden and warn they will not stay in the city. The Mayor sees universal health access a moral obligation for the city.
Take one of the following positions.
San Francisco has an obligation to provide its citizens with health access.-OR-
San Francisco does not have an obligation to provide its citizens with health access.
Discuss the following in your assignment
:
What is the government's role in regulating healthy and unhealthy behavior?
Has the balance between personal freedom and the government's responsibility to provide health and welfare of its citizens been eroded? Why or why not?
.
Case Study Questions (Each question is worth 6 marks)1. Defi.docxdrennanmicah
Case Study Questions (Each question is worth 6 marks)
1. Define the term ‘gastronomy’ and provide some examples to demonstrate your understanding.
2. What benefits and opportunities exist for the local indigenous community of the Dja Dja Wurrung Clans with Bendigo newly designated as a creative city of gastronomy?
3. How may the regional city of Bendigo incorporate gastronomy into its destination branding? Provide some examples.
4. Discuss some potential issues and considerations associated with using gastronomy in destination branding activities.
5. Outline some potential creative network collaborations which may result from Bendigo now being admitted to the Creative Cities Network.
.
Case Study Reorganizing Human Resources at ASP SoftwareRead the.docxdrennanmicah
Case Study: Reorganizing Human Resources at ASP Software
Read the ASP Software case (Anderson, 2005a) and consider the following questions:
How does the client feel about how the change has been managed at this point?
How do you think the management team or employees feel?
What has McNulty done well in managing the change to this point?
What could she have done differently?
What intervention strategy and intervention activities would you recommend to McNulty?
How would you structure these activities?
What roles would McNulty, the management team, and the consultant play?
.
Case Study Report Rubric CriterionWeakAverageStrongIdent.docxdrennanmicah
Case Study Report Rubric
Criterion
Weak
Average
Strong
Identification of Main Issues/Problems
Identifies and demonstrates acceptable understanding of some of the issues/problems in the case study.
Identifies and demonstrates an accomplished understanding of most of the issues/problems.
Identifies and demonstrates a sophisticated understanding of the main issues/problems in the case study.
Analysis and Evaluation of Issues/Problems
Presents a superficial or incomplete analysis of some of the identified issues; omits necessary calculations.
Presents a thorough analysis of most of the issues identified; missing some necessary calculations.
Presents an insightful and thorough analysis of all identified issues/problems; includes all necessary calculations.
Recommendations on Effective
Solution
s/Strategies
Little or no action suggested and/or inappropriate solutions proposed to the issues in the case study.
Supports diagnosis and opinions with limited reasoning and evidence; presents a somewhat one-sided argument; demonstrates little engagement with ideas presented.
Supports diagnosis and opinions with strong arguments and well-documented evidence; presents a balanced and critical view; interpretation is both reasonable and objective.
Links to Course Readings and Additional Research
Makes inappropriate or little connection between issues identified and the concepts studied in the readings; supplements case study, if at all, with incomplete research and documentation.
Makes appropriate but somewhat vague connections between identified issues/problems and concepts studied in readings and lectures; demonstrates limited command of the analytical tools studied; supplements case study with limited research.
Makes appropriate and powerful connections between identified issues/ problems and the strategic concepts studied in the course readings and lectures; supplements case study with relevant and thoughtful research and documents all sources of information.
Writing Mechanics and Formatting Guidelines
Writing is unfocused, rambling, or contains serious errors; poorly organized and does not follow specified guidelines.
Occasional grammar or spelling errors, but still a clear presentation of ideas; lacks organization.
Demonstrates clarity, conciseness and correctness; formatting is appropriate and writing is free of grammar and spelling errors.
Staffing at The King Company
Kevin Tu has managed staffing at King since the early years when the company had less than 100 employees. Tu runs a tight ship and manages the department with only one other recruiter and an administrative assistant, who maintains all job postings, including a telephone employment hotline and the company’s job line web site. Tu is well-respected across the organization for his strict adherence to ensuring equity in hiring and job placement that goes well beyond equal opportunity requirements.
Tu recently completed an aggressive hiring drive at major universities, hiring several new en.
Case Study Project (A) Hefty Hardware - Be sure to address each .docxdrennanmicah
Case Study Project (A) Hefty Hardware - Be sure to address each question in the Case study, and explain your rationale thoroughly. Be sure you saved your file with your full name, and title of this project. Example:
Jason Karp Case Studies A. Details
: You will be given a case study to solve from the textbook. While your responses will vary, properly documenting your response from valid resources is a requirement. This assignment requires you to use proper citations and references from the textbook and alternate sources. Thoughtful opinions/research based on the literature, and from the textbook are necessary, so be sure to review the chapter prior to completing these activities. This task is like a research paper, so please take your time when preparing your responses. Separating each case study with a title and proper formatting is
essential
so that I can read and follow your paper. A one (1) page response is NOT - NOT going to earn you maximum points. The Case Study response will be submitted on the assigned due date from the past weeks (s
ee submission due dates and rubric
)
. The Dropbox will close after the due date and late submission will not be accepted.
Case study projects are NOT posted on the discussion board, they are submitted as an assignment.
Case study text from text book :
MINI CASE
Delivering Business Value with IT at Hefty Hardware2
"IT is a pain in the neck," groused cheryl O'Shea, VP of retail marketing, as she
slipped into a seat at the table in the Hefty Hardware executive dining room, next to her colleagues. “It’s all technical mumbo-jumbo when they talk to you and I still don’t know if they have any idea about what we’re trying to accomplish with our Savvy Store program. I keep explaining that we have to improve the customer experience and that we need IT’s help to do this, but they keep talking about infrastructure and bandwidth and technical architecture, which is all their internal stuff and doesn’t relate to what we’re trying to do at all! They have so many processes and reviews that I’m not sure we’ll ever get this project off the ground unless we go outside the company.”"You have got that right", agreed Glen vogel, the COO. " I really like my IT account manager, Jenny Henderson. She sits in on all our strategy meetings and seems to really understand our business, but that’s about as far as it goes. By the time we get a project going, my staff are all complaining that the IT people don’t even know some of our basic business functions, like how our warehouses operate. It takes so long to deliver any sort of technology to the field, and when it doesn’t work the way we want it to, they just shrug and tell us to add it to the list for the next release! Are we really getting value for all of the millions that we pour into IT?”
“Well, I don’t think it’s as bad as you both seem to believe,” added Michelle Wright, the CFO. “My EA sings the praises of the help desk and the new ERP system we put in last y.
Case Study Proposing a Data Gathering Approach at TLG Solutions (.docxdrennanmicah
TLG is looking to improve their data gathering approach. A proposed solution is to survey customers about their product and service experiences to gather feedback. They could also analyze online customer reviews and implement a customer relationship management system to track interactions over time to better understand customer needs.
Case Study Project Part I Declared JurisdictionTemplate Sta.docxdrennanmicah
Case Study Project Part I: Declared Jurisdiction
Template Statement of Action Research Intent
The (Memphis Shelby County, Tennessee United States) will be examined to determine the current status of economic development. The resources for this study initially will come from public administrator generated information. The data will be assessed using S.W.O. T. Analysis. “Smart” Action Research will then be conducted to determine what specific economic development strategies may be employed to address areas of concern required for enhancing economic development prospects in the above jurisdiction. Using published scholarly resources and pertinent analytics, the action research efforts will turn to identifying options available to decision makers. This action research will result in a final report that provides both the criteria by which economic developments strategies may be weighed and a discussion of recommended actions, each uniquely assembled to improve the economic prospects for (Memphis Shelby County, Tennessee United States).
PADM 530
Case Study Project Part 2: Economic Development Analysis and Proposal Instructions
You will submit an Economic Development Analysis and Proposal Plan, consisting of 15-20 pages, not including the title page, abstract, or reference page. In order to complete this assignment, you must choose a specific locale that you want to use for your case study. You may wish to select the community in which you currently live or a hometown as the focus of this report. A case must be a “bounded system” with definable parameters (Stake, 1995). Thus, you must choose a locale that you can define and limit. For example, you should not use New York City. Its size is far beyond what you will be able to accomplish in this course. Likewise, you would not want to choose Huston, Idaho, as it is far too small to have a need for a cohesive economic development plan. In this assignment, you will target the specific situations found in an American city, town, or county. This assignment will require that you address the following six specific areas:
Locale
When choosing your locale, make sure that you will be able to find demographic and economic information. You will want to choose an area with which you are familiar or an area where there is obvious need. Attempt to pick a city or a town that is not extremely large (i.e., New York City, however, Staten Island could be a viable project). Choosing wisely will make your research more focused so that you can complete the research by the time the course has finished.
Economic Situation
You must detail the specific economic situation facing this location. For example, if you were to choose Flint, MI, you would have to discuss the impact of the auto industry moving away from the city and the subsequent economic and social conditions of the city. How has the economic shift impacted the city and how has the city responded in the last 30 years? Additionally, what initiatives.
Case Study Proposing a Data Gathering Approach at TLG Solutions.docxdrennanmicah
TLG is looking to improve their data gathering approach. A proposed solution is to survey customers about their product and service experiences to gather feedback. They could also analyze online customer reviews and implement a customer relationship management system to track interactions over time to better understand customer needs.
Case Study Peer Comments In each case study, you are expected.docxdrennanmicah
Case Study Peer Comments:
In each case study, you are expected to respond to at least two peers’ postings in the classroom. Comments should add new information to the discussion or provide an assessment of your peer's posting. Peer comments are due by Sunday midnight
Mary Post:
#2: To obtain the necessary transportation capabilities in a short timeframe, what type of software purchase option should myIoT pursue? Explain.
The software purchase option that myIoT, Inc. should pursue would be a SaaS application. This is an Internet based service where the software is accessed online and there is no need to have it installed on site. This is a less expensive option than purchasing software and licenses, and it allows access to the outside vendors. It is also cheaper than hosted software. Based on the cloud location, the setup time is faster, which is what myIoT needs for a two-month turnaround.
#3: What types of technology implementation challenges might myIoT face? How can these risks be minimized?
Application integration would pose a challenge. Since there is a short time-frame, ensuring all partners are “up and running” could be their biggest issue. There will need to be a training period for all that access the data. Should any of their vendors not have the same capabilities, this could throw off their entire operation. Also, due to the variety of systems organizing and sharing information might be a problem. MyIot would need to work with its supply chain partners and vendors to ensure they are all capable using the chosen TMS and begin to implement it right away. This will allow extra time to make changes and enforce training sessions.
Desmond Post
2. To obtain the necessary transportation capabilities in a short timeframe, what type of software purchase option should myIoT pursue? Explain.
My Iot should pursue a well designed TMS software system. This system specializes in planning the flow of materials across the supply chain. It's the core of routing, rating, and, executing shipments across multiple modes tracking, load tracing, and freight settlement. The capabilities and scope of TMS expands the software to a much more integrative system. It provides support for transportation strategic, tactical, and operational planning, as well as delivery execution, in transit visibility and performance evaluation. TMS also supports appointment scheduling, metrics monitoring, and freight bill auditing.
3. Whats types of technology implemenation challenges might my iot face? How can these risks be minized?
My Iot could potentially loose time in wages, delay of shipment, and possibly loose business with customers, but these risks could be minimized by implementing better planning, develop training within your team, create effective structure and monitor the technology program by following these simple steps below to correct system and human error as they occur:
· Secure the commitment of senior management
· Remember .
Case Study ProblemLeadership appears as a popular agenda it.docxdrennanmicah
Case Study Problem:
Leadership appears as a popular agenda item in police executive training. Go to Google and search “police executive training courses.” Other than the Covey program discussed in this chapter, what are the other programs that are offered for police chiefs? What are the topic areas assigned under the heading of “leadership”? Be sure to use the graduate case study format.
attached is graduate study case analysis format
.
Case Study Planning for GrowthKelly’s Sandwich Stop is one of t.docxdrennanmicah
Case Study: Planning for Growth
Kelly’s Sandwich Stop
is one of the best-known and most loved sandwich concessions in town. In business for about five years, she sells sandwiches and other lunch items made from locally produced food from her mobile food trailer. Kelly’s passion and talent for creating reliably fresh, tasty lunch fare popular among a business clientele (largely employees and shoppers) has made her small enterprise a booming success.
In the last year, Kelly added a bicycle-towed concession that travels to different strategic locations in town, selling her popular sandwiches to customers who work beyond walking distance of
Kelly’s Sandwich
Stop
. She now has a total of four employees, all part-time, working both concessions. Because she caters to urban customers, her concessions operate on week days from 10 am to 2 pm. To promote word-of-mouth advertising, Kelly uses Facebook to publish her daily menus and the locations of the bicycle concession.
As a sole proprietor, Kelly has been pleased with her lunch business success. Now it’s time to get serious about the future of her business. In the short and medium term, she wants to see it grow into a potentially more lucrative enterprise, implementing a greater variety of food products and services, and increasing her competitive edge in the region. Ever the ardent entrepreneur, Kelly’s long-term dream is to develop her creative, health-conscious culinary skills and services into a wider clientele outside the region.
An opportunity has arisen to lease restaurant space about 10 miles away from her trailer concession location, close to a mall and the suburbs and nearer to her local food producers. Kelly has jumped at the chance. While she has hired professional business consultants to help her set up the space, design the menu, and implement the opening of the restaurant, she must also consider the short- and long-term financial, HR, and management needs of such an expansion. Kelly is particularly sensitive to her relationship to her customers, employees, and the community.
Directions for paper below:
In this paper, students will analyze and discuss small business growth in terms of growth strategy, business forms, short and medium term goals, financing assistance, organizational structure and staffing needs, customers and promotion, and ethics and social responsibility. Students are expected to apply business and management concepts learned in our course.
By completing this assignment, students will meet the outcome(s):
identify the critical business functions and how they interact in order to position the organization to be effective in the current business environment;
explain the importance of the integration of individuals and systems to organizational effectiveness;
describe the ethical and social responsibilities that confront a business.
Required Elements of the Final Project:
Read critically and analyze the case below,
Planning for Growth
;
Review the project descripti.
Case Study People v. Smith, 470 NW2d 70, Michigan Supreme Court (19.docxdrennanmicah
The document discusses the case of People v. Smith, where the Michigan Supreme Court ruled on whether a juvenile defendant's prior convictions could be used to sentence them as an adult. It asks for a summary of the case facts, issue, and ruling, as well as an overview of the importance of expunging juvenile records. Finally, it inquires about a state's juvenile expungement laws and criteria for transferring juveniles to adult court.
Case Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docxdrennanmicah
Case Study One:
BMGT 464 Portfolio Activity Two
Purpose:
In this case the committee is looking to see how you can apply communication skills to obtain the maximum job performance of the employee in each of the short scenarios. After reading each short case, prepare answers to the questions for the upcoming search committee interview to review.
Outcomes:
The students will demonstrate understanding of the following outcomes:
· How to manage, organize, and lead employees;
· To identify the organizational theory related to increasing job performance to raise company effectiveness;
· How to communicate effectively to affect change or motivation; and
· Writing for persuasiveness.
Scenarios and Questions:
After reading each short case, prepare answers to the questions for the upcoming search committee interview to review.
1) “RLI Home Builds a Castle on Communication”
Since the outset the owner Ralph Lorean has prided himself on focusing the culture of the company on excellent customer service. Managers know that a culture like this would only work if the company’s employees enjoyed their work and the company. He wanted to build a company where every employee felt they owned the castle. Ralph believed that communication was essential to making an employee feel a part of the group, so he often said that he never wanted employees to “read about their company in the media and learn something new.”
Because RLI is international in scope it is possible that on any given day or time two thirds of its 2,000 employees are outside an office. To conquer the communication this problem imposes Ralph is surveying his managers to see if they think a new, but very expensive, “dashboard” intranet system would be worth the expenditure. The system would ensure optimal communication strategies allowing every employee remote access from wherever they are. Regardless, of location every employee can share information on the dashboard from their cell phone. However, it does not offer a “SKYPE” feature. Management has sent a short questionnaire to you asking the following questions:
A) How would the new tool influence job performance positively in RLI?
B) Could dependence on a program which does not permit access to verbal or face to face communications hinder job performance in a global setting? If so why?
C) If the dashboard was only presented in English would this be a factor in its intracompany success?
D) One of the biggest reasons suggested for purchasing the system is that it allows information to flow both from top down to bottom up. Do you see this as possible if the company is not structured in a similar way? If so why, if not why not?
2) Email Over All! Richard Burton is one of the production supervisors at Lighting R Us a branch of RLI. Richard supervises 25 employees and has been performing well in this same job for 5 years. Burton wants a promotion in the foreseeable future but feels it unlikely. Burton is always “on”. He has 24/7 email access, texts al.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Your Skill Boost Masterclass: Strategies for Effective Upskilling
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1. 1
Running Head: COMPUTER WORMS MALWARE IN CYBER
SECURITY
14
COMPUTER WORMS MALWARE IN CYBER SECURITY
COMPUTER WORMS MALWARE IN
CYBER SECURITY
Praveen Ranghavajhala
201696
Abstract
Generally, there are numerous current research which deals with
2. diverse types of computer worms in both the computing as well
as the technological world. This respective report will therefore
analyze the current research done on the computer works. In
addition, it will reflect on the various malware attacks which
may be a subsequent of any given cyber security breach (Sari,
2018). The research conducted will essentially have an integral
objective of locating the characteristics of the various computer
worms as well as diverse types of computer malware that
generally affects the functioning of the computing field.
This prospective research conducted will additionally facilitate
the impact of such malware attacks on the computers as well as
the networking systems. To effectively analyze these
phenomena, the research utilized secondary data collection
mechanism in its various navigated data acquisition (Sari,
2018). The research significantly employed the use of
exploratory approach as well as the deductive research design
which was majorly utilized by the respective researchers who
conducted this prospective research. It will conclusively
prescribe various methods to hibernate and reduce such malware
and worms attack on the computers. This will exclusively
minimize the rampant effects of malware attacks on computers
hence improving the computer functioning.
Introduction
Cyber security can be described as an inclusion of various
tactics that are meant to protect computers, networks, program
as well as data from any illicit access or breach hence resulting
to malware attacks. Such attacks can be elaborated as an aim for
the corruption. Cyber security in addition can be termed to be a
protective measure towards the consumption ability, veracity as
well as the respective security of the network. There are various
parameters that can be put in place to protective massive threats
from assessing their intended targets. Such parameters include
3. using the anti-virus as well as anti-spyware. In addition, other
measures can be taken such as mounting firewalls to repel or
resist any unauthorized admission to the computer system.
Other preventive actions that can be essentially utilized include
intrusion prevention systems. These intrusion prevention
systems generally identify quick affecting risks such as zero-
hour attacks hence lessening occurrences of such attacks.
Generally, the protection of personal as well as professional
data from cyber threats is basically an urgent necessity in the
world today. This is where the cyber security interrupts in for
the rescue of such protection of personal information as well as
professional data. People generally think hat systems are safe
whereas they actually are not (Horowitz & Lucero, 2017) This
therefore implies that there is essential need to safeguard every
computer system. This will hence prevent such computer
systems from becoming victims of cyber crime in every day in
the modernized world (Hu, 2017). This literally shows the
significance of cyber security in the fight against the computer
malware attacks as well as the computer worms that may inject
viruses into the computer systems. This may be as well sedated
by the fact that individuals are generally prone to giving a lot of
their personal information online. Some of them even walk a
further extent to exposing their professional information online
which makes their identity subjected to risks and any cyber-
attacks (Hu, 2017). Ransomware attacks are a common scene in
the world today. Therefore, there is need to conduct a through
research on the preventive measures that will help eradicate the
cyber crimes in the world today and create a better world for
coming generations.
In relation to that, this report will therefore cover the research
conducted and the means in which the research was a successful
in concluding measures to take against cyber-crimes. Generally,
malware can be so numerous in the cybercrime field (Hu, 2017).
They include the viruses, spyware, trojans, rootkits, worms,
polymorphic malware, botnets, remote administration tools
commonly described as RATs as well as other many typical
4. computer malwares which will be reflected and given
appropriate measures by this respective research. To effectively
execute such measures on these computer malwares, there was
need for the research to facilitate a literature review on the
computer malware. It therefore described the research
methodology that was utilized as well as data collection and
data analytics. The research after the absolute examination of
the results and findings facilitated a set of findings as well as
recommendations to mitigating such computer worms and other
malwares attacks to the computer systems (Hu, 2017).
Literature Review
The literature review of this respective research highlighted on
the computer worm’s malware as well as the prospective
characteristics of the malwares. This can be derivative form the
fact that within the current era, the computer worms have
essentially attracted concentration form various researchers as
well as literature authors in analyzing this typical emerging
complication which is rampant and wide spreading. The
computer worms generally cause unwanted impact on the
internet as well as local networking system (Farral, 2017). Even
past scholars have effortfully attempted to assess and describe
this difficulty to no avail. This explains the extent to which
these computer worms may be disastrous to the modernization
and networking in the modern world. The timeline of the
diverse computer worms has also been extracted to help realize
the extent of influence as well as future threats of computer
worms. This is especially to the mentioned network system as
well as global internet consumers.
Generally, numerous researches as well as typical studies have
formally concentrated on prioritizing the analysis of the typical
5. worm behavior in the networks and their respective life cycle.
This facilitates and establishment of the new techniques as well
as the mechanisms to utilize in the ultimate resistance of the
devastating activities. This should as well advance the literal
scope of the recent study which can be concluded to be limited
(Farral, 2017). This can be said from the fact that it only
addresses the complications for a unique variety of network
system which may be significantly be regarded as having
feasibility. Various literature reviews have exposed the
categorization of computer worms in accordance with the
behavior paradigm as well as scanning mode of the respective
computer worms.
In a compatible categorization of such computer worms, any
given researcher may be in a position to locate and recognize an
evolution pattern of the computer worms as well as the variety
types of damage which the respective computer worms causes to
the prospective global networks in the world. These will
apprehensively facilitate the accurate measures to take while
curbing such computer attacks from the computer worms
(Farral, 2017). Such computer worm identification may also
significantly help in coming up with an appropriate
mathematical modelling. This respective mathematical
modelling may assist in determining the projected future attacks
which may occur against any other possible set of evolution of
computer worms. This therefore literally implies that such
predictions may essentially facilitating a desirable rescue of the
computer systems network attacking activities which may occur
both under theoretical mechanism as well as practical
mechanism.
Generally, computer malware can be described to be malicious
software which may enter into the computer system via
numerous viruses through the network. In addition, they can
also navigate through the respective computers searching of
potential weak spots to attack within the software of the
respective computers (Farral, 2017). They also spread out
through the operating systems of the respective computer
6. systems. Essentially, there are numerous types of computer
malwares. They include adware, worms, trojan as well as
backdoor.
Adware is generally meant to steal the information of the
respective computer user. It also has an ability to catalyze the
spyware which also runs together with it. Adware can be
regarded as very harmful in nature as they harm the computer
system completely (Velliangiri & Premalatha, 2017). Bot on the
other side are essentially utilized in causing malicious
intentions to steal user activity as well as their respective
information. The spam bots are also taken to the computer
operator via other third-party vendors that may be related to the
respective computer operators. Bugs are utilized by the
compilers on source codes of the respective program under use
(Velliangiri & Premalatha, 2017). Ransom ware malware is
recognized as being amongst the most hazardous computer
malware in the world. They are generally utilized with an
intention of harming the operating systems of the computer
operators. They are besides commonly utilized by the attackers
to demand for a ransom for the restoration of the respective
computer systems (Velliangiri & Premalatha, 2017). The
spywares are being used by attackers to spy on the computer
system of the operator as well as the programs and computer
activities hence stealing from them.
This literature review also highlights and explains on the
manner in which such computer worms influence the networking
system as well as the possibility of their influence on the
respective computer networks. Computer malware and worms
affect the computer systems according to the codes of those
respective targeted computer systems. The bad fact about these
computer worms is that they replicate themselves and spread
rapidly to other computers or even systems without the
perspective knowledge of the computer operators (Velliangiri &
Premalatha, 2017). These computer worms have a great
influence on network security as they essentially corrupt the
information form the user system, disabling the computer
7. network security. They therefore interfere with the performance
of the user system while executing vital tasks as well as
infecting the computer.
Research Methodology
Significantly, it is evident that the mechanism of a prosperous
security features is generally adorned with the concept of the
encryption that is string enough to sustain and protect the data
confidentiality index. From the research conducted, it is also
obvious that the two tires this mechanism of encryption in such
a manner as in encrypted algorithm with the set of commands as
well as the encryption key code which is generally utilized by
an algorithm to secure the data set (Kama, Alani & Abdulmajed,
2016). Within the selected methodology as well as the solution
facilitator of the research conducted, there were numerous
mechanism that were employed towards gathering of the
information to help in the conclusion of the respective research.
Such mechanism parameters include public or private key
encryption, defensive mechanism, offensive mechanism as well
as the control server detection.
Within the respective research, all the devices were capable of
utilizing a public key of a station to encrypt the information.
The recipient stations therefore had to decode the information
while using their respective personal private key. According to
Kama, Alani & Abdulmajed, (2016), no other devices can have
the private key of the station. Besides, no other device can
decipher the respective information. This literally implies that
the information confidentiality while conducting this respective
research was optimally maintained. The research also utilized
disproportionate key for data privacy. These were circumstances
when the research execution required sending of a digital
signature to the secure the information. Cisco also utilized the
DSS standard to validate peer switches amid the setup of an
encoded session. The genuine information was therefore
scrambled.
8. The research also utilized the defensive system mechanism.
These systems generally reflect on the recuperation from the
malware infection as well as the two fundamental
categorizations as they have been based and arranged. The
offensive mechanism on the other hand was used in the research
where the system chips were utilized on the occasions of
launching the attack as well as the process against malware to
annihilate the infection impact. The basic goal of such a
mechanism was to limit the malware expediency (Kama, Alani
& Abdulmajed, 2016). This could be implemented through
infusing a fraudulent information like phony accreditations as
well as band accounts. In addition, the research also employed
the use of the control server detection. Generally, it utilized this
respective parameter in unveiling the possible computer
malwares which would communicate with the exposed server.
Data Collection
Data collection is generally a mechanism that can be utilized in
gathering as well as measuring quantifiable data on the targeted
factors through ways of an established pattern. Data collection
besides facilitate the researcher in extracting the required
answer with the relevant queries that are connected to the
respective thematic aspect under research (Kennedy-Clark,
2015). This research required data collection in the ultimate
explorations of the on the attacks of computer worms over the
network system. The research also majorly utilized the
secondary data in in gathering past research information which
the researchers also believed they were useful within the
respective research. The secondary information can facilitate a
vast set of records which were carried out by the past scholars
(Bowman, 2014). The research therefore employed the use of
online journals, e books as well as case study that had
previously been carried out by diverse research organizations as
well as the various peer-reviewed and scholarly articles. This
essentially helped in gathering of the required information that
9. were relevant in this respective research.
Data Analytics
From the fact that information from the secondary sources were
regarded as to have been examined through descriptive methods,
there was an essential need to explain the exponential outcomes
of these secondary source information. Such outcomes are
essentially from diverse hypothesis hence need to be examined
through descriptive methods (Thomas, 2015). It is from such
variety set of records that the researchers were able to conclude
a reasonable statement that was dependent on the weighed
outcome. The weighted outcomes were determined on the
repetitive behavioral, scanning as well as network attacking
patterns of the computer worm malware.
The analysis of the hypothesis as well as the proposition of the
authors was done by the concerned researchers. It located that
the computer virus is commonly a programming code that may
harm all the files as well as folders that have been archived in
the computer systems. This may also terminate the whole
system from the network. Generally, the communication
technology is one of the essential means in which the infection
may be spread through. The viruses utilized the communication
technology of the computer systems to spread into the public
system hence becoming more disastrous (Kamalet, 2016). This
gives the cyber attackers an easy opportunity to attack the
computer system. They generally insert a killer program into the
computer system where the target whole the cyber network for
an additional take over. These viruses can be spread via VPN.
Findings and Recommendations
From the analysis of the research, its is evident that the
utilization of numerous applications in the computer system
may essentially facilitate the growth of the virus. This in
addition increases the replication of these computer viruses
hence making them more hazardous. In addition, the analysis of
the research justify vividly that the preventive actions have to
be executed prior the computer attack. Such an action may
10. significantly assist in reducing the gap between the computer
system as well as the computer attackers (Gregory, 2016). This
will apprehensively distract the computer virus from thriving
into the computer system. The analysis also manifest that
preventive parameters ought to be executed by a thorough
investigation of the weak spot of the security system. In
addition, it will exclusively eradicate the viruses that have been
enshrined in the computer system through the treatment
mechanisms. This will essentially help eradicate the whole
registry under suspicion into the computer system.
An IDS will vitally differentiate between the malicious
junctures which will communicate with an overseer hence using
email, paging as well as recording of the occurrences. It can
also help in executing the factual as well as peculiarity
examination. This literally explains why various business
organization ought to employ this Interruption Discovery
Framework in their business information system while
combatting various cyber threats that may be found within the
information technology of the respective business organization
(Gregory, 2016). As well, IDS may essentially perceive and
respond to a focal catalogue which relates the information from
the dissimilar gadgets thus facilitating an overseer with a
universal standpoint of the incessant security of the respective
network system.
There are various prescribed recommendations that may be
utilized in fighting against malware worms in the computer
systems hence curbing cybercrimes occurrences. One of the
technical tactics to utilize include implementation of the anti-
worm software. This software will locate the potential threat
and give a notice to the administration or even the business
management. Spam filters may also be utilized (Gregory, 2016).
They have the capability of blocking as well as confining any
email and messages which may be suspected of containing any
threat and sent from unknown persons. It notifies the user to
avoid such content. Security scans also can be a preventive
mechanism in which they scan any software to be installed into
11. the system. Regular updates may also be utilized. This include
the networks, devices as well as the computer systems which are
prone to threats and attacks.
Conclusion
Conclusively, it is justifiable to apprehend that the main threats
to cyber security as well as security network in the modern
world today is the worm and malware attacks. Nevertheless, this
respective research has proven that despite the presence of such
type of malware attacks as well as malware worms, there are
numerous preventive measures that can be implemented to
safeguard network security. It has been manifested that the
diverse forms of malwares may results to disastrous impact on
the computer system as well as the network security. Any
business organization opting to take such preventive measures
should therefore have legal contracts beforehand with business
organizations offering cyber security so as to avoid going
through massive data loss in their information system. This will
help mitigate the opportunities of cyberattacks from replicating
in the world.
12. References
Bowman, J. (2014) ‘Data, analysis, action!’, Research World,
2014(46), pp. 22–26. http://www.scientificpapers.org/wp-
content/files/1563_Cordova_Rangel-
A_review_of_research_methods_in_strategic_management.pdf
Farral, T. (2017). Nation-State Attacks: Practical Defenses
against Advanced Adversaries. Network Security, 2017(9), 5-7.
doi: 10.1016/s1353-4858(17)30111-3
Gregory, J. (2016). The Past, Present, and Future of
xVA. Wilmott, 2016(82), 37-39. doi: 10.1002/wilm.10487
Horowitz, B., & Lucero, D. (2017). System-aware cyber
security: a system engineering approach for enhancing cyber
security. Insight, 20(3), 66-68. doi: 10.1002/inst.12165
Hu, G. (2017). Countermeasure against Distributed Denial of
Service Attack. Destech Transactions on Engineering and
Technology Research, (apetc).
doi:10.12783/dtetr/apetc2017/10920
Kamal, M., U. S., Ali, A.J.R., Alani, K.H. &Abdulmajed, S. E.
(2016). Survey and brief history on malware in network security
case study: viruses, worms and bots, ARPN Journal of
Engineering and Applied Sciences, 11(1), 683-698.
https://www.researchgate.net/profile/Saif_Alsamer/publication/
301695496_Survey_and_brief_history_on_malware_in_network
_security_case_study_Viruses_worms_and_bots/links/57c427be
08aee5141be5b75c/Survey-and-brief-history-on-malware-in-
network-security-case-study-Viruses-worms-and-
bots.pdf?origin=publication_detail
Kennedy-Clark, S. (2015). Reflection: Research by design:
Design-based research and the higher degree research
student. Journal of Learning Design, 8(3). doi: 10.5204/jld.
v8i3.257
Sari, A. (2018). Countrywide virtual siege in the new era of
cyberwarfare: remedies from the cyber-firewall:
Seddulbahir. Journal of Cyber Security Technology, 2(1), 14-
36. doi: 10.1080/23742917.2018.1476956
13. Thomas, J. A. (2015) ‘Using unstructured diaries for primary
data collection’, Nurse Researcher, 22(5), pp. 25–
29.http://www.sociology.kpi.ua/wp-
content/uploads/2014/06/Ranjit_Kumar-
Research_Methodology_A_Step-by-Step_G.pdf
Velliangiri, S., &Premalatha, J. (2017). Intrusion detection of
distributed denial of service attack in cloud. Cluster Computing.
doi: 10.1007/s10586-017-1149-0
Avoiding Plagiarism
David Runyon, M.L.I.S., M.S.
1
HU on plagiarism:
“Plagiarism” includes, but is not limited to, failure to indicate
the source with quotation marks or footnotes, where
appropriate, if any of the following are reproduced in the work
submitted by a student:
i. A phrase, written or musical
ii. A graphic element
iii. A proof
iv. Specific language, OR…
14. 2
HU on plagiarism:
Plagiarism is using the ideas of others and/or words without
clearly acknowledging the source of that information.
-Harrisburg University 2017-2018 Undergraduate Catalog , pg.
48
3
HU on Academic Honesty
Harrisburg University expects a student to act honorably and in
accordance with the standards of academic integrity. Academic
integrity is grounded in mutual trust and respect. Therefore, it is
expected that a student will respect the rights of others and will
only submit work that is their own, refraining from all forms of
lying, cheating and plagiarism. Lack of academic integrity
includes:
Plagiarism
Cheating
Fabrication, alteration of documents, lying, etc.
Assisting others in academic misconduct
-Harrisburg University 2017-2018 Undergraduate Catalog , pp.
15. 48-49
4
Consequences
Sanctions for violations of Academic Code of Conduct
Assignment grade of 0
Failing grade in the course at issue
Warning via written notice to the student
Withdrawal from course
Temporary suspension from the University
Expulsion
Withholding of a diploma
-HU Student Handbook, pp. 14-16
5
Intentional
Inadvertent
Turning in a paper written by another student without
permission.
Turning in a paper a peer has written with permission.
Turning in a paper purchased from a term paper service.
Turning in a paper from a “free” online term paper service.
Copying from the source but failing to provide appropriate
documentation.
Copying from the source, providing appropriate documentation
16. but failing to use quotation marks.
Paraphrasing from source but failing to provide appropriate
documentation.
Incorrectly quoting, paraphrasing or citing.
What needs to be cited?
Any idea that did not originate in your own brain, from
whatever source:
Movies, newspapers, TV shows, websites, radio, books, music,
etc.
Speeches, conversations, interviews
Verbatim passages from a source (with quotation marks)
Paraphrases from a source
Purdue University, (2007). Is it plagiarism yet? The OWL at
Purdue. http://owl.english.purdue.edu/owl/resource/589/02/
7
What does NOT need to be cited?
Your own, original thoughts, opinions, experiences
“Common knowledge” and generally accepted facts
Purdue University. (2007). Is it plagiarism yet? The OWL at
Purdue. http://owl.english.purdue.edu/owl/resource/589/02/
8
17. When in doubt, cite!
9
Always cite:
Phrases you rewrite from another source
Verbatim passages that you’ve put quotation marks around
Ideas that come from others
10
Cite your sources by:
Including in-text citations (Smith, 2000, p. 31)
Including all sources in your bibliography at the end of the
paper
Consistently using an accepted citation format such as APA
11
18. “Patch writing” is plagiarism.
Patch writing = stringing together sentences from more than one
source, without paraphrasing.
Principle: Academic writing means using your own words!
12
Don’t rely on others’ words.
Strive to keep your use of other people’s words to a minimum.
Excessive use of quotations = lack of effort, lack of
understanding of your subject
Limit use of quoted material to 10% or less of your final
product.
13
Can you plagiarize yourself?
Yes!
Always cite your sources, even if it’s your previous work.
14
19. Practice Paraphrasing!
“Can a mortal ask questions which God finds unanswerable?
Quite easily, I should think. All nonsense questions are
unanswerable. How many hours are there in a mile? Is yellow
square or round? Probably half the questions we ask—half our
great theological and metaphysical problems—are like that”
(Lewis, 1961, p. 81).
Lewis, C. S. (1961). A grief observed. New York, NY: The
Seabury Press.
Sample Paraphrase
Lewis (1961) suggests that our limited understanding of reality
leads us to pose questions that make no sense and,
consequently, have no answer, even when asked of God (p. 81).
References
Lewis, C. S. (1961). A grief observed. New York, NY: The
Seabury Press.
References & Contact Info
VandenBos, G. R. (Ed.). (2010). Publication manual of the
American Psychological Association. Washington, D.C.:
American Psychological Association.
Facebook: Harrisburg University Library
Twitter: @husatlib
Library: Second floor
20. Based on an original presentation by Kathleen Conley, HACC,
with elements from Nancy E. Adams, Harrisburg University,
and Jessica See, Harrisburg University.
18
Benefits, Barriers, and How to Overcome the Barriers of Using
and Implementing Big Data Analytics throughout Supply Chain
Management in the Medical Industry
Adelaide Navickas
Harrisburg University
12/04/2016
Presentation Agenda
Introduction
Research Question
Research Methodology
Literature Review
Results
Limitations of the Research, Future Work Planned, and Lessons
Learned
Conclusion and References
Introduction
Big Data
Volume
Velocity
21. Variety
Big Data Analytics
Supply Chain
Procurement/sourcing
Logistics
Operations
Marketing
Author’s Background
Masters in Analytics
Working for Medical Device company in a Customer Care role
As previously mentioned Big Data has frequently been defined
as data with high volume, velocity, and variety [5] [6] [7],
while Wamba et al. goes on to add veracity and value as key
components in the definition of Big Data [2].
BDA is the application of Business Analytics on Big Data.
Business Analytics refers to statistical analysis, forecasting,
predictive modeling, and optimization techniques
3
Research Question
Specific
Benefits
Barriers
How to overcome these
Implementation and continued use
Leadership
Talent Management
Company Culture
Survey supply chain team members
Limitations
Not exhaustive
22. No suggestions for how to overcome unless provided by survey
respondent
Research Methodology
Identified the target respondents.
Wrote the questions and interactive statements for the survey.
Survey was reviewed by two individuals.
Survey was revised based on feedback from previous step.
Three people re-reviewed the survey
Final changes to the survey based on feedback from previous
step were made and the questions were uploaded the online
survey site SoGoSurvey.
Survey was sent out to potential respondents over a month long
period via individual emails.
Data from the survey was exported to an Excel file and analysis
of the results was conducted in order to identify common trends
among the answers as well as identifying anomalies.
Literature Review
Overview of existing Literature
With the ever-increasing amount of Big Data available to and
collected by companies, BDA has emerged as a key tool for
businesses looking to gain a competitive advantage, new
insights, and added value (full reference provided in paper)
There are many BDA applications that can be applied to all
parts of the supply chain. Waller and Fawcett suggest that
business and supply chain leaders must understand and use BDA
to support decision-making in SCM (full reference provided in
paper)
23. In Sanders’ article, “How to Use Big Data to Drive Your Supply
Chain,” the survey used indicated that the majority of
executives believe that BDA is a priority for the future, but also
admitted there were concerns about the cost and the choices
available that would best suit their needs (full reference
provided in paper)
Recent literature reviews broke down the current studies by
varying categories:
Type of analytics used (predictive, prescriptive, or descriptive)
Types of value creation found by using BDA
Varying other criteria: focus, research approach, method
triangulation, data generation, range, timeline, theoretical
background, and target audience
Limitations of Existing Studies
BDA is still gaining momentum in the world of SCM. While
there are plenty of businesses that are using it, there is very
little research on the benefits and barriers associated with
continued use of BDA due to its newness
S. F. Wamba et al. brings up the lack of research on how
leadership, talent management, technology, culture, data
privacy, and decision-making processes impact the use of BDA
(full reference provided in paper)
Goal of this presentation is to bridge the gap between formal
research and industry usage by providing supply chain
executives with the necessary information to understand the
benefits of and overcome the barriers to implementing and
continuing use of BDA in SCM
Results
24. General Survey Statistics
Table 1 shows the breakdown of respondents’ industries within
the medical field
Majority of responses are from hospitals
But there is a good mix of other industries as well
Breakdown of time using BDA in supply chain
44% of respondents using BDA have only been using it for one
to three years
19% have been using BDA for four to six years
15% for seven to nine years
7% for ten to twelve years
8% have been using it for 13 or more years
Table 2 shows the majority of companies with over 1000+
employees are using BDA in their supply chain (20 of 24)
Due to low response rate from smaller companies the author
makes no conclusion as to whether or not there is a trend for or
against BDA usage in companies of that size
The majority of respondents, regardless of company size, are
using BDA (27 of 32)
Table 3 shows the breakdown by component. Please note there
is overlap as a company could be using BDA in 1-4 of the
components
Marketing is the component of supply chain that uses BDA the
least right now
Table 1
Table 2
Table 3
It was also shown through the survey that of the four
respondents using BDA in marketing, three were using BDA in
all other components as well suggesting that marketing is the
25. last piece of the puzzle when implementing BDA in the supply
chain
8
Benefits
Of the 27 respondents who use BDA in their supply chain, 26
provided answers that equated to 59 individual benefits
Financial benefits were by far the most prevalent benefit (23 of
59)
Optimization and maximization was the next most frequent
benefit (9 of 59)
Better tracking/reporting/insight (8 of 59)
Other common benefits include:
Identifying trends (5)
Better models (4)
Monitoring inventory levels (5).
Reducing excess (2)
Identifying fraud (2)
Increasing process efficiency (1)
Specific Examples
In regards to optimizing human resources, one respondent
specifically discussed the use of a system that tracks an
employee’s work progress through time, speed and logistical
status by way of an RF scanner. Not only did it help improve
employee efficiency, but it also allowed that company to pick
better locations for items to increase picking efficiency.
“Patient demographic information has been analyzed to
determine where our patients come from to assist in marketing.
In addition, analyzing data that identifies if a patient was
referred to our Health Care system from a smaller organization
has allowed us to strategically form alliances with surrounding
health care providers that serve as a feeder for patients
requiring more complex care than what they can provide. As a
result we have maintained steady/or increasing volumes of
patients and we are often treating the more critically ill that
26. bolsters our reputation as well as giving us the opportunity to
increase revenues.”
The benefits identified by respondents were varied but did have
common themes. Of the 27 respondents who use BDA in their
supply chain, 26 provided answers that equated to 59 individual
benefits.
Financial benefits were by far the most prevalent benefit. Such
benefits were identified 23 separate times. These financial
benefits included lowering the cost of devices or distribution,
reducing costs through better negotiating and review of
contracts, reducing labor costs through the balancing of human
resources, and lowering freight bills.
Optimization and maximization was the next most frequent
benefit listed encompassing nine of the 59 benefits. Examples
include optimizing item location within a warehouse, optimizing
inventory levels as well as human resources, maximizing sales
through better service levels, and increasing patient volume
with targeted marketing.
The third most frequent benefit was found to be better
tracking/reporting/insight and was mentioned in eight of the 59
benefits. Examples include providing leadership with a big
picture view of daily operations, providing information on
clinical use of products which leads to standardization of
product decisions, tracking compliance with contracts, and a
better notification system to remind employees of what is
coming next.
Other common benefits include identifying trends (5), better
models (4), and monitoring inventory levels (5). Trends were
mentioned to be found in customer behavior, expenses,
operational, and financial categories. Models mentioned were
used for a centralized supply chain (for multiple hospitals) and
predictive analytics. One example described using models to
predict usage spikes so that they could be proactive in their
27. procurement as opposed to reactive. The last few benefits
included reducing excess (2), identifying fraud (2), and
increasing process efficiency (1).
9
Barriers for companies not yet using BDA
5 respondents’ barriers:
A current model that is more granularly focused
A lack of data analysts
A lack of proper systems (mentioned by three of the five
respondents)
Resources needed for implementation
High cost involved in system add-ons
No noted ways to overcome these barriers by these respondents
However, similar barriers were listed by the respondents who
had implemented BDA along with ways to overcome those
barriers
Barriers and How to Overcome Them
Barriers
Of the 27 respondents using BDA, 26 of them provided 52
individual barriers
The largest category was data integration (11 of 52)
Companies are working with data in inconsistent formats across
multiple systems that may or may not initially pair successfully
with each other
Data Accuracy (9) and Data Validation (8)
Shared between 12 respondents – 5 of which listed both barriers
Data accuracy barriers included not trusting the data source
(customers, physicians, nurses), knowing data was manually
entered (always a chance for human error), and not trusting the
system it is being pulled from to provide consistent results
28. Data validation barriers included manual checks of the data to
make sure results and reports were accurate, questioning the
data rather than the analysis, and having to validate the source
data used in the analytics
Remaining barriers:
Technology for data manipulation (4), technology for data
storage (3), database reporting logic (3), calculation accuracy
(3), data security (2)
10 other individual barriers
Methods to get past them (if provided)
4 of 11 respondents who faced data integration barriers
overcame them
By developing a system to standardize data collection,
enforcing policy and procedure, persistence, or creating an
automated process making data more readily available
7 of 12 respondents who faced data validation and data accuracy
barriers overcame them
By revising reporting tools, educating staff who uses the data
about the value of the data and its accuracy, trial and error,
continued use of the data allowing for regular adjustments that
provide better information, or developing a system that allowed
for more data to be collected at a greater depth so that it could
be cross-validated across datasets
workforce resistance to their actions being tracked and
measured, HIPAA (Health Insurance Portability and
Accountability Act) limitations, lack of human resources,
building an effective business case to show leadership the
benefits of implementing BDA, pushback from suppliers on
pricing benchmarks, internal stakeholder pushback, data
volume, steep learning curve, end-user pushback, and the ability
to drill down into the data
11
29. Leadership, Talent Management, & Company Culture
50% of responses mentioned leadership
A quarter of these had a lack of leadership support
The remaining three-quarters noted that they had strong
leadership buy-in and support which continues to help their
team provide benefits to their company
40% discussed the need for strong human resources with
analytical skills (talent management)
It was noted that it is important to hire people with BDA
experience and for the focus of their role to be solely on BDA
More than 2/3 already had a strong analytics team while the
other 1/3 is searching for better human resources
40% also wrote about how company culture played a role in
their BDA usage
3 of 9 truly felt that their company culture helped support BDA
usage in their supply chain
2 of 9 don’t have a strong positive or negative connotation
4 of 9 felt culture was hindering their BDA usage and found it
particularly difficult trying to work together with other
departments
24 of the 27 respondents using BDA answered this question.
This was the last question of the survey and may not have been
worded very clearly because 6 of the 24 who answered did not
directly mention leadership, talent management, or company
culture in their response.
Limitations of the Results, Future Work Planned, Lessons
Learned
Future Work Planned:
More research specifically on how talent management,
leadership, and company culture affect BDA use in SCM in the
medical industry
Lessons Learned:
30. Don’t rely on one person or company to distribute a survey –
take responsibility yourself
More respondents were using BDA than initial assumption (this
is good in the author’s humble opinion)
Many respondents had barriers that they had solved, but there
were also others that hadn’t solved theirs yet – it was nice to
see that they were still persevering and not just giving up
Limitations of Results:
Results are specific to the 32 respondents
While there were a variety of regions and industries presented
the small sample size makes it hard to say that the results would
be consistent with a larger group
Thank you!
References and appendices are provided in the paper with the
same title as this presentation
RUNNING HEAD: COMPUTER WORMS MALWARE IN
CYBER SECURITY
COMPUTER WORMS MALWARE IN CYBER SECURITY
COMPUTER WORMS MALWARE IN CYBER SECURITY
PRAVEEN RANGHAVAJHALA
201696
HARRISBURG UNIVERSITY
Table of Contents
Abstract………………………………………………………………
31. …………………………………………………………………………
….3
Introduction…………………………………………………………
…………………………………………………………………………
…3
Relationship to
CPT.……………………………………………………………………
…………………………………………………….7
Problem statement and
justification…………………………………………………………
………………………………………9
Research , Scope, Aims And
Objectives….…………………………………………………………
…………………………… 12
Research Questions and
Hypothesis……………………………………………………………
………………………………….13
Literature
Review………………………………………………………………
……………………………………………………………14
Computer worms Malware and
characteristics……………..…………………………………….……
…………………….14
The way worms are affecting networking system and the
likelihood of its impact on the
network:………………………………………………………………
………………………16
Previous strategies used to mitigate cyber security issues
generated though computer
worms…………………………………………………………………
……………………...17
The loopholes of the existing process used to deal with cyber
security issues………………18
Strategic recommendations to resolve the security issues
32. generated by computer worms…..19
Proposed
Solution
s and
Methodologies:……………………………………………………..2
1
Proposed Research
Design:………………………………………………………………
…..24
Proposed Data Collection and Analysis
Process:…………………………………………….24
Results and
Analysis:………………………………………………………………
………...25
Proposed Work Plan for
Research:…………………………………………………………..27
Conclusion……………………………………………………………
…………………………………………………………………………
29
References……………………………………………………………
………………………………………………………………………...
30
33. Table of Figures
Figure 1: MALWARE DISTRIBUTION4
Figure 2: COMPUTER WORMS7
Figure 3: MALWARE SPECIMEN12
Figure 4: MALWARE15
Key words :
· Anti-virus and anti-spyware
· Firewall, in order to resist unapproved admission to the system
· Intrusion prevention systems (IPS), in order to recognise quick
affectingrisks, for example, zero-hour attacks
· Virtual Private Networks (VPNs), in order to offer secured
remote admittance
Abstract:
The present research deals with the various computer worms
and malware attacks which occur as a result of the cyber
security breach. The research aims to identify the characteristics
of the various computer worm s and malware. It will also help
to assess the effects of the malware on the computers and the
networking systems. Here, secondary data collection method has
been utilized for the current research. Exploratory approach and
deductive research design have been taken up by the researcher.
34. Finally, the researcher has recommended certain ways to
prevent and mitigate the attacks as the impacts of malware
attacks are disastrous.Introduction:
The techniques of protecting computers, networks, programs
and data from illegal access or attacks are combined together to
form cyber security. These attacks are simply aimed for
corruption. The usability, dependability, veracity and security
of the network are protected by cyber security. Huge number of
threats are targeted and blocked from infecting the network by
cyber security. Its components include:
· Anti-virus and anti-spyware
· Firewall, in order to resist unapproved admission to the system
· Intrusion prevention systems (IPS), in order to recognise quick
affecting risks, for example, zero-hour attacks
· Virtual Private Networks (VPNs), in order to offer secured
remote admittance
Protection of personal and professional information from cyber
threats is an urgent necessity today and hence cyber security
comes to the rescue. People think that the systems are safe
whereas they actually are not (Horowitz & Lucero, 2017). If the
proper and appropriate safeguards are not in place, every system
will become a victim of cybercrime, sooner or later. Cyber
security is incredibly important as -
The world today is taken over by Smartphone’s. It has become a
necessity. People spend a major part of their day looking into
35. the Smartphone’s. These are extremely vulnerable to loss or
theft. People generally are of the opinion that cyber security
deals with online hacking, whereas a lost or stolen phone is
easier to hack as it already contains many information in it. A
huge number of devices are synced to the internet and enormous
quantity of data is shared. All these constitute the Internet of
Things (IoT). Hence, hackers can very conveniently hack or
manipulate any piece of information from this huge pool of
data.
Figure 1: MALWARE DISTRIBUTION
People generally give out a lot of information online, either
personal or professional and it is a very common phenomenon.
This should actually be extremely alarming considering the
frequency of cyber-attacks (Kak, 2018). The attackers are
taking advantage of the fact that most of the people do not
practice safe online care of the data.
Malicious software or malware, as it is called is generally a file
or code, which is delivered via a network. It infects, explores,
steals or manipulates any activity as per the hacker’s choice.
Malware usually has one or more of the following objectives,
though diverse is type and abilities:
· In order to use an infected machine, the remote control for an
attacker is provided.
· From the infected machine, spam messages, mails, links, etc.
36. are sent to the unsuspecting targets.
· The infected user’s local network is explored.
· Sensitive information is stolen.
Malwares can be or many types, namely, Viruses, spyware,
Trojans, rootkits, worms, polymorphic malware, botnets,
Remote Administration Tools (RATs), etc. Previously, the
malware programs that were designed used to replicate games or
send mysterious messages to various users. In 1971, the Creeper
Virus was generated. Short messages, daring the user to capture
the creeper, were displayed when initially a system was infected
by the said virus (Yılmaz&Gönen, 2018). The Creeper did not
cause damage as it was a trial. It paved the way for future
attacks it could quickly spread through the various systems. In
1988, the Morris worm or Internet worm was distributed via the
Internet. It was the one of the first computer worms that pulled
in a lot of media consideration.
The various symptoms of the computer worms must be made
extremely familiar to the users. This will help to recognize the
infections quickly and take necessary steps. Some of the evident
indications are:
· Slowing down of the computer performance
· System crashing
· Automatic opening and running of various programs
· Abnormality in the performance of the web browser
· Any unusual behaviour of the system, including messages,
37. images, sounds, etc.
· Warming from Firewall
· Files may go missing or modified
· Unusual desktop icons or files appear
· Error messages from the system or operation system faults
· Without the user’s knowledge, emails are sent to contacts
The user should keep a track of these symptoms. There may be
some genuine issues which might lead to anyone of the above
mentioned symptoms but if many of these symptoms appear then
definitely the system has been affected by a worm. A
computer’s operating system and applications should always be
updated with the latest versions, because the software
susceptibilities are the foremost infection vectors for the
various computer worms (Farral, 2017). The updates should be
installed as soon as they are released.
The updates contain patches for the security faults and hence
are very important. Various types of malwares and worms can
be spread by the phishing attacks also. Unwanted mails from
unknown senders, which too containing doubtful links and
attachments, should always be avoided. A very strong internet
security software solution should be installed to block such
intimidations. Anti-phishing technology together with defences
against various malwares and other online threats should be
present in the security solution.
Artificial Intelligence (AI) and machine learning are still new
38. and has been explored fully in the field of cyber security yet.
This brand new technology has been developed as a totally self-
governing and autonomous system. It can be deployed as a
coating over the manual attempts at cyber security. This
boundless as well as nonlinear technology is way smarter and
faster than any human or computer(Gregory, 2016). It
additionally becomes more commanding on more training and
usage. It can proactively classify and alleviate a threat even
before a patch is developed, without being reactive. It can also
be functional and certified. The partnership between man and
machine is the future of cyber security. Both have to rely on
each other for fighting and mitigating cyber threats.
Figure 2: COMPUTER WORMSRelationship with CPT:
I have worked with the global IT firm, Cisco Systems Inc., for
completing my CPT assignment. 170 W Tasman Dr, San Jose,
CA 95134, Cisco Systems Inc., was established in 1984. The
said company deals with various computer malwares and worms
and helps to develop cyber-security techniques in order to
mitigate these threats.
What Cisco Systems does?
Cisco provides a technology which enables endpoint cyber-
security. It delivers solutions to deploy, monitor and safeguard
39. users’ applications as well as systems. It also provides safety
assurance, compliance, intelligence and training services.
Helping users to reach their cyber-security goal through various
consultations and services is its main aim.
Highlights of the Proposed Research
The research will focus mainly on malware and worm attack as
a result of cyber-security breach. The research will further
explain the causes and effects of the security breaches. It will
also provide recommendations as to how to deal with the
security and virus attack issues. So, as computer and computer
network security is prime focus in today’s world where data
loss and theft is on full swing, this research will definitely be
helpful in finding out the reasons and some solutions of the said
problem.
Overview of the CPT Assignment
I have worked as a trainee in Cisco. I have focussed on
observing and learning the various malware mitigation
techniques as well as their following deployment and support.
Thus, providing the much needed solutions and services to the
clients within a stipulated time without bothering the client
much has been the highlights of my training. I have been asked
to document my studies and observations in a proper format and
have also presented a report after the completion of the training.
As a trainee from the technical background, it was necessary for
me to learn how to detect the malware that has affected any
40. system, diagnose the perfect technological solution for it and
deploy the solution so that it starts working. The end-user
satisfaction has been of immense importance. I have developed
myself regarding the work procedures, implementation and
improvement of the solutions during my training period.
Relationship between the CPT Assignment and the Proposed
Project
My field of training and the selected research topic is closely
related. I will come across various other research papers, online
articles and journals in the entire duration of this research work.
This will help to gain more knowledge regarding my subject of
work and this it will help me to fare well in my assignments.
Completing this research work will also enhance my reporting
and research skills. All these learning together will help me to
enrich my knowledge and experience.Problems Statement and
Justification:
Any company can undergo a huge loss on being subjected to a
successful cyber-attack. Economic, reputational as well as legal
issues can be the effects of security breach.
Economic damage:
Extensive financial loss can occur because of cyber-attacks,
such as:
· Corporate and financial information stealing
· Money theft
· Trade disruption
41. · Business or contract loss
Reputational damage:
The main element of customer relation is faith and cyber-attacks
can destroy that by damaging the reputation of the business this
could potentially lead to loss of customers and sales as well as
reduced profits.
Legal damage:
The security of all personal and sensitive data is made
mandatory by the data protection and privacy laws. On
deliberate negotiation of the data and security measures’
deployment failure, the owner may have to pay fines as well as
give up supervisory authorizations. Some level of data
protection prioritization is required in order to mitigate the
security breaches. Important assets should be protected before
the unimportant ones(Ismail et al., 2015). Keeping records of
actions to take up during the breach is vital and in this case,
checklists can be helpful. Software updates should be installed
as they contain patches.
Every user should be made aware of the various types of attacks
and breaches and should be trained in handling those. Dry runs
should definitely be conducted. Data security vendors should
also be kept handy. The damage caused by a malware can be
different. Malwares and worms can cause insignificant increase
in outgoing traffic as well as complete network breakdown or
even sensitive data loss (Kapse& Gupta, 2015). The target of
42. the malware decides the measure of the damage.
Operability of computers and networks:
Deletion of critical system essentials, restriction of the OS as
well as overloading of the network with a DDoS attack can be
caused by a virus or Trojan attack. Often a bug in the code of
the virus or the operation’s principle can cause severe issues.
Hardware failure:
As modern computers are relatively secured from software
errors, hardware failures are rare. The CD/DVD tray can be
opened or closed by Trojan. The computers that run
continuously may experience drive failures due to these.
Data loss or theft:
The value of the lost information can be used to gauge the
intensity of the damage caused by a successful attack. Many
important and sensitive data, including presentations,
calculations, videos, pictures, etc. or any type of coveted
interaction can be lost or erased as a result of worm
attacks(Ansari, 2016). Taking regular backups is considered to
be one of the most ignored ways to avert data loss or theft.
A worm inside a network of many systems is a major issue
because on the one hand, it will damage every system and
because huge loss, similarly, on the other hand, it will consume
a lot of time in order to disinfect the systems (Kamal et al,
2016). The downtime of the systems will be considerably long.
43. Even though, a Trojan is not a huge threat to the system, its
presence in the system is not desired.
The basic steps to protect users from most of the computer
worms are –
· In order to run the functions as a limited user, a system’s user
accounts should be set. It should not be able to install software
automatically.
· In order to limit illegal network movement, all network
firewalls should be turned on.
· Installation of robust anti-virus software is necessary so that
automatic updating and scanning keeps continuing.
Figure 3: MALWARE SPECIMENResearch Scope, Aims and
Objectives:
Scope of the study:
In the recent era, computer worms have significantly drawn
attention to the research people, as it leaves undesirable
influence on the internet and local networking system. Past
scholars tried to assess the likelihood of adverse impact of
computer worms, by analyzing different classification. On the
other hand, the timeline of varied computer worms have been
assessed to know the degree of impact and future threats of
computer worms to a networking system and global internet
44. users.
Considering the fact, the study prioritises analyzing typical
worm behaviour in the networks and its life cycle, so that new
strategic path can be implemented to resist these devastating
activities. The scope for the current study is also limited as, it
can only address the issues for a specific range of network
system, which is actually feasible. Classification of computer
worms would be based on behaviour and scanning mode.
Analysing the classification the researcher would be able to
identify the evolution pattern of the computer worms and the
types of damage caused by the attack to the global networks.
Thus, strategies can be implemented to cut those attacks and
mathematical modelling can also help to determine the projected
future attacks that might happen against another set of evolution
of computer worms. To some extent, these predictions would be
helpful saving network attacking activities in both ways
theoretically and practically.
Aim:
The primary aim of the current paper is to assess how computer
malware worms affecting the cyber security. The secondary aim
is to evaluate the inadequacy of current security measures and
provide recommendations to resolve cyber crimes generated by
computer worms.
Objectives:
· To identify the characteristics of computer worm malwares
45. · To assess how the worms are affecting networking system and
its impact
· To evaluate existing strategies used to mitigate cyber security
issues generated though computer worms
· To estimate the loopholes of the existing process used to deal
with cyber security issues
· To recommend approaches that could be effective enough to
resolve the security issues generated by computer
wormsResearch Questions and Hypotheses:
Questions:
· What are the typical characteristics of computer worm
malwares?
· How the worms are evolving and affecting networking system?
· What is the risk likelihood of computer worm attack?
· Which existing strategies used to mitigate cyber security
issues generated though computer worms?
· How much loopholes are found in the existing threat
mitigation process against cyber security issues?
· Which strategic recommendations could be effective to resolve
the security issues generated by computer worms?
Hypothesis:
First set:
H0: Typical computer worms affects and damage global network
security
H1: Typical computer worms do not affect and damage global
46. network security
Second set:
H0: Mathematical modelling and its projection towards the
evolution of computer worms can safeguard the cyber security
attack
H1: Evolving replica of computer worms would be more
powerful which cannot be destroyed by the implementation of
recommendations drawn from mathematical modelling to a
significant extentLiterature Review:Computer worm malwares
and its characteristics:
A computer worm is kind of malwares which are standalone in
nature and these programs can reproduce or create duplicates to
spread to other computers or operating systems. It generally
uses the network to spread through the other computers. It
creates problem to security measures and make them fail on the
targeted systems or computers to access it (Sharma & Sahay,
2017).
Malwares are generally the malicious software which gets in to
the system through various viruses via the network and spread
through the computers and operating systems. There are
different kinds of Malwares like adware, worms, Trojan,
backdoor etc.
Figure 4: MALWARE
(Source: Singh, 2017, 870)
47. Adware
It is meant to steal the user information, its added capability
helps it to activate the spyware running with it, and they are
dangerous in nature and harm the system completely
(Velliangiri & Premalatha, 2017).
Bot
Bots are used for malicious purposes to steal user activity and
information. Spam bots are sent to user systems or computers
through third party vendors.
Bugs:
Those are generally used by the compilers on source codes of
the program.
Ransom ware
It is the most harmful malwares which are generally used for
harming the user operating system and can also ask for forceful
ransom payment.
Spyware
As the name says it used to spy on the user system and
programs and activities and try to steal them.The way worms
are affecting networking system and the likelihood of its impact
on the network:
As there are many kinds of computer worms or network worms
like it can be email worm, bot worm, hybrid worms, and Virus
worms etc. Computer or Network worms affect the network
48. security and even system securities in various ways as below:
· They affect the network and systems depending on its codes.
Generally, they make copies and spread highly through other
computers or systems without any bodies knowledge.
· They can also send malicious emails to any address book those
are stored on user system.
· This kind of malwares are very malicious and it can access the
computer so easily and go on to the system files, which help it
to spread the
· It creates bypass and able to dominate the firewall of the user
system helping to affect the hard disk files of the operating
system.
Impact of Computer Worms or malwares on Network Security
There are various worms or harmful malwares which generally
used to corrupt the data from the user system, disable the
computers network security. Worms are less harmful but can
create problem for small business giving risk for their user data
and the computer networks. It hampers the performance of the
user system while doing important tasks and infects the
computer thoroughly.
Hamper capacity: Velliangiri & Premalatha (2017) stated that in
a computer any program, software, resources etc consumes hard
drive storage. While there a threat of worms or malwares it used
to create duplicate spaces and consumes the capacity of the
system unnecessarily without the knowledge of the user.
49. Time: When the computer or system gets infected by the worms
it takes much longer time to perform as the worm used to create
duplicate files and slow down the processor speed.
Computer Security: After the worm or malware get installed it
can perform numerous actions without user’s knowledge and
steal computer data which can be an issue of breach of security.
Hackers can get the financial data and give the user monetary
loses.
People can face a lot of issues if those worms infect their
system like instability of data, cope of undesirable of contents,
data harvesting etc. To get rid of those problems every user
should install strong firewalls, should use genuine version of
operating system and use a strong antivirus to protect their
system data and life.Previous strategies used to mitigate cyber
security issues generated though computer worms
Computer network which is affected by the malicious worm not
only suffer from disruption of service but also become weak to
any kind of cyber-attack in the form of viruses or malicious
worms which duplicates its structure and affect each and every
part of computer to generate the loss of data and mainly
attacking the operating system. Now days the technology had
upgraded to Internet of things or clouds computing but prior to
that to stop the malicious work affecting the whole network
system of computer different strategies were undertaken to fight
against these malicious worm.
50. · The operating system must be updated with new version in
timely manner and install all the new version of patches which
has the ability to fight with new cyber-attacks of malicious
worms.
· The previous and existing strategies is the use of the firewall
which is an authenticate method to protect the computer
network from worm attack and also the software running in the
computer reducing the risk (Gregory, 2016).
· Many work threat or worms comes in encrypted method, so
there are codes which are used to run in computer to decrypt the
code and delete it before it could do a great harm to the
computer and the system method running in the computer.
· Another new and previous strategy were to remove that
computer which is running in a group of computer network
system and hence the affected computer could be replaced with
the new one to avoid the risk of vulnerabilities to the computer.
· The other main strategy is to be careful to any links or email
or any messaging app, which could contain the worms and on
clicking it may affect the computer, should be readily
avoided.The loopholes of the existing process used to deal with
cyber security issues
Cyber security is a serious issue which is faced by every
organization. Attacking and attempting to hack databases or
malware attacks on computer systems have become frequent
cases. As per Gregory (2016) with the huge advancement of
51. technology as everyone is getting benefits and also advancing
the business utilizing these technologies, attackers with
malicious intents are also the same to increase the degree of the
attacks. Therefore, the attackers can find new methods using the
technologies to get past the present security system
implemented in the cyber security. In many cases it has been
seen that the attackers have invented new way to affect the
computer systems which cannot be countered by the existed
security system (Farral, 2017).
The most critical fact about safety is to maintain and monitor
the security system and to check if the security system patch is
up to date with advancements of new technologies. Ansari
(2016) said that with the up gradations of software the security
associated with it always need to be rechecked and to need to be
upgrade, so that it can match up to the software with proper
safety. As this is much more expensive process than
implementation of the security systems many organizations
decides to ignore it.
Therefore, the safety system loses its effectiveness and
gradually becomes an easy target for the attackers. When an
advanced, upgraded operational technology is implemented into
the cloud or connected with the internet, a proper threat
assessment is required (Yılmaz & Gönen, 2018). Attackers are
generating more malicious software or malware which cannot be
identified by the present security measurements. Also new
52. advance techniques are being adopted using the technologies to
breach any computer systems of any organization. Without
proper security systems the organization are completely
vulnerable against these attacks.Strategic recommendations to
resolve the security issues generated by computer worms
Computer Worms malware infection is a method to attack the
computer systems to make it unbearably slow for operation or
hijacking the system. To protect the sensitive and important
data from these undesired attacks proper strategies is need to be
adopted by the organization. Some of the strategies that can be
considered are:
Anti-worm Software:
To prevent this malicious attack, it is recommended that the
computer system is contained with effective anti-worm software
which can identify the threat and can notify to the
administration or management. This software can scan any data
received by outside source to check any possible threat and can
notify the users to avoid it from opening or take
countermeasures to remove it.
Spam Filters:
The spam filters have the ability to block and confinement any
email or messages containing any suspicious content and send
from any unknown sender and alerts the user to avoid it. Many
large and small organizations along with many personal email
provider currently have implemented the spam filter.
53. Security Scans:
It is important to avoid any malicious and suspicious content
and also need to avoid any software which can spread worm in
the computer system. That is why computer systems should be
contain with effective software which can scan the software that
would be installed or have been installed in the computer
system to check if it is infected with the worm.
Regular Updates:
The networks, devices and computer systems are need to be
updated regularly. The updated security patches provided by the
software vendor are needed to be purchased and installed to
handle the latest threats.
Firewalls:
Firewalls are considered to be the finest defence line up in the
computer system. This technology can block anything
suspicious to be accessed and installed in the computer network.
Proposed