SlideShare a Scribd company logo
1
Running Head: COMPUTER WORMS MALWARE IN CYBER
SECURITY
14
COMPUTER WORMS MALWARE IN CYBER SECURITY
COMPUTER WORMS MALWARE IN
CYBER SECURITY
Praveen Ranghavajhala
201696
Abstract
Generally, there are numerous current research which deals with
diverse types of computer worms in both the computing as well
as the technological world. This respective report will therefore
analyze the current research done on the computer works. In
addition, it will reflect on the various malware attacks which
may be a subsequent of any given cyber security breach (Sari,
2018). The research conducted will essentially have an integral
objective of locating the characteristics of the various computer
worms as well as diverse types of computer malware that
generally affects the functioning of the computing field.
This prospective research conducted will additionally facilitate
the impact of such malware attacks on the computers as well as
the networking systems. To effectively analyze these
phenomena, the research utilized secondary data collection
mechanism in its various navigated data acquisition (Sari,
2018). The research significantly employed the use of
exploratory approach as well as the deductive research design
which was majorly utilized by the respective researchers who
conducted this prospective research. It will conclusively
prescribe various methods to hibernate and reduce such malware
and worms attack on the computers. This will exclusively
minimize the rampant effects of malware attacks on computers
hence improving the computer functioning.
Introduction
Cyber security can be described as an inclusion of various
tactics that are meant to protect computers, networks, program
as well as data from any illicit access or breach hence resulting
to malware attacks. Such attacks can be elaborated as an aim for
the corruption. Cyber security in addition can be termed to be a
protective measure towards the consumption ability, veracity as
well as the respective security of the network. There are various
parameters that can be put in place to protective massive threats
from assessing their intended targets. Such parameters include
using the anti-virus as well as anti-spyware. In addition, other
measures can be taken such as mounting firewalls to repel or
resist any unauthorized admission to the computer system.
Other preventive actions that can be essentially utilized include
intrusion prevention systems. These intrusion prevention
systems generally identify quick affecting risks such as zero-
hour attacks hence lessening occurrences of such attacks.
Generally, the protection of personal as well as professional
data from cyber threats is basically an urgent necessity in the
world today. This is where the cyber security interrupts in for
the rescue of such protection of personal information as well as
professional data. People generally think hat systems are safe
whereas they actually are not (Horowitz & Lucero, 2017) This
therefore implies that there is essential need to safeguard every
computer system. This will hence prevent such computer
systems from becoming victims of cyber crime in every day in
the modernized world (Hu, 2017). This literally shows the
significance of cyber security in the fight against the computer
malware attacks as well as the computer worms that may inject
viruses into the computer systems. This may be as well sedated
by the fact that individuals are generally prone to giving a lot of
their personal information online. Some of them even walk a
further extent to exposing their professional information online
which makes their identity subjected to risks and any cyber-
attacks (Hu, 2017). Ransomware attacks are a common scene in
the world today. Therefore, there is need to conduct a through
research on the preventive measures that will help eradicate the
cyber crimes in the world today and create a better world for
coming generations.
In relation to that, this report will therefore cover the research
conducted and the means in which the research was a successful
in concluding measures to take against cyber-crimes. Generally,
malware can be so numerous in the cybercrime field (Hu, 2017).
They include the viruses, spyware, trojans, rootkits, worms,
polymorphic malware, botnets, remote administration tools
commonly described as RATs as well as other many typical
computer malwares which will be reflected and given
appropriate measures by this respective research. To effectively
execute such measures on these computer malwares, there was
need for the research to facilitate a literature review on the
computer malware. It therefore described the research
methodology that was utilized as well as data collection and
data analytics. The research after the absolute examination of
the results and findings facilitated a set of findings as well as
recommendations to mitigating such computer worms and other
malwares attacks to the computer systems (Hu, 2017).
Literature Review
The literature review of this respective research highlighted on
the computer worm’s malware as well as the prospective
characteristics of the malwares. This can be derivative form the
fact that within the current era, the computer worms have
essentially attracted concentration form various researchers as
well as literature authors in analyzing this typical emerging
complication which is rampant and wide spreading. The
computer worms generally cause unwanted impact on the
internet as well as local networking system (Farral, 2017). Even
past scholars have effortfully attempted to assess and describe
this difficulty to no avail. This explains the extent to which
these computer worms may be disastrous to the modernization
and networking in the modern world. The timeline of the
diverse computer worms has also been extracted to help realize
the extent of influence as well as future threats of computer
worms. This is especially to the mentioned network system as
well as global internet consumers.
Generally, numerous researches as well as typical studies have
formally concentrated on prioritizing the analysis of the typical
worm behavior in the networks and their respective life cycle.
This facilitates and establishment of the new techniques as well
as the mechanisms to utilize in the ultimate resistance of the
devastating activities. This should as well advance the literal
scope of the recent study which can be concluded to be limited
(Farral, 2017). This can be said from the fact that it only
addresses the complications for a unique variety of network
system which may be significantly be regarded as having
feasibility. Various literature reviews have exposed the
categorization of computer worms in accordance with the
behavior paradigm as well as scanning mode of the respective
computer worms.
In a compatible categorization of such computer worms, any
given researcher may be in a position to locate and recognize an
evolution pattern of the computer worms as well as the variety
types of damage which the respective computer worms causes to
the prospective global networks in the world. These will
apprehensively facilitate the accurate measures to take while
curbing such computer attacks from the computer worms
(Farral, 2017). Such computer worm identification may also
significantly help in coming up with an appropriate
mathematical modelling. This respective mathematical
modelling may assist in determining the projected future attacks
which may occur against any other possible set of evolution of
computer worms. This therefore literally implies that such
predictions may essentially facilitating a desirable rescue of the
computer systems network attacking activities which may occur
both under theoretical mechanism as well as practical
mechanism.
Generally, computer malware can be described to be malicious
software which may enter into the computer system via
numerous viruses through the network. In addition, they can
also navigate through the respective computers searching of
potential weak spots to attack within the software of the
respective computers (Farral, 2017). They also spread out
through the operating systems of the respective computer
systems. Essentially, there are numerous types of computer
malwares. They include adware, worms, trojan as well as
backdoor.
Adware is generally meant to steal the information of the
respective computer user. It also has an ability to catalyze the
spyware which also runs together with it. Adware can be
regarded as very harmful in nature as they harm the computer
system completely (Velliangiri & Premalatha, 2017). Bot on the
other side are essentially utilized in causing malicious
intentions to steal user activity as well as their respective
information. The spam bots are also taken to the computer
operator via other third-party vendors that may be related to the
respective computer operators. Bugs are utilized by the
compilers on source codes of the respective program under use
(Velliangiri & Premalatha, 2017). Ransom ware malware is
recognized as being amongst the most hazardous computer
malware in the world. They are generally utilized with an
intention of harming the operating systems of the computer
operators. They are besides commonly utilized by the attackers
to demand for a ransom for the restoration of the respective
computer systems (Velliangiri & Premalatha, 2017). The
spywares are being used by attackers to spy on the computer
system of the operator as well as the programs and computer
activities hence stealing from them.
This literature review also highlights and explains on the
manner in which such computer worms influence the networking
system as well as the possibility of their influence on the
respective computer networks. Computer malware and worms
affect the computer systems according to the codes of those
respective targeted computer systems. The bad fact about these
computer worms is that they replicate themselves and spread
rapidly to other computers or even systems without the
perspective knowledge of the computer operators (Velliangiri &
Premalatha, 2017). These computer worms have a great
influence on network security as they essentially corrupt the
information form the user system, disabling the computer
network security. They therefore interfere with the performance
of the user system while executing vital tasks as well as
infecting the computer.
Research Methodology
Significantly, it is evident that the mechanism of a prosperous
security features is generally adorned with the concept of the
encryption that is string enough to sustain and protect the data
confidentiality index. From the research conducted, it is also
obvious that the two tires this mechanism of encryption in such
a manner as in encrypted algorithm with the set of commands as
well as the encryption key code which is generally utilized by
an algorithm to secure the data set (Kama, Alani & Abdulmajed,
2016). Within the selected methodology as well as the solution
facilitator of the research conducted, there were numerous
mechanism that were employed towards gathering of the
information to help in the conclusion of the respective research.
Such mechanism parameters include public or private key
encryption, defensive mechanism, offensive mechanism as well
as the control server detection.
Within the respective research, all the devices were capable of
utilizing a public key of a station to encrypt the information.
The recipient stations therefore had to decode the information
while using their respective personal private key. According to
Kama, Alani & Abdulmajed, (2016), no other devices can have
the private key of the station. Besides, no other device can
decipher the respective information. This literally implies that
the information confidentiality while conducting this respective
research was optimally maintained. The research also utilized
disproportionate key for data privacy. These were circumstances
when the research execution required sending of a digital
signature to the secure the information. Cisco also utilized the
DSS standard to validate peer switches amid the setup of an
encoded session. The genuine information was therefore
scrambled.
The research also utilized the defensive system mechanism.
These systems generally reflect on the recuperation from the
malware infection as well as the two fundamental
categorizations as they have been based and arranged. The
offensive mechanism on the other hand was used in the research
where the system chips were utilized on the occasions of
launching the attack as well as the process against malware to
annihilate the infection impact. The basic goal of such a
mechanism was to limit the malware expediency (Kama, Alani
& Abdulmajed, 2016). This could be implemented through
infusing a fraudulent information like phony accreditations as
well as band accounts. In addition, the research also employed
the use of the control server detection. Generally, it utilized this
respective parameter in unveiling the possible computer
malwares which would communicate with the exposed server.
Data Collection
Data collection is generally a mechanism that can be utilized in
gathering as well as measuring quantifiable data on the targeted
factors through ways of an established pattern. Data collection
besides facilitate the researcher in extracting the required
answer with the relevant queries that are connected to the
respective thematic aspect under research (Kennedy-Clark,
2015). This research required data collection in the ultimate
explorations of the on the attacks of computer worms over the
network system. The research also majorly utilized the
secondary data in in gathering past research information which
the researchers also believed they were useful within the
respective research. The secondary information can facilitate a
vast set of records which were carried out by the past scholars
(Bowman, 2014). The research therefore employed the use of
online journals, e books as well as case study that had
previously been carried out by diverse research organizations as
well as the various peer-reviewed and scholarly articles. This
essentially helped in gathering of the required information that
were relevant in this respective research.
Data Analytics
From the fact that information from the secondary sources were
regarded as to have been examined through descriptive methods,
there was an essential need to explain the exponential outcomes
of these secondary source information. Such outcomes are
essentially from diverse hypothesis hence need to be examined
through descriptive methods (Thomas, 2015). It is from such
variety set of records that the researchers were able to conclude
a reasonable statement that was dependent on the weighed
outcome. The weighted outcomes were determined on the
repetitive behavioral, scanning as well as network attacking
patterns of the computer worm malware.
The analysis of the hypothesis as well as the proposition of the
authors was done by the concerned researchers. It located that
the computer virus is commonly a programming code that may
harm all the files as well as folders that have been archived in
the computer systems. This may also terminate the whole
system from the network. Generally, the communication
technology is one of the essential means in which the infection
may be spread through. The viruses utilized the communication
technology of the computer systems to spread into the public
system hence becoming more disastrous (Kamalet, 2016). This
gives the cyber attackers an easy opportunity to attack the
computer system. They generally insert a killer program into the
computer system where the target whole the cyber network for
an additional take over. These viruses can be spread via VPN.
Findings and Recommendations
From the analysis of the research, its is evident that the
utilization of numerous applications in the computer system
may essentially facilitate the growth of the virus. This in
addition increases the replication of these computer viruses
hence making them more hazardous. In addition, the analysis of
the research justify vividly that the preventive actions have to
be executed prior the computer attack. Such an action may
significantly assist in reducing the gap between the computer
system as well as the computer attackers (Gregory, 2016). This
will apprehensively distract the computer virus from thriving
into the computer system. The analysis also manifest that
preventive parameters ought to be executed by a thorough
investigation of the weak spot of the security system. In
addition, it will exclusively eradicate the viruses that have been
enshrined in the computer system through the treatment
mechanisms. This will essentially help eradicate the whole
registry under suspicion into the computer system.
An IDS will vitally differentiate between the malicious
junctures which will communicate with an overseer hence using
email, paging as well as recording of the occurrences. It can
also help in executing the factual as well as peculiarity
examination. This literally explains why various business
organization ought to employ this Interruption Discovery
Framework in their business information system while
combatting various cyber threats that may be found within the
information technology of the respective business organization
(Gregory, 2016). As well, IDS may essentially perceive and
respond to a focal catalogue which relates the information from
the dissimilar gadgets thus facilitating an overseer with a
universal standpoint of the incessant security of the respective
network system.
There are various prescribed recommendations that may be
utilized in fighting against malware worms in the computer
systems hence curbing cybercrimes occurrences. One of the
technical tactics to utilize include implementation of the anti-
worm software. This software will locate the potential threat
and give a notice to the administration or even the business
management. Spam filters may also be utilized (Gregory, 2016).
They have the capability of blocking as well as confining any
email and messages which may be suspected of containing any
threat and sent from unknown persons. It notifies the user to
avoid such content. Security scans also can be a preventive
mechanism in which they scan any software to be installed into
the system. Regular updates may also be utilized. This include
the networks, devices as well as the computer systems which are
prone to threats and attacks.
Conclusion
Conclusively, it is justifiable to apprehend that the main threats
to cyber security as well as security network in the modern
world today is the worm and malware attacks. Nevertheless, this
respective research has proven that despite the presence of such
type of malware attacks as well as malware worms, there are
numerous preventive measures that can be implemented to
safeguard network security. It has been manifested that the
diverse forms of malwares may results to disastrous impact on
the computer system as well as the network security. Any
business organization opting to take such preventive measures
should therefore have legal contracts beforehand with business
organizations offering cyber security so as to avoid going
through massive data loss in their information system. This will
help mitigate the opportunities of cyberattacks from replicating
in the world.
References
Bowman, J. (2014) ‘Data, analysis, action!’, Research World,
2014(46), pp. 22–26. http://www.scientificpapers.org/wp-
content/files/1563_Cordova_Rangel-
A_review_of_research_methods_in_strategic_management.pdf
Farral, T. (2017). Nation-State Attacks: Practical Defenses
against Advanced Adversaries. Network Security, 2017(9), 5-7.
doi: 10.1016/s1353-4858(17)30111-3
Gregory, J. (2016). The Past, Present, and Future of
xVA. Wilmott, 2016(82), 37-39. doi: 10.1002/wilm.10487
Horowitz, B., & Lucero, D. (2017). System-aware cyber
security: a system engineering approach for enhancing cyber
security. Insight, 20(3), 66-68. doi: 10.1002/inst.12165
Hu, G. (2017). Countermeasure against Distributed Denial of
Service Attack. Destech Transactions on Engineering and
Technology Research, (apetc).
doi:10.12783/dtetr/apetc2017/10920
Kamal, M., U. S., Ali, A.J.R., Alani, K.H. &Abdulmajed, S. E.
(2016). Survey and brief history on malware in network security
case study: viruses, worms and bots, ARPN Journal of
Engineering and Applied Sciences, 11(1), 683-698.
https://www.researchgate.net/profile/Saif_Alsamer/publication/
301695496_Survey_and_brief_history_on_malware_in_network
_security_case_study_Viruses_worms_and_bots/links/57c427be
08aee5141be5b75c/Survey-and-brief-history-on-malware-in-
network-security-case-study-Viruses-worms-and-
bots.pdf?origin=publication_detail
Kennedy-Clark, S. (2015). Reflection: Research by design:
Design-based research and the higher degree research
student. Journal of Learning Design, 8(3). doi: 10.5204/jld.
v8i3.257
Sari, A. (2018). Countrywide virtual siege in the new era of
cyberwarfare: remedies from the cyber-firewall:
Seddulbahir. Journal of Cyber Security Technology, 2(1), 14-
36. doi: 10.1080/23742917.2018.1476956
Thomas, J. A. (2015) ‘Using unstructured diaries for primary
data collection’, Nurse Researcher, 22(5), pp. 25–
29.http://www.sociology.kpi.ua/wp-
content/uploads/2014/06/Ranjit_Kumar-
Research_Methodology_A_Step-by-Step_G.pdf
Velliangiri, S., &Premalatha, J. (2017). Intrusion detection of
distributed denial of service attack in cloud. Cluster Computing.
doi: 10.1007/s10586-017-1149-0
Avoiding Plagiarism
David Runyon, M.L.I.S., M.S.
1
HU on plagiarism:
“Plagiarism” includes, but is not limited to, failure to indicate
the source with quotation marks or footnotes, where
appropriate, if any of the following are reproduced in the work
submitted by a student:
i. A phrase, written or musical
ii. A graphic element
iii. A proof
iv. Specific language, OR…
2
HU on plagiarism:
Plagiarism is using the ideas of others and/or words without
clearly acknowledging the source of that information.
-Harrisburg University 2017-2018 Undergraduate Catalog , pg.
48
3
HU on Academic Honesty
Harrisburg University expects a student to act honorably and in
accordance with the standards of academic integrity. Academic
integrity is grounded in mutual trust and respect. Therefore, it is
expected that a student will respect the rights of others and will
only submit work that is their own, refraining from all forms of
lying, cheating and plagiarism. Lack of academic integrity
includes:
Plagiarism
Cheating
Fabrication, alteration of documents, lying, etc.
Assisting others in academic misconduct
-Harrisburg University 2017-2018 Undergraduate Catalog , pp.
48-49
4
Consequences
Sanctions for violations of Academic Code of Conduct
Assignment grade of 0
Failing grade in the course at issue
Warning via written notice to the student
Withdrawal from course
Temporary suspension from the University
Expulsion
Withholding of a diploma
-HU Student Handbook, pp. 14-16
5
Intentional
Inadvertent
Turning in a paper written by another student without
permission.
Turning in a paper a peer has written with permission.
Turning in a paper purchased from a term paper service.
Turning in a paper from a “free” online term paper service.
Copying from the source but failing to provide appropriate
documentation.
Copying from the source, providing appropriate documentation
but failing to use quotation marks.
Paraphrasing from source but failing to provide appropriate
documentation.
Incorrectly quoting, paraphrasing or citing.
What needs to be cited?
Any idea that did not originate in your own brain, from
whatever source:
Movies, newspapers, TV shows, websites, radio, books, music,
etc.
Speeches, conversations, interviews
Verbatim passages from a source (with quotation marks)
Paraphrases from a source
Purdue University, (2007). Is it plagiarism yet? The OWL at
Purdue. http://owl.english.purdue.edu/owl/resource/589/02/
7
What does NOT need to be cited?
Your own, original thoughts, opinions, experiences
“Common knowledge” and generally accepted facts
Purdue University. (2007). Is it plagiarism yet? The OWL at
Purdue. http://owl.english.purdue.edu/owl/resource/589/02/
8
When in doubt, cite!
9
Always cite:
Phrases you rewrite from another source
Verbatim passages that you’ve put quotation marks around
Ideas that come from others
10
Cite your sources by:
Including in-text citations (Smith, 2000, p. 31)
Including all sources in your bibliography at the end of the
paper
Consistently using an accepted citation format such as APA
11
“Patch writing” is plagiarism.
Patch writing = stringing together sentences from more than one
source, without paraphrasing.
Principle: Academic writing means using your own words!
12
Don’t rely on others’ words.
Strive to keep your use of other people’s words to a minimum.
Excessive use of quotations = lack of effort, lack of
understanding of your subject
Limit use of quoted material to 10% or less of your final
product.
13
Can you plagiarize yourself?
Yes!
Always cite your sources, even if it’s your previous work.
14
Practice Paraphrasing!
“Can a mortal ask questions which God finds unanswerable?
Quite easily, I should think. All nonsense questions are
unanswerable. How many hours are there in a mile? Is yellow
square or round? Probably half the questions we ask—half our
great theological and metaphysical problems—are like that”
(Lewis, 1961, p. 81).
Lewis, C. S. (1961). A grief observed. New York, NY: The
Seabury Press.
Sample Paraphrase
Lewis (1961) suggests that our limited understanding of reality
leads us to pose questions that make no sense and,
consequently, have no answer, even when asked of God (p. 81).
References
Lewis, C. S. (1961). A grief observed. New York, NY: The
Seabury Press.
References & Contact Info
VandenBos, G. R. (Ed.). (2010). Publication manual of the
American Psychological Association. Washington, D.C.:
American Psychological Association.
Facebook: Harrisburg University Library
Twitter: @husatlib
Library: Second floor
Based on an original presentation by Kathleen Conley, HACC,
with elements from Nancy E. Adams, Harrisburg University,
and Jessica See, Harrisburg University.
18
Benefits, Barriers, and How to Overcome the Barriers of Using
and Implementing Big Data Analytics throughout Supply Chain
Management in the Medical Industry
Adelaide Navickas
Harrisburg University
12/04/2016
Presentation Agenda
Introduction
Research Question
Research Methodology
Literature Review
Results
Limitations of the Research, Future Work Planned, and Lessons
Learned
Conclusion and References
Introduction
Big Data
Volume
Velocity
Variety
Big Data Analytics
Supply Chain
Procurement/sourcing
Logistics
Operations
Marketing
Author’s Background
Masters in Analytics
Working for Medical Device company in a Customer Care role
As previously mentioned Big Data has frequently been defined
as data with high volume, velocity, and variety [5] [6] [7],
while Wamba et al. goes on to add veracity and value as key
components in the definition of Big Data [2].
BDA is the application of Business Analytics on Big Data.
Business Analytics refers to statistical analysis, forecasting,
predictive modeling, and optimization techniques
3
Research Question
Specific
Benefits
Barriers
How to overcome these
Implementation and continued use
Leadership
Talent Management
Company Culture
Survey supply chain team members
Limitations
Not exhaustive
No suggestions for how to overcome unless provided by survey
respondent
Research Methodology
Identified the target respondents.
Wrote the questions and interactive statements for the survey.
Survey was reviewed by two individuals.
Survey was revised based on feedback from previous step.
Three people re-reviewed the survey
Final changes to the survey based on feedback from previous
step were made and the questions were uploaded the online
survey site SoGoSurvey.
Survey was sent out to potential respondents over a month long
period via individual emails.
Data from the survey was exported to an Excel file and analysis
of the results was conducted in order to identify common trends
among the answers as well as identifying anomalies.
Literature Review
Overview of existing Literature
With the ever-increasing amount of Big Data available to and
collected by companies, BDA has emerged as a key tool for
businesses looking to gain a competitive advantage, new
insights, and added value (full reference provided in paper)
There are many BDA applications that can be applied to all
parts of the supply chain. Waller and Fawcett suggest that
business and supply chain leaders must understand and use BDA
to support decision-making in SCM (full reference provided in
paper)
In Sanders’ article, “How to Use Big Data to Drive Your Supply
Chain,” the survey used indicated that the majority of
executives believe that BDA is a priority for the future, but also
admitted there were concerns about the cost and the choices
available that would best suit their needs (full reference
provided in paper)
Recent literature reviews broke down the current studies by
varying categories:
Type of analytics used (predictive, prescriptive, or descriptive)
Types of value creation found by using BDA
Varying other criteria: focus, research approach, method
triangulation, data generation, range, timeline, theoretical
background, and target audience
Limitations of Existing Studies
BDA is still gaining momentum in the world of SCM. While
there are plenty of businesses that are using it, there is very
little research on the benefits and barriers associated with
continued use of BDA due to its newness
S. F. Wamba et al. brings up the lack of research on how
leadership, talent management, technology, culture, data
privacy, and decision-making processes impact the use of BDA
(full reference provided in paper)
Goal of this presentation is to bridge the gap between formal
research and industry usage by providing supply chain
executives with the necessary information to understand the
benefits of and overcome the barriers to implementing and
continuing use of BDA in SCM
Results
General Survey Statistics
Table 1 shows the breakdown of respondents’ industries within
the medical field
Majority of responses are from hospitals
But there is a good mix of other industries as well
Breakdown of time using BDA in supply chain
44% of respondents using BDA have only been using it for one
to three years
19% have been using BDA for four to six years
15% for seven to nine years
7% for ten to twelve years
8% have been using it for 13 or more years
Table 2 shows the majority of companies with over 1000+
employees are using BDA in their supply chain (20 of 24)
Due to low response rate from smaller companies the author
makes no conclusion as to whether or not there is a trend for or
against BDA usage in companies of that size
The majority of respondents, regardless of company size, are
using BDA (27 of 32)
Table 3 shows the breakdown by component. Please note there
is overlap as a company could be using BDA in 1-4 of the
components
Marketing is the component of supply chain that uses BDA the
least right now
Table 1
Table 2
Table 3
It was also shown through the survey that of the four
respondents using BDA in marketing, three were using BDA in
all other components as well suggesting that marketing is the
last piece of the puzzle when implementing BDA in the supply
chain
8
Benefits
Of the 27 respondents who use BDA in their supply chain, 26
provided answers that equated to 59 individual benefits
Financial benefits were by far the most prevalent benefit (23 of
59)
Optimization and maximization was the next most frequent
benefit (9 of 59)
Better tracking/reporting/insight (8 of 59)
Other common benefits include:
Identifying trends (5)
Better models (4)
Monitoring inventory levels (5).
Reducing excess (2)
Identifying fraud (2)
Increasing process efficiency (1)
Specific Examples
In regards to optimizing human resources, one respondent
specifically discussed the use of a system that tracks an
employee’s work progress through time, speed and logistical
status by way of an RF scanner. Not only did it help improve
employee efficiency, but it also allowed that company to pick
better locations for items to increase picking efficiency.
“Patient demographic information has been analyzed to
determine where our patients come from to assist in marketing.
In addition, analyzing data that identifies if a patient was
referred to our Health Care system from a smaller organization
has allowed us to strategically form alliances with surrounding
health care providers that serve as a feeder for patients
requiring more complex care than what they can provide. As a
result we have maintained steady/or increasing volumes of
patients and we are often treating the more critically ill that
bolsters our reputation as well as giving us the opportunity to
increase revenues.”
The benefits identified by respondents were varied but did have
common themes. Of the 27 respondents who use BDA in their
supply chain, 26 provided answers that equated to 59 individual
benefits.
Financial benefits were by far the most prevalent benefit. Such
benefits were identified 23 separate times. These financial
benefits included lowering the cost of devices or distribution,
reducing costs through better negotiating and review of
contracts, reducing labor costs through the balancing of human
resources, and lowering freight bills.
Optimization and maximization was the next most frequent
benefit listed encompassing nine of the 59 benefits. Examples
include optimizing item location within a warehouse, optimizing
inventory levels as well as human resources, maximizing sales
through better service levels, and increasing patient volume
with targeted marketing.
The third most frequent benefit was found to be better
tracking/reporting/insight and was mentioned in eight of the 59
benefits. Examples include providing leadership with a big
picture view of daily operations, providing information on
clinical use of products which leads to standardization of
product decisions, tracking compliance with contracts, and a
better notification system to remind employees of what is
coming next.
Other common benefits include identifying trends (5), better
models (4), and monitoring inventory levels (5). Trends were
mentioned to be found in customer behavior, expenses,
operational, and financial categories. Models mentioned were
used for a centralized supply chain (for multiple hospitals) and
predictive analytics. One example described using models to
predict usage spikes so that they could be proactive in their
procurement as opposed to reactive. The last few benefits
included reducing excess (2), identifying fraud (2), and
increasing process efficiency (1).
9
Barriers for companies not yet using BDA
5 respondents’ barriers:
A current model that is more granularly focused
A lack of data analysts
A lack of proper systems (mentioned by three of the five
respondents)
Resources needed for implementation
High cost involved in system add-ons
No noted ways to overcome these barriers by these respondents
However, similar barriers were listed by the respondents who
had implemented BDA along with ways to overcome those
barriers
Barriers and How to Overcome Them
Barriers
Of the 27 respondents using BDA, 26 of them provided 52
individual barriers
The largest category was data integration (11 of 52)
Companies are working with data in inconsistent formats across
multiple systems that may or may not initially pair successfully
with each other
Data Accuracy (9) and Data Validation (8)
Shared between 12 respondents – 5 of which listed both barriers
Data accuracy barriers included not trusting the data source
(customers, physicians, nurses), knowing data was manually
entered (always a chance for human error), and not trusting the
system it is being pulled from to provide consistent results
Data validation barriers included manual checks of the data to
make sure results and reports were accurate, questioning the
data rather than the analysis, and having to validate the source
data used in the analytics
Remaining barriers:
Technology for data manipulation (4), technology for data
storage (3), database reporting logic (3), calculation accuracy
(3), data security (2)
10 other individual barriers
Methods to get past them (if provided)
4 of 11 respondents who faced data integration barriers
overcame them
By developing a system to standardize data collection,
enforcing policy and procedure, persistence, or creating an
automated process making data more readily available
7 of 12 respondents who faced data validation and data accuracy
barriers overcame them
By revising reporting tools, educating staff who uses the data
about the value of the data and its accuracy, trial and error,
continued use of the data allowing for regular adjustments that
provide better information, or developing a system that allowed
for more data to be collected at a greater depth so that it could
be cross-validated across datasets
workforce resistance to their actions being tracked and
measured, HIPAA (Health Insurance Portability and
Accountability Act) limitations, lack of human resources,
building an effective business case to show leadership the
benefits of implementing BDA, pushback from suppliers on
pricing benchmarks, internal stakeholder pushback, data
volume, steep learning curve, end-user pushback, and the ability
to drill down into the data
11
Leadership, Talent Management, & Company Culture
50% of responses mentioned leadership
A quarter of these had a lack of leadership support
The remaining three-quarters noted that they had strong
leadership buy-in and support which continues to help their
team provide benefits to their company
40% discussed the need for strong human resources with
analytical skills (talent management)
It was noted that it is important to hire people with BDA
experience and for the focus of their role to be solely on BDA
More than 2/3 already had a strong analytics team while the
other 1/3 is searching for better human resources
40% also wrote about how company culture played a role in
their BDA usage
3 of 9 truly felt that their company culture helped support BDA
usage in their supply chain
2 of 9 don’t have a strong positive or negative connotation
4 of 9 felt culture was hindering their BDA usage and found it
particularly difficult trying to work together with other
departments
24 of the 27 respondents using BDA answered this question.
This was the last question of the survey and may not have been
worded very clearly because 6 of the 24 who answered did not
directly mention leadership, talent management, or company
culture in their response.
Limitations of the Results, Future Work Planned, Lessons
Learned
Future Work Planned:
More research specifically on how talent management,
leadership, and company culture affect BDA use in SCM in the
medical industry
Lessons Learned:
Don’t rely on one person or company to distribute a survey –
take responsibility yourself
More respondents were using BDA than initial assumption (this
is good in the author’s humble opinion)
Many respondents had barriers that they had solved, but there
were also others that hadn’t solved theirs yet – it was nice to
see that they were still persevering and not just giving up
Limitations of Results:
Results are specific to the 32 respondents
While there were a variety of regions and industries presented
the small sample size makes it hard to say that the results would
be consistent with a larger group
Thank you!
References and appendices are provided in the paper with the
same title as this presentation
RUNNING HEAD: COMPUTER WORMS MALWARE IN
CYBER SECURITY
COMPUTER WORMS MALWARE IN CYBER SECURITY
COMPUTER WORMS MALWARE IN CYBER SECURITY
PRAVEEN RANGHAVAJHALA
201696
HARRISBURG UNIVERSITY
Table of Contents
Abstract………………………………………………………………
…………………………………………………………………………
….3
Introduction…………………………………………………………
…………………………………………………………………………
…3
Relationship to
CPT.……………………………………………………………………
…………………………………………………….7
Problem statement and
justification…………………………………………………………
………………………………………9
Research , Scope, Aims And
Objectives….…………………………………………………………
…………………………… 12
Research Questions and
Hypothesis……………………………………………………………
………………………………….13
Literature
Review………………………………………………………………
……………………………………………………………14
Computer worms Malware and
characteristics……………..…………………………………….……
…………………….14
The way worms are affecting networking system and the
likelihood of its impact on the
network:………………………………………………………………
………………………16
Previous strategies used to mitigate cyber security issues
generated though computer
worms…………………………………………………………………
……………………...17
The loopholes of the existing process used to deal with cyber
security issues………………18
Strategic recommendations to resolve the security issues
generated by computer worms…..19
Proposed
Solution
s and
Methodologies:……………………………………………………..2
1
Proposed Research
Design:………………………………………………………………
…..24
Proposed Data Collection and Analysis
Process:…………………………………………….24
Results and
Analysis:………………………………………………………………
………...25
Proposed Work Plan for
Research:…………………………………………………………..27
Conclusion……………………………………………………………
…………………………………………………………………………
29
References……………………………………………………………
………………………………………………………………………...
30
Table of Figures
Figure 1: MALWARE DISTRIBUTION4
Figure 2: COMPUTER WORMS7
Figure 3: MALWARE SPECIMEN12
Figure 4: MALWARE15
Key words :
· Anti-virus and anti-spyware
· Firewall, in order to resist unapproved admission to the system
· Intrusion prevention systems (IPS), in order to recognise quick
affectingrisks, for example, zero-hour attacks
· Virtual Private Networks (VPNs), in order to offer secured
remote admittance
Abstract:
The present research deals with the various computer worms
and malware attacks which occur as a result of the cyber
security breach. The research aims to identify the characteristics
of the various computer worm s and malware. It will also help
to assess the effects of the malware on the computers and the
networking systems. Here, secondary data collection method has
been utilized for the current research. Exploratory approach and
deductive research design have been taken up by the researcher.
Finally, the researcher has recommended certain ways to
prevent and mitigate the attacks as the impacts of malware
attacks are disastrous.Introduction:
The techniques of protecting computers, networks, programs
and data from illegal access or attacks are combined together to
form cyber security. These attacks are simply aimed for
corruption. The usability, dependability, veracity and security
of the network are protected by cyber security. Huge number of
threats are targeted and blocked from infecting the network by
cyber security. Its components include:
· Anti-virus and anti-spyware
· Firewall, in order to resist unapproved admission to the system
· Intrusion prevention systems (IPS), in order to recognise quick
affecting risks, for example, zero-hour attacks
· Virtual Private Networks (VPNs), in order to offer secured
remote admittance
Protection of personal and professional information from cyber
threats is an urgent necessity today and hence cyber security
comes to the rescue. People think that the systems are safe
whereas they actually are not (Horowitz & Lucero, 2017). If the
proper and appropriate safeguards are not in place, every system
will become a victim of cybercrime, sooner or later. Cyber
security is incredibly important as -
The world today is taken over by Smartphone’s. It has become a
necessity. People spend a major part of their day looking into
the Smartphone’s. These are extremely vulnerable to loss or
theft. People generally are of the opinion that cyber security
deals with online hacking, whereas a lost or stolen phone is
easier to hack as it already contains many information in it. A
huge number of devices are synced to the internet and enormous
quantity of data is shared. All these constitute the Internet of
Things (IoT). Hence, hackers can very conveniently hack or
manipulate any piece of information from this huge pool of
data.
Figure 1: MALWARE DISTRIBUTION
People generally give out a lot of information online, either
personal or professional and it is a very common phenomenon.
This should actually be extremely alarming considering the
frequency of cyber-attacks (Kak, 2018). The attackers are
taking advantage of the fact that most of the people do not
practice safe online care of the data.
Malicious software or malware, as it is called is generally a file
or code, which is delivered via a network. It infects, explores,
steals or manipulates any activity as per the hacker’s choice.
Malware usually has one or more of the following objectives,
though diverse is type and abilities:
· In order to use an infected machine, the remote control for an
attacker is provided.
· From the infected machine, spam messages, mails, links, etc.
are sent to the unsuspecting targets.
· The infected user’s local network is explored.
· Sensitive information is stolen.
Malwares can be or many types, namely, Viruses, spyware,
Trojans, rootkits, worms, polymorphic malware, botnets,
Remote Administration Tools (RATs), etc. Previously, the
malware programs that were designed used to replicate games or
send mysterious messages to various users. In 1971, the Creeper
Virus was generated. Short messages, daring the user to capture
the creeper, were displayed when initially a system was infected
by the said virus (Yılmaz&Gönen, 2018). The Creeper did not
cause damage as it was a trial. It paved the way for future
attacks it could quickly spread through the various systems. In
1988, the Morris worm or Internet worm was distributed via the
Internet. It was the one of the first computer worms that pulled
in a lot of media consideration.
The various symptoms of the computer worms must be made
extremely familiar to the users. This will help to recognize the
infections quickly and take necessary steps. Some of the evident
indications are:
· Slowing down of the computer performance
· System crashing
· Automatic opening and running of various programs
· Abnormality in the performance of the web browser
· Any unusual behaviour of the system, including messages,
images, sounds, etc.
· Warming from Firewall
· Files may go missing or modified
· Unusual desktop icons or files appear
· Error messages from the system or operation system faults
· Without the user’s knowledge, emails are sent to contacts
The user should keep a track of these symptoms. There may be
some genuine issues which might lead to anyone of the above
mentioned symptoms but if many of these symptoms appear then
definitely the system has been affected by a worm. A
computer’s operating system and applications should always be
updated with the latest versions, because the software
susceptibilities are the foremost infection vectors for the
various computer worms (Farral, 2017). The updates should be
installed as soon as they are released.
The updates contain patches for the security faults and hence
are very important. Various types of malwares and worms can
be spread by the phishing attacks also. Unwanted mails from
unknown senders, which too containing doubtful links and
attachments, should always be avoided. A very strong internet
security software solution should be installed to block such
intimidations. Anti-phishing technology together with defences
against various malwares and other online threats should be
present in the security solution.
Artificial Intelligence (AI) and machine learning are still new
and has been explored fully in the field of cyber security yet.
This brand new technology has been developed as a totally self-
governing and autonomous system. It can be deployed as a
coating over the manual attempts at cyber security. This
boundless as well as nonlinear technology is way smarter and
faster than any human or computer(Gregory, 2016). It
additionally becomes more commanding on more training and
usage. It can proactively classify and alleviate a threat even
before a patch is developed, without being reactive. It can also
be functional and certified. The partnership between man and
machine is the future of cyber security. Both have to rely on
each other for fighting and mitigating cyber threats.
Figure 2: COMPUTER WORMSRelationship with CPT:
I have worked with the global IT firm, Cisco Systems Inc., for
completing my CPT assignment. 170 W Tasman Dr, San Jose,
CA 95134, Cisco Systems Inc., was established in 1984. The
said company deals with various computer malwares and worms
and helps to develop cyber-security techniques in order to
mitigate these threats.
What Cisco Systems does?
Cisco provides a technology which enables endpoint cyber-
security. It delivers solutions to deploy, monitor and safeguard
users’ applications as well as systems. It also provides safety
assurance, compliance, intelligence and training services.
Helping users to reach their cyber-security goal through various
consultations and services is its main aim.
Highlights of the Proposed Research
The research will focus mainly on malware and worm attack as
a result of cyber-security breach. The research will further
explain the causes and effects of the security breaches. It will
also provide recommendations as to how to deal with the
security and virus attack issues. So, as computer and computer
network security is prime focus in today’s world where data
loss and theft is on full swing, this research will definitely be
helpful in finding out the reasons and some solutions of the said
problem.
Overview of the CPT Assignment
I have worked as a trainee in Cisco. I have focussed on
observing and learning the various malware mitigation
techniques as well as their following deployment and support.
Thus, providing the much needed solutions and services to the
clients within a stipulated time without bothering the client
much has been the highlights of my training. I have been asked
to document my studies and observations in a proper format and
have also presented a report after the completion of the training.
As a trainee from the technical background, it was necessary for
me to learn how to detect the malware that has affected any
system, diagnose the perfect technological solution for it and
deploy the solution so that it starts working. The end-user
satisfaction has been of immense importance. I have developed
myself regarding the work procedures, implementation and
improvement of the solutions during my training period.
Relationship between the CPT Assignment and the Proposed
Project
My field of training and the selected research topic is closely
related. I will come across various other research papers, online
articles and journals in the entire duration of this research work.
This will help to gain more knowledge regarding my subject of
work and this it will help me to fare well in my assignments.
Completing this research work will also enhance my reporting
and research skills. All these learning together will help me to
enrich my knowledge and experience.Problems Statement and
Justification:
Any company can undergo a huge loss on being subjected to a
successful cyber-attack. Economic, reputational as well as legal
issues can be the effects of security breach.
Economic damage:
Extensive financial loss can occur because of cyber-attacks,
such as:
· Corporate and financial information stealing
· Money theft
· Trade disruption
· Business or contract loss
Reputational damage:
The main element of customer relation is faith and cyber-attacks
can destroy that by damaging the reputation of the business this
could potentially lead to loss of customers and sales as well as
reduced profits.
Legal damage:
The security of all personal and sensitive data is made
mandatory by the data protection and privacy laws. On
deliberate negotiation of the data and security measures’
deployment failure, the owner may have to pay fines as well as
give up supervisory authorizations. Some level of data
protection prioritization is required in order to mitigate the
security breaches. Important assets should be protected before
the unimportant ones(Ismail et al., 2015). Keeping records of
actions to take up during the breach is vital and in this case,
checklists can be helpful. Software updates should be installed
as they contain patches.
Every user should be made aware of the various types of attacks
and breaches and should be trained in handling those. Dry runs
should definitely be conducted. Data security vendors should
also be kept handy. The damage caused by a malware can be
different. Malwares and worms can cause insignificant increase
in outgoing traffic as well as complete network breakdown or
even sensitive data loss (Kapse& Gupta, 2015). The target of
the malware decides the measure of the damage.
Operability of computers and networks:
Deletion of critical system essentials, restriction of the OS as
well as overloading of the network with a DDoS attack can be
caused by a virus or Trojan attack. Often a bug in the code of
the virus or the operation’s principle can cause severe issues.
Hardware failure:
As modern computers are relatively secured from software
errors, hardware failures are rare. The CD/DVD tray can be
opened or closed by Trojan. The computers that run
continuously may experience drive failures due to these.
Data loss or theft:
The value of the lost information can be used to gauge the
intensity of the damage caused by a successful attack. Many
important and sensitive data, including presentations,
calculations, videos, pictures, etc. or any type of coveted
interaction can be lost or erased as a result of worm
attacks(Ansari, 2016). Taking regular backups is considered to
be one of the most ignored ways to avert data loss or theft.
A worm inside a network of many systems is a major issue
because on the one hand, it will damage every system and
because huge loss, similarly, on the other hand, it will consume
a lot of time in order to disinfect the systems (Kamal et al,
2016). The downtime of the systems will be considerably long.
Even though, a Trojan is not a huge threat to the system, its
presence in the system is not desired.
The basic steps to protect users from most of the computer
worms are –
· In order to run the functions as a limited user, a system’s user
accounts should be set. It should not be able to install software
automatically.
· In order to limit illegal network movement, all network
firewalls should be turned on.
· Installation of robust anti-virus software is necessary so that
automatic updating and scanning keeps continuing.
Figure 3: MALWARE SPECIMENResearch Scope, Aims and
Objectives:
Scope of the study:
In the recent era, computer worms have significantly drawn
attention to the research people, as it leaves undesirable
influence on the internet and local networking system. Past
scholars tried to assess the likelihood of adverse impact of
computer worms, by analyzing different classification. On the
other hand, the timeline of varied computer worms have been
assessed to know the degree of impact and future threats of
computer worms to a networking system and global internet
users.
Considering the fact, the study prioritises analyzing typical
worm behaviour in the networks and its life cycle, so that new
strategic path can be implemented to resist these devastating
activities. The scope for the current study is also limited as, it
can only address the issues for a specific range of network
system, which is actually feasible. Classification of computer
worms would be based on behaviour and scanning mode.
Analysing the classification the researcher would be able to
identify the evolution pattern of the computer worms and the
types of damage caused by the attack to the global networks.
Thus, strategies can be implemented to cut those attacks and
mathematical modelling can also help to determine the projected
future attacks that might happen against another set of evolution
of computer worms. To some extent, these predictions would be
helpful saving network attacking activities in both ways
theoretically and practically.
Aim:
The primary aim of the current paper is to assess how computer
malware worms affecting the cyber security. The secondary aim
is to evaluate the inadequacy of current security measures and
provide recommendations to resolve cyber crimes generated by
computer worms.
Objectives:
· To identify the characteristics of computer worm malwares
· To assess how the worms are affecting networking system and
its impact
· To evaluate existing strategies used to mitigate cyber security
issues generated though computer worms
· To estimate the loopholes of the existing process used to deal
with cyber security issues
· To recommend approaches that could be effective enough to
resolve the security issues generated by computer
wormsResearch Questions and Hypotheses:
Questions:
· What are the typical characteristics of computer worm
malwares?
· How the worms are evolving and affecting networking system?
· What is the risk likelihood of computer worm attack?
· Which existing strategies used to mitigate cyber security
issues generated though computer worms?
· How much loopholes are found in the existing threat
mitigation process against cyber security issues?
· Which strategic recommendations could be effective to resolve
the security issues generated by computer worms?
Hypothesis:
First set:
H0: Typical computer worms affects and damage global network
security
H1: Typical computer worms do not affect and damage global
network security
Second set:
H0: Mathematical modelling and its projection towards the
evolution of computer worms can safeguard the cyber security
attack
H1: Evolving replica of computer worms would be more
powerful which cannot be destroyed by the implementation of
recommendations drawn from mathematical modelling to a
significant extentLiterature Review:Computer worm malwares
and its characteristics:
A computer worm is kind of malwares which are standalone in
nature and these programs can reproduce or create duplicates to
spread to other computers or operating systems. It generally
uses the network to spread through the other computers. It
creates problem to security measures and make them fail on the
targeted systems or computers to access it (Sharma & Sahay,
2017).
Malwares are generally the malicious software which gets in to
the system through various viruses via the network and spread
through the computers and operating systems. There are
different kinds of Malwares like adware, worms, Trojan,
backdoor etc.
Figure 4: MALWARE
(Source: Singh, 2017, 870)
Adware
It is meant to steal the user information, its added capability
helps it to activate the spyware running with it, and they are
dangerous in nature and harm the system completely
(Velliangiri & Premalatha, 2017).
Bot
Bots are used for malicious purposes to steal user activity and
information. Spam bots are sent to user systems or computers
through third party vendors.
Bugs:
Those are generally used by the compilers on source codes of
the program.
Ransom ware
It is the most harmful malwares which are generally used for
harming the user operating system and can also ask for forceful
ransom payment.
Spyware
As the name says it used to spy on the user system and
programs and activities and try to steal them.The way worms
are affecting networking system and the likelihood of its impact
on the network:
As there are many kinds of computer worms or network worms
like it can be email worm, bot worm, hybrid worms, and Virus
worms etc. Computer or Network worms affect the network
security and even system securities in various ways as below:
· They affect the network and systems depending on its codes.
Generally, they make copies and spread highly through other
computers or systems without any bodies knowledge.
· They can also send malicious emails to any address book those
are stored on user system.
· This kind of malwares are very malicious and it can access the
computer so easily and go on to the system files, which help it
to spread the
· It creates bypass and able to dominate the firewall of the user
system helping to affect the hard disk files of the operating
system.
Impact of Computer Worms or malwares on Network Security
There are various worms or harmful malwares which generally
used to corrupt the data from the user system, disable the
computers network security. Worms are less harmful but can
create problem for small business giving risk for their user data
and the computer networks. It hampers the performance of the
user system while doing important tasks and infects the
computer thoroughly.
Hamper capacity: Velliangiri & Premalatha (2017) stated that in
a computer any program, software, resources etc consumes hard
drive storage. While there a threat of worms or malwares it used
to create duplicate spaces and consumes the capacity of the
system unnecessarily without the knowledge of the user.
Time: When the computer or system gets infected by the worms
it takes much longer time to perform as the worm used to create
duplicate files and slow down the processor speed.
Computer Security: After the worm or malware get installed it
can perform numerous actions without user’s knowledge and
steal computer data which can be an issue of breach of security.
Hackers can get the financial data and give the user monetary
loses.
People can face a lot of issues if those worms infect their
system like instability of data, cope of undesirable of contents,
data harvesting etc. To get rid of those problems every user
should install strong firewalls, should use genuine version of
operating system and use a strong antivirus to protect their
system data and life.Previous strategies used to mitigate cyber
security issues generated though computer worms
Computer network which is affected by the malicious worm not
only suffer from disruption of service but also become weak to
any kind of cyber-attack in the form of viruses or malicious
worms which duplicates its structure and affect each and every
part of computer to generate the loss of data and mainly
attacking the operating system. Now days the technology had
upgraded to Internet of things or clouds computing but prior to
that to stop the malicious work affecting the whole network
system of computer different strategies were undertaken to fight
against these malicious worm.
· The operating system must be updated with new version in
timely manner and install all the new version of patches which
has the ability to fight with new cyber-attacks of malicious
worms.
· The previous and existing strategies is the use of the firewall
which is an authenticate method to protect the computer
network from worm attack and also the software running in the
computer reducing the risk (Gregory, 2016).
· Many work threat or worms comes in encrypted method, so
there are codes which are used to run in computer to decrypt the
code and delete it before it could do a great harm to the
computer and the system method running in the computer.
· Another new and previous strategy were to remove that
computer which is running in a group of computer network
system and hence the affected computer could be replaced with
the new one to avoid the risk of vulnerabilities to the computer.
· The other main strategy is to be careful to any links or email
or any messaging app, which could contain the worms and on
clicking it may affect the computer, should be readily
avoided.The loopholes of the existing process used to deal with
cyber security issues
Cyber security is a serious issue which is faced by every
organization. Attacking and attempting to hack databases or
malware attacks on computer systems have become frequent
cases. As per Gregory (2016) with the huge advancement of
technology as everyone is getting benefits and also advancing
the business utilizing these technologies, attackers with
malicious intents are also the same to increase the degree of the
attacks. Therefore, the attackers can find new methods using the
technologies to get past the present security system
implemented in the cyber security. In many cases it has been
seen that the attackers have invented new way to affect the
computer systems which cannot be countered by the existed
security system (Farral, 2017).
The most critical fact about safety is to maintain and monitor
the security system and to check if the security system patch is
up to date with advancements of new technologies. Ansari
(2016) said that with the up gradations of software the security
associated with it always need to be rechecked and to need to be
upgrade, so that it can match up to the software with proper
safety. As this is much more expensive process than
implementation of the security systems many organizations
decides to ignore it.
Therefore, the safety system loses its effectiveness and
gradually becomes an easy target for the attackers. When an
advanced, upgraded operational technology is implemented into
the cloud or connected with the internet, a proper threat
assessment is required (Yılmaz & Gönen, 2018). Attackers are
generating more malicious software or malware which cannot be
identified by the present security measurements. Also new
advance techniques are being adopted using the technologies to
breach any computer systems of any organization. Without
proper security systems the organization are completely
vulnerable against these attacks.Strategic recommendations to
resolve the security issues generated by computer worms
Computer Worms malware infection is a method to attack the
computer systems to make it unbearably slow for operation or
hijacking the system. To protect the sensitive and important
data from these undesired attacks proper strategies is need to be
adopted by the organization. Some of the strategies that can be
considered are:
Anti-worm Software:
To prevent this malicious attack, it is recommended that the
computer system is contained with effective anti-worm software
which can identify the threat and can notify to the
administration or management. This software can scan any data
received by outside source to check any possible threat and can
notify the users to avoid it from opening or take
countermeasures to remove it.
Spam Filters:
The spam filters have the ability to block and confinement any
email or messages containing any suspicious content and send
from any unknown sender and alerts the user to avoid it. Many
large and small organizations along with many personal email
provider currently have implemented the spam filter.
Security Scans:
It is important to avoid any malicious and suspicious content
and also need to avoid any software which can spread worm in
the computer system. That is why computer systems should be
contain with effective software which can scan the software that
would be installed or have been installed in the computer
system to check if it is infected with the worm.
Regular Updates:
The networks, devices and computer systems are need to be
updated regularly. The updated security patches provided by the
software vendor are needed to be purchased and installed to
handle the latest threats.
Firewalls:
Firewalls are considered to be the finest defence line up in the
computer system. This technology can block anything
suspicious to be accessed and installed in the computer network.
Proposed

More Related Content

Similar to 1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx

A framework for modelling trojans and computer virus infection
A framework for modelling trojans and computer virus infectionA framework for modelling trojans and computer virus infection
A framework for modelling trojans and computer virus infection
UltraUploader
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
IJECEIAES
 
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Darshan Gorasiya
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET Journal
 
Eh34803812
Eh34803812Eh34803812
Eh34803812
IJERA Editor
 
H0434651
H0434651H0434651
H0434651
IOSR Journals
 
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
IOSR Journals
 
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIESCOMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
IJNSA Journal
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
Heidi Maestas
 
E04 05 2841
E04 05 2841E04 05 2841
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
CSCJournals
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
IJNSA Journal
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
UltraUploader
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
IRJET Journal
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
Research Publish Journals (Publisher)
 
Running head Project Plan .docx
Running head Project Plan                                        .docxRunning head Project Plan                                        .docx
Running head Project Plan .docx
toltonkendal
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
croysierkathey
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
IJECEIAES
 
Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networks
Pvrtechnologies Nellore
 

Similar to 1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx (20)

A framework for modelling trojans and computer virus infection
A framework for modelling trojans and computer virus infectionA framework for modelling trojans and computer virus infection
A framework for modelling trojans and computer virus infection
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
 
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
 
Eh34803812
Eh34803812Eh34803812
Eh34803812
 
H0434651
H0434651H0434651
H0434651
 
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
 
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIESCOMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
 
Running head Project Plan .docx
Running head Project Plan                                        .docxRunning head Project Plan                                        .docx
Running head Project Plan .docx
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
 
Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networks
 

More from drennanmicah

Case Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docxCase Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docx
drennanmicah
 
Case Study Rubric  Directly respond to each questi.docx
Case Study Rubric   Directly respond to each questi.docxCase Study Rubric   Directly respond to each questi.docx
Case Study Rubric  Directly respond to each questi.docx
drennanmicah
 
Case Study Scenario Part 3IntroductionThis media piece exp.docx
Case Study Scenario Part 3IntroductionThis media piece exp.docxCase Study Scenario Part 3IntroductionThis media piece exp.docx
Case Study Scenario Part 3IntroductionThis media piece exp.docx
drennanmicah
 
Case Study RubricYour case study will be assessed as follows•.docx
Case Study RubricYour case study will be assessed as follows•.docxCase Study RubricYour case study will be assessed as follows•.docx
Case Study RubricYour case study will be assessed as follows•.docx
drennanmicah
 
Case study RubricCriterionOutstanding 3.75Very Good 3 .docx
Case study RubricCriterionOutstanding  3.75Very Good  3 .docxCase study RubricCriterionOutstanding  3.75Very Good  3 .docx
Case study RubricCriterionOutstanding 3.75Very Good 3 .docx
drennanmicah
 
CASE STUDY RUBRIC MICROBIOLOGY For the Case Study assig.docx
CASE STUDY RUBRIC MICROBIOLOGY  For the Case Study assig.docxCASE STUDY RUBRIC MICROBIOLOGY  For the Case Study assig.docx
CASE STUDY RUBRIC MICROBIOLOGY For the Case Study assig.docx
drennanmicah
 
Case Study Rubric .docx
Case Study Rubric                                                 .docxCase Study Rubric                                                 .docx
Case Study Rubric .docx
drennanmicah
 
Case Study ReflectionWrite a 4-5 page paper. Your written assi.docx
Case Study ReflectionWrite a 4-5 page paper. Your written assi.docxCase Study ReflectionWrite a 4-5 page paper. Your written assi.docx
Case Study ReflectionWrite a 4-5 page paper. Your written assi.docx
drennanmicah
 
Case Study Questions (Each question is worth 6 marks)1. Defi.docx
Case Study Questions (Each question is worth 6 marks)1. Defi.docxCase Study Questions (Each question is worth 6 marks)1. Defi.docx
Case Study Questions (Each question is worth 6 marks)1. Defi.docx
drennanmicah
 
Case Study Reorganizing Human Resources at ASP SoftwareRead the.docx
Case Study Reorganizing Human Resources at ASP SoftwareRead the.docxCase Study Reorganizing Human Resources at ASP SoftwareRead the.docx
Case Study Reorganizing Human Resources at ASP SoftwareRead the.docx
drennanmicah
 
Case Study Report Rubric CriterionWeakAverageStrongIdent.docx
Case Study Report Rubric CriterionWeakAverageStrongIdent.docxCase Study Report Rubric CriterionWeakAverageStrongIdent.docx
Case Study Report Rubric CriterionWeakAverageStrongIdent.docx
drennanmicah
 
Case Study Project (A) Hefty Hardware - Be sure to address each .docx
Case Study Project (A) Hefty Hardware - Be sure to address each .docxCase Study Project (A) Hefty Hardware - Be sure to address each .docx
Case Study Project (A) Hefty Hardware - Be sure to address each .docx
drennanmicah
 
Case Study Proposing a Data Gathering Approach at TLG Solutions (.docx
Case Study Proposing a Data Gathering Approach at TLG Solutions (.docxCase Study Proposing a Data Gathering Approach at TLG Solutions (.docx
Case Study Proposing a Data Gathering Approach at TLG Solutions (.docx
drennanmicah
 
Case Study Project Part I Declared JurisdictionTemplate Sta.docx
Case Study Project Part I   Declared JurisdictionTemplate Sta.docxCase Study Project Part I   Declared JurisdictionTemplate Sta.docx
Case Study Project Part I Declared JurisdictionTemplate Sta.docx
drennanmicah
 
Case Study Proposing a Data Gathering Approach at TLG Solutions.docx
Case Study Proposing a Data Gathering Approach at TLG Solutions.docxCase Study Proposing a Data Gathering Approach at TLG Solutions.docx
Case Study Proposing a Data Gathering Approach at TLG Solutions.docx
drennanmicah
 
Case Study Peer Comments In each case study, you are expected.docx
Case Study Peer Comments In each case study, you are expected.docxCase Study Peer Comments In each case study, you are expected.docx
Case Study Peer Comments In each case study, you are expected.docx
drennanmicah
 
Case Study ProblemLeadership appears as a popular agenda it.docx
Case Study ProblemLeadership appears as a popular agenda it.docxCase Study ProblemLeadership appears as a popular agenda it.docx
Case Study ProblemLeadership appears as a popular agenda it.docx
drennanmicah
 
Case Study Planning for GrowthKelly’s Sandwich Stop is one of t.docx
Case Study Planning for GrowthKelly’s Sandwich Stop is one of t.docxCase Study Planning for GrowthKelly’s Sandwich Stop is one of t.docx
Case Study Planning for GrowthKelly’s Sandwich Stop is one of t.docx
drennanmicah
 
Case Study People v. Smith, 470 NW2d 70, Michigan Supreme Court (19.docx
Case Study People v. Smith, 470 NW2d 70, Michigan Supreme Court (19.docxCase Study People v. Smith, 470 NW2d 70, Michigan Supreme Court (19.docx
Case Study People v. Smith, 470 NW2d 70, Michigan Supreme Court (19.docx
drennanmicah
 
Case Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docx
Case Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docxCase Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docx
Case Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docx
drennanmicah
 

More from drennanmicah (20)

Case Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docxCase Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docx
 
Case Study Rubric  Directly respond to each questi.docx
Case Study Rubric   Directly respond to each questi.docxCase Study Rubric   Directly respond to each questi.docx
Case Study Rubric  Directly respond to each questi.docx
 
Case Study Scenario Part 3IntroductionThis media piece exp.docx
Case Study Scenario Part 3IntroductionThis media piece exp.docxCase Study Scenario Part 3IntroductionThis media piece exp.docx
Case Study Scenario Part 3IntroductionThis media piece exp.docx
 
Case Study RubricYour case study will be assessed as follows•.docx
Case Study RubricYour case study will be assessed as follows•.docxCase Study RubricYour case study will be assessed as follows•.docx
Case Study RubricYour case study will be assessed as follows•.docx
 
Case study RubricCriterionOutstanding 3.75Very Good 3 .docx
Case study RubricCriterionOutstanding  3.75Very Good  3 .docxCase study RubricCriterionOutstanding  3.75Very Good  3 .docx
Case study RubricCriterionOutstanding 3.75Very Good 3 .docx
 
CASE STUDY RUBRIC MICROBIOLOGY For the Case Study assig.docx
CASE STUDY RUBRIC MICROBIOLOGY  For the Case Study assig.docxCASE STUDY RUBRIC MICROBIOLOGY  For the Case Study assig.docx
CASE STUDY RUBRIC MICROBIOLOGY For the Case Study assig.docx
 
Case Study Rubric .docx
Case Study Rubric                                                 .docxCase Study Rubric                                                 .docx
Case Study Rubric .docx
 
Case Study ReflectionWrite a 4-5 page paper. Your written assi.docx
Case Study ReflectionWrite a 4-5 page paper. Your written assi.docxCase Study ReflectionWrite a 4-5 page paper. Your written assi.docx
Case Study ReflectionWrite a 4-5 page paper. Your written assi.docx
 
Case Study Questions (Each question is worth 6 marks)1. Defi.docx
Case Study Questions (Each question is worth 6 marks)1. Defi.docxCase Study Questions (Each question is worth 6 marks)1. Defi.docx
Case Study Questions (Each question is worth 6 marks)1. Defi.docx
 
Case Study Reorganizing Human Resources at ASP SoftwareRead the.docx
Case Study Reorganizing Human Resources at ASP SoftwareRead the.docxCase Study Reorganizing Human Resources at ASP SoftwareRead the.docx
Case Study Reorganizing Human Resources at ASP SoftwareRead the.docx
 
Case Study Report Rubric CriterionWeakAverageStrongIdent.docx
Case Study Report Rubric CriterionWeakAverageStrongIdent.docxCase Study Report Rubric CriterionWeakAverageStrongIdent.docx
Case Study Report Rubric CriterionWeakAverageStrongIdent.docx
 
Case Study Project (A) Hefty Hardware - Be sure to address each .docx
Case Study Project (A) Hefty Hardware - Be sure to address each .docxCase Study Project (A) Hefty Hardware - Be sure to address each .docx
Case Study Project (A) Hefty Hardware - Be sure to address each .docx
 
Case Study Proposing a Data Gathering Approach at TLG Solutions (.docx
Case Study Proposing a Data Gathering Approach at TLG Solutions (.docxCase Study Proposing a Data Gathering Approach at TLG Solutions (.docx
Case Study Proposing a Data Gathering Approach at TLG Solutions (.docx
 
Case Study Project Part I Declared JurisdictionTemplate Sta.docx
Case Study Project Part I   Declared JurisdictionTemplate Sta.docxCase Study Project Part I   Declared JurisdictionTemplate Sta.docx
Case Study Project Part I Declared JurisdictionTemplate Sta.docx
 
Case Study Proposing a Data Gathering Approach at TLG Solutions.docx
Case Study Proposing a Data Gathering Approach at TLG Solutions.docxCase Study Proposing a Data Gathering Approach at TLG Solutions.docx
Case Study Proposing a Data Gathering Approach at TLG Solutions.docx
 
Case Study Peer Comments In each case study, you are expected.docx
Case Study Peer Comments In each case study, you are expected.docxCase Study Peer Comments In each case study, you are expected.docx
Case Study Peer Comments In each case study, you are expected.docx
 
Case Study ProblemLeadership appears as a popular agenda it.docx
Case Study ProblemLeadership appears as a popular agenda it.docxCase Study ProblemLeadership appears as a popular agenda it.docx
Case Study ProblemLeadership appears as a popular agenda it.docx
 
Case Study Planning for GrowthKelly’s Sandwich Stop is one of t.docx
Case Study Planning for GrowthKelly’s Sandwich Stop is one of t.docxCase Study Planning for GrowthKelly’s Sandwich Stop is one of t.docx
Case Study Planning for GrowthKelly’s Sandwich Stop is one of t.docx
 
Case Study People v. Smith, 470 NW2d 70, Michigan Supreme Court (19.docx
Case Study People v. Smith, 470 NW2d 70, Michigan Supreme Court (19.docxCase Study People v. Smith, 470 NW2d 70, Michigan Supreme Court (19.docx
Case Study People v. Smith, 470 NW2d 70, Michigan Supreme Court (19.docx
 
Case Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docx
Case Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docxCase Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docx
Case Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docx
 

Recently uploaded

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 

Recently uploaded (20)

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 

1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx

  • 1. 1 Running Head: COMPUTER WORMS MALWARE IN CYBER SECURITY 14 COMPUTER WORMS MALWARE IN CYBER SECURITY COMPUTER WORMS MALWARE IN CYBER SECURITY Praveen Ranghavajhala 201696 Abstract Generally, there are numerous current research which deals with
  • 2. diverse types of computer worms in both the computing as well as the technological world. This respective report will therefore analyze the current research done on the computer works. In addition, it will reflect on the various malware attacks which may be a subsequent of any given cyber security breach (Sari, 2018). The research conducted will essentially have an integral objective of locating the characteristics of the various computer worms as well as diverse types of computer malware that generally affects the functioning of the computing field. This prospective research conducted will additionally facilitate the impact of such malware attacks on the computers as well as the networking systems. To effectively analyze these phenomena, the research utilized secondary data collection mechanism in its various navigated data acquisition (Sari, 2018). The research significantly employed the use of exploratory approach as well as the deductive research design which was majorly utilized by the respective researchers who conducted this prospective research. It will conclusively prescribe various methods to hibernate and reduce such malware and worms attack on the computers. This will exclusively minimize the rampant effects of malware attacks on computers hence improving the computer functioning. Introduction Cyber security can be described as an inclusion of various tactics that are meant to protect computers, networks, program as well as data from any illicit access or breach hence resulting to malware attacks. Such attacks can be elaborated as an aim for the corruption. Cyber security in addition can be termed to be a protective measure towards the consumption ability, veracity as well as the respective security of the network. There are various parameters that can be put in place to protective massive threats from assessing their intended targets. Such parameters include
  • 3. using the anti-virus as well as anti-spyware. In addition, other measures can be taken such as mounting firewalls to repel or resist any unauthorized admission to the computer system. Other preventive actions that can be essentially utilized include intrusion prevention systems. These intrusion prevention systems generally identify quick affecting risks such as zero- hour attacks hence lessening occurrences of such attacks. Generally, the protection of personal as well as professional data from cyber threats is basically an urgent necessity in the world today. This is where the cyber security interrupts in for the rescue of such protection of personal information as well as professional data. People generally think hat systems are safe whereas they actually are not (Horowitz & Lucero, 2017) This therefore implies that there is essential need to safeguard every computer system. This will hence prevent such computer systems from becoming victims of cyber crime in every day in the modernized world (Hu, 2017). This literally shows the significance of cyber security in the fight against the computer malware attacks as well as the computer worms that may inject viruses into the computer systems. This may be as well sedated by the fact that individuals are generally prone to giving a lot of their personal information online. Some of them even walk a further extent to exposing their professional information online which makes their identity subjected to risks and any cyber- attacks (Hu, 2017). Ransomware attacks are a common scene in the world today. Therefore, there is need to conduct a through research on the preventive measures that will help eradicate the cyber crimes in the world today and create a better world for coming generations. In relation to that, this report will therefore cover the research conducted and the means in which the research was a successful in concluding measures to take against cyber-crimes. Generally, malware can be so numerous in the cybercrime field (Hu, 2017). They include the viruses, spyware, trojans, rootkits, worms, polymorphic malware, botnets, remote administration tools commonly described as RATs as well as other many typical
  • 4. computer malwares which will be reflected and given appropriate measures by this respective research. To effectively execute such measures on these computer malwares, there was need for the research to facilitate a literature review on the computer malware. It therefore described the research methodology that was utilized as well as data collection and data analytics. The research after the absolute examination of the results and findings facilitated a set of findings as well as recommendations to mitigating such computer worms and other malwares attacks to the computer systems (Hu, 2017). Literature Review The literature review of this respective research highlighted on the computer worm’s malware as well as the prospective characteristics of the malwares. This can be derivative form the fact that within the current era, the computer worms have essentially attracted concentration form various researchers as well as literature authors in analyzing this typical emerging complication which is rampant and wide spreading. The computer worms generally cause unwanted impact on the internet as well as local networking system (Farral, 2017). Even past scholars have effortfully attempted to assess and describe this difficulty to no avail. This explains the extent to which these computer worms may be disastrous to the modernization and networking in the modern world. The timeline of the diverse computer worms has also been extracted to help realize the extent of influence as well as future threats of computer worms. This is especially to the mentioned network system as well as global internet consumers. Generally, numerous researches as well as typical studies have formally concentrated on prioritizing the analysis of the typical
  • 5. worm behavior in the networks and their respective life cycle. This facilitates and establishment of the new techniques as well as the mechanisms to utilize in the ultimate resistance of the devastating activities. This should as well advance the literal scope of the recent study which can be concluded to be limited (Farral, 2017). This can be said from the fact that it only addresses the complications for a unique variety of network system which may be significantly be regarded as having feasibility. Various literature reviews have exposed the categorization of computer worms in accordance with the behavior paradigm as well as scanning mode of the respective computer worms. In a compatible categorization of such computer worms, any given researcher may be in a position to locate and recognize an evolution pattern of the computer worms as well as the variety types of damage which the respective computer worms causes to the prospective global networks in the world. These will apprehensively facilitate the accurate measures to take while curbing such computer attacks from the computer worms (Farral, 2017). Such computer worm identification may also significantly help in coming up with an appropriate mathematical modelling. This respective mathematical modelling may assist in determining the projected future attacks which may occur against any other possible set of evolution of computer worms. This therefore literally implies that such predictions may essentially facilitating a desirable rescue of the computer systems network attacking activities which may occur both under theoretical mechanism as well as practical mechanism. Generally, computer malware can be described to be malicious software which may enter into the computer system via numerous viruses through the network. In addition, they can also navigate through the respective computers searching of potential weak spots to attack within the software of the respective computers (Farral, 2017). They also spread out through the operating systems of the respective computer
  • 6. systems. Essentially, there are numerous types of computer malwares. They include adware, worms, trojan as well as backdoor. Adware is generally meant to steal the information of the respective computer user. It also has an ability to catalyze the spyware which also runs together with it. Adware can be regarded as very harmful in nature as they harm the computer system completely (Velliangiri & Premalatha, 2017). Bot on the other side are essentially utilized in causing malicious intentions to steal user activity as well as their respective information. The spam bots are also taken to the computer operator via other third-party vendors that may be related to the respective computer operators. Bugs are utilized by the compilers on source codes of the respective program under use (Velliangiri & Premalatha, 2017). Ransom ware malware is recognized as being amongst the most hazardous computer malware in the world. They are generally utilized with an intention of harming the operating systems of the computer operators. They are besides commonly utilized by the attackers to demand for a ransom for the restoration of the respective computer systems (Velliangiri & Premalatha, 2017). The spywares are being used by attackers to spy on the computer system of the operator as well as the programs and computer activities hence stealing from them. This literature review also highlights and explains on the manner in which such computer worms influence the networking system as well as the possibility of their influence on the respective computer networks. Computer malware and worms affect the computer systems according to the codes of those respective targeted computer systems. The bad fact about these computer worms is that they replicate themselves and spread rapidly to other computers or even systems without the perspective knowledge of the computer operators (Velliangiri & Premalatha, 2017). These computer worms have a great influence on network security as they essentially corrupt the information form the user system, disabling the computer
  • 7. network security. They therefore interfere with the performance of the user system while executing vital tasks as well as infecting the computer. Research Methodology Significantly, it is evident that the mechanism of a prosperous security features is generally adorned with the concept of the encryption that is string enough to sustain and protect the data confidentiality index. From the research conducted, it is also obvious that the two tires this mechanism of encryption in such a manner as in encrypted algorithm with the set of commands as well as the encryption key code which is generally utilized by an algorithm to secure the data set (Kama, Alani & Abdulmajed, 2016). Within the selected methodology as well as the solution facilitator of the research conducted, there were numerous mechanism that were employed towards gathering of the information to help in the conclusion of the respective research. Such mechanism parameters include public or private key encryption, defensive mechanism, offensive mechanism as well as the control server detection. Within the respective research, all the devices were capable of utilizing a public key of a station to encrypt the information. The recipient stations therefore had to decode the information while using their respective personal private key. According to Kama, Alani & Abdulmajed, (2016), no other devices can have the private key of the station. Besides, no other device can decipher the respective information. This literally implies that the information confidentiality while conducting this respective research was optimally maintained. The research also utilized disproportionate key for data privacy. These were circumstances when the research execution required sending of a digital signature to the secure the information. Cisco also utilized the DSS standard to validate peer switches amid the setup of an encoded session. The genuine information was therefore scrambled.
  • 8. The research also utilized the defensive system mechanism. These systems generally reflect on the recuperation from the malware infection as well as the two fundamental categorizations as they have been based and arranged. The offensive mechanism on the other hand was used in the research where the system chips were utilized on the occasions of launching the attack as well as the process against malware to annihilate the infection impact. The basic goal of such a mechanism was to limit the malware expediency (Kama, Alani & Abdulmajed, 2016). This could be implemented through infusing a fraudulent information like phony accreditations as well as band accounts. In addition, the research also employed the use of the control server detection. Generally, it utilized this respective parameter in unveiling the possible computer malwares which would communicate with the exposed server. Data Collection Data collection is generally a mechanism that can be utilized in gathering as well as measuring quantifiable data on the targeted factors through ways of an established pattern. Data collection besides facilitate the researcher in extracting the required answer with the relevant queries that are connected to the respective thematic aspect under research (Kennedy-Clark, 2015). This research required data collection in the ultimate explorations of the on the attacks of computer worms over the network system. The research also majorly utilized the secondary data in in gathering past research information which the researchers also believed they were useful within the respective research. The secondary information can facilitate a vast set of records which were carried out by the past scholars (Bowman, 2014). The research therefore employed the use of online journals, e books as well as case study that had previously been carried out by diverse research organizations as well as the various peer-reviewed and scholarly articles. This essentially helped in gathering of the required information that
  • 9. were relevant in this respective research. Data Analytics From the fact that information from the secondary sources were regarded as to have been examined through descriptive methods, there was an essential need to explain the exponential outcomes of these secondary source information. Such outcomes are essentially from diverse hypothesis hence need to be examined through descriptive methods (Thomas, 2015). It is from such variety set of records that the researchers were able to conclude a reasonable statement that was dependent on the weighed outcome. The weighted outcomes were determined on the repetitive behavioral, scanning as well as network attacking patterns of the computer worm malware. The analysis of the hypothesis as well as the proposition of the authors was done by the concerned researchers. It located that the computer virus is commonly a programming code that may harm all the files as well as folders that have been archived in the computer systems. This may also terminate the whole system from the network. Generally, the communication technology is one of the essential means in which the infection may be spread through. The viruses utilized the communication technology of the computer systems to spread into the public system hence becoming more disastrous (Kamalet, 2016). This gives the cyber attackers an easy opportunity to attack the computer system. They generally insert a killer program into the computer system where the target whole the cyber network for an additional take over. These viruses can be spread via VPN. Findings and Recommendations From the analysis of the research, its is evident that the utilization of numerous applications in the computer system may essentially facilitate the growth of the virus. This in addition increases the replication of these computer viruses hence making them more hazardous. In addition, the analysis of the research justify vividly that the preventive actions have to be executed prior the computer attack. Such an action may
  • 10. significantly assist in reducing the gap between the computer system as well as the computer attackers (Gregory, 2016). This will apprehensively distract the computer virus from thriving into the computer system. The analysis also manifest that preventive parameters ought to be executed by a thorough investigation of the weak spot of the security system. In addition, it will exclusively eradicate the viruses that have been enshrined in the computer system through the treatment mechanisms. This will essentially help eradicate the whole registry under suspicion into the computer system. An IDS will vitally differentiate between the malicious junctures which will communicate with an overseer hence using email, paging as well as recording of the occurrences. It can also help in executing the factual as well as peculiarity examination. This literally explains why various business organization ought to employ this Interruption Discovery Framework in their business information system while combatting various cyber threats that may be found within the information technology of the respective business organization (Gregory, 2016). As well, IDS may essentially perceive and respond to a focal catalogue which relates the information from the dissimilar gadgets thus facilitating an overseer with a universal standpoint of the incessant security of the respective network system. There are various prescribed recommendations that may be utilized in fighting against malware worms in the computer systems hence curbing cybercrimes occurrences. One of the technical tactics to utilize include implementation of the anti- worm software. This software will locate the potential threat and give a notice to the administration or even the business management. Spam filters may also be utilized (Gregory, 2016). They have the capability of blocking as well as confining any email and messages which may be suspected of containing any threat and sent from unknown persons. It notifies the user to avoid such content. Security scans also can be a preventive mechanism in which they scan any software to be installed into
  • 11. the system. Regular updates may also be utilized. This include the networks, devices as well as the computer systems which are prone to threats and attacks. Conclusion Conclusively, it is justifiable to apprehend that the main threats to cyber security as well as security network in the modern world today is the worm and malware attacks. Nevertheless, this respective research has proven that despite the presence of such type of malware attacks as well as malware worms, there are numerous preventive measures that can be implemented to safeguard network security. It has been manifested that the diverse forms of malwares may results to disastrous impact on the computer system as well as the network security. Any business organization opting to take such preventive measures should therefore have legal contracts beforehand with business organizations offering cyber security so as to avoid going through massive data loss in their information system. This will help mitigate the opportunities of cyberattacks from replicating in the world.
  • 12. References Bowman, J. (2014) ‘Data, analysis, action!’, Research World, 2014(46), pp. 22–26. http://www.scientificpapers.org/wp- content/files/1563_Cordova_Rangel- A_review_of_research_methods_in_strategic_management.pdf Farral, T. (2017). Nation-State Attacks: Practical Defenses against Advanced Adversaries. Network Security, 2017(9), 5-7. doi: 10.1016/s1353-4858(17)30111-3 Gregory, J. (2016). The Past, Present, and Future of xVA. Wilmott, 2016(82), 37-39. doi: 10.1002/wilm.10487 Horowitz, B., & Lucero, D. (2017). System-aware cyber security: a system engineering approach for enhancing cyber security. Insight, 20(3), 66-68. doi: 10.1002/inst.12165 Hu, G. (2017). Countermeasure against Distributed Denial of Service Attack. Destech Transactions on Engineering and Technology Research, (apetc). doi:10.12783/dtetr/apetc2017/10920 Kamal, M., U. S., Ali, A.J.R., Alani, K.H. &Abdulmajed, S. E. (2016). Survey and brief history on malware in network security case study: viruses, worms and bots, ARPN Journal of Engineering and Applied Sciences, 11(1), 683-698. https://www.researchgate.net/profile/Saif_Alsamer/publication/ 301695496_Survey_and_brief_history_on_malware_in_network _security_case_study_Viruses_worms_and_bots/links/57c427be 08aee5141be5b75c/Survey-and-brief-history-on-malware-in- network-security-case-study-Viruses-worms-and- bots.pdf?origin=publication_detail Kennedy-Clark, S. (2015). Reflection: Research by design: Design-based research and the higher degree research student. Journal of Learning Design, 8(3). doi: 10.5204/jld. v8i3.257 Sari, A. (2018). Countrywide virtual siege in the new era of cyberwarfare: remedies from the cyber-firewall: Seddulbahir. Journal of Cyber Security Technology, 2(1), 14- 36. doi: 10.1080/23742917.2018.1476956
  • 13. Thomas, J. A. (2015) ‘Using unstructured diaries for primary data collection’, Nurse Researcher, 22(5), pp. 25– 29.http://www.sociology.kpi.ua/wp- content/uploads/2014/06/Ranjit_Kumar- Research_Methodology_A_Step-by-Step_G.pdf Velliangiri, S., &Premalatha, J. (2017). Intrusion detection of distributed denial of service attack in cloud. Cluster Computing. doi: 10.1007/s10586-017-1149-0 Avoiding Plagiarism David Runyon, M.L.I.S., M.S. 1 HU on plagiarism: “Plagiarism” includes, but is not limited to, failure to indicate the source with quotation marks or footnotes, where appropriate, if any of the following are reproduced in the work submitted by a student: i. A phrase, written or musical ii. A graphic element iii. A proof iv. Specific language, OR…
  • 14. 2 HU on plagiarism: Plagiarism is using the ideas of others and/or words without clearly acknowledging the source of that information. -Harrisburg University 2017-2018 Undergraduate Catalog , pg. 48 3 HU on Academic Honesty Harrisburg University expects a student to act honorably and in accordance with the standards of academic integrity. Academic integrity is grounded in mutual trust and respect. Therefore, it is expected that a student will respect the rights of others and will only submit work that is their own, refraining from all forms of lying, cheating and plagiarism. Lack of academic integrity includes: Plagiarism Cheating Fabrication, alteration of documents, lying, etc. Assisting others in academic misconduct -Harrisburg University 2017-2018 Undergraduate Catalog , pp.
  • 15. 48-49 4 Consequences Sanctions for violations of Academic Code of Conduct Assignment grade of 0 Failing grade in the course at issue Warning via written notice to the student Withdrawal from course Temporary suspension from the University Expulsion Withholding of a diploma -HU Student Handbook, pp. 14-16 5 Intentional Inadvertent Turning in a paper written by another student without permission. Turning in a paper a peer has written with permission. Turning in a paper purchased from a term paper service. Turning in a paper from a “free” online term paper service. Copying from the source but failing to provide appropriate documentation. Copying from the source, providing appropriate documentation
  • 16. but failing to use quotation marks. Paraphrasing from source but failing to provide appropriate documentation. Incorrectly quoting, paraphrasing or citing. What needs to be cited? Any idea that did not originate in your own brain, from whatever source: Movies, newspapers, TV shows, websites, radio, books, music, etc. Speeches, conversations, interviews Verbatim passages from a source (with quotation marks) Paraphrases from a source Purdue University, (2007). Is it plagiarism yet? The OWL at Purdue. http://owl.english.purdue.edu/owl/resource/589/02/ 7 What does NOT need to be cited? Your own, original thoughts, opinions, experiences “Common knowledge” and generally accepted facts Purdue University. (2007). Is it plagiarism yet? The OWL at Purdue. http://owl.english.purdue.edu/owl/resource/589/02/ 8
  • 17. When in doubt, cite! 9 Always cite: Phrases you rewrite from another source Verbatim passages that you’ve put quotation marks around Ideas that come from others 10 Cite your sources by: Including in-text citations (Smith, 2000, p. 31) Including all sources in your bibliography at the end of the paper Consistently using an accepted citation format such as APA 11
  • 18. “Patch writing” is plagiarism. Patch writing = stringing together sentences from more than one source, without paraphrasing. Principle: Academic writing means using your own words! 12 Don’t rely on others’ words. Strive to keep your use of other people’s words to a minimum. Excessive use of quotations = lack of effort, lack of understanding of your subject Limit use of quoted material to 10% or less of your final product. 13 Can you plagiarize yourself? Yes! Always cite your sources, even if it’s your previous work. 14
  • 19. Practice Paraphrasing! “Can a mortal ask questions which God finds unanswerable? Quite easily, I should think. All nonsense questions are unanswerable. How many hours are there in a mile? Is yellow square or round? Probably half the questions we ask—half our great theological and metaphysical problems—are like that” (Lewis, 1961, p. 81). Lewis, C. S. (1961). A grief observed. New York, NY: The Seabury Press. Sample Paraphrase Lewis (1961) suggests that our limited understanding of reality leads us to pose questions that make no sense and, consequently, have no answer, even when asked of God (p. 81). References Lewis, C. S. (1961). A grief observed. New York, NY: The Seabury Press. References & Contact Info VandenBos, G. R. (Ed.). (2010). Publication manual of the American Psychological Association. Washington, D.C.: American Psychological Association. Facebook: Harrisburg University Library Twitter: @husatlib Library: Second floor
  • 20. Based on an original presentation by Kathleen Conley, HACC, with elements from Nancy E. Adams, Harrisburg University, and Jessica See, Harrisburg University. 18 Benefits, Barriers, and How to Overcome the Barriers of Using and Implementing Big Data Analytics throughout Supply Chain Management in the Medical Industry Adelaide Navickas Harrisburg University 12/04/2016 Presentation Agenda Introduction Research Question Research Methodology Literature Review Results Limitations of the Research, Future Work Planned, and Lessons Learned Conclusion and References Introduction Big Data Volume Velocity
  • 21. Variety Big Data Analytics Supply Chain Procurement/sourcing Logistics Operations Marketing Author’s Background Masters in Analytics Working for Medical Device company in a Customer Care role As previously mentioned Big Data has frequently been defined as data with high volume, velocity, and variety [5] [6] [7], while Wamba et al. goes on to add veracity and value as key components in the definition of Big Data [2]. BDA is the application of Business Analytics on Big Data. Business Analytics refers to statistical analysis, forecasting, predictive modeling, and optimization techniques 3 Research Question Specific Benefits Barriers How to overcome these Implementation and continued use Leadership Talent Management Company Culture Survey supply chain team members Limitations Not exhaustive
  • 22. No suggestions for how to overcome unless provided by survey respondent Research Methodology Identified the target respondents. Wrote the questions and interactive statements for the survey. Survey was reviewed by two individuals. Survey was revised based on feedback from previous step. Three people re-reviewed the survey Final changes to the survey based on feedback from previous step were made and the questions were uploaded the online survey site SoGoSurvey. Survey was sent out to potential respondents over a month long period via individual emails. Data from the survey was exported to an Excel file and analysis of the results was conducted in order to identify common trends among the answers as well as identifying anomalies. Literature Review Overview of existing Literature With the ever-increasing amount of Big Data available to and collected by companies, BDA has emerged as a key tool for businesses looking to gain a competitive advantage, new insights, and added value (full reference provided in paper) There are many BDA applications that can be applied to all parts of the supply chain. Waller and Fawcett suggest that business and supply chain leaders must understand and use BDA to support decision-making in SCM (full reference provided in paper)
  • 23. In Sanders’ article, “How to Use Big Data to Drive Your Supply Chain,” the survey used indicated that the majority of executives believe that BDA is a priority for the future, but also admitted there were concerns about the cost and the choices available that would best suit their needs (full reference provided in paper) Recent literature reviews broke down the current studies by varying categories: Type of analytics used (predictive, prescriptive, or descriptive) Types of value creation found by using BDA Varying other criteria: focus, research approach, method triangulation, data generation, range, timeline, theoretical background, and target audience Limitations of Existing Studies BDA is still gaining momentum in the world of SCM. While there are plenty of businesses that are using it, there is very little research on the benefits and barriers associated with continued use of BDA due to its newness S. F. Wamba et al. brings up the lack of research on how leadership, talent management, technology, culture, data privacy, and decision-making processes impact the use of BDA (full reference provided in paper) Goal of this presentation is to bridge the gap between formal research and industry usage by providing supply chain executives with the necessary information to understand the benefits of and overcome the barriers to implementing and continuing use of BDA in SCM Results
  • 24. General Survey Statistics Table 1 shows the breakdown of respondents’ industries within the medical field Majority of responses are from hospitals But there is a good mix of other industries as well Breakdown of time using BDA in supply chain 44% of respondents using BDA have only been using it for one to three years 19% have been using BDA for four to six years 15% for seven to nine years 7% for ten to twelve years 8% have been using it for 13 or more years Table 2 shows the majority of companies with over 1000+ employees are using BDA in their supply chain (20 of 24) Due to low response rate from smaller companies the author makes no conclusion as to whether or not there is a trend for or against BDA usage in companies of that size The majority of respondents, regardless of company size, are using BDA (27 of 32) Table 3 shows the breakdown by component. Please note there is overlap as a company could be using BDA in 1-4 of the components Marketing is the component of supply chain that uses BDA the least right now Table 1 Table 2 Table 3 It was also shown through the survey that of the four respondents using BDA in marketing, three were using BDA in all other components as well suggesting that marketing is the
  • 25. last piece of the puzzle when implementing BDA in the supply chain 8 Benefits Of the 27 respondents who use BDA in their supply chain, 26 provided answers that equated to 59 individual benefits Financial benefits were by far the most prevalent benefit (23 of 59) Optimization and maximization was the next most frequent benefit (9 of 59) Better tracking/reporting/insight (8 of 59) Other common benefits include: Identifying trends (5) Better models (4) Monitoring inventory levels (5). Reducing excess (2) Identifying fraud (2) Increasing process efficiency (1) Specific Examples In regards to optimizing human resources, one respondent specifically discussed the use of a system that tracks an employee’s work progress through time, speed and logistical status by way of an RF scanner. Not only did it help improve employee efficiency, but it also allowed that company to pick better locations for items to increase picking efficiency. “Patient demographic information has been analyzed to determine where our patients come from to assist in marketing. In addition, analyzing data that identifies if a patient was referred to our Health Care system from a smaller organization has allowed us to strategically form alliances with surrounding health care providers that serve as a feeder for patients requiring more complex care than what they can provide. As a result we have maintained steady/or increasing volumes of patients and we are often treating the more critically ill that
  • 26. bolsters our reputation as well as giving us the opportunity to increase revenues.” The benefits identified by respondents were varied but did have common themes. Of the 27 respondents who use BDA in their supply chain, 26 provided answers that equated to 59 individual benefits. Financial benefits were by far the most prevalent benefit. Such benefits were identified 23 separate times. These financial benefits included lowering the cost of devices or distribution, reducing costs through better negotiating and review of contracts, reducing labor costs through the balancing of human resources, and lowering freight bills. Optimization and maximization was the next most frequent benefit listed encompassing nine of the 59 benefits. Examples include optimizing item location within a warehouse, optimizing inventory levels as well as human resources, maximizing sales through better service levels, and increasing patient volume with targeted marketing. The third most frequent benefit was found to be better tracking/reporting/insight and was mentioned in eight of the 59 benefits. Examples include providing leadership with a big picture view of daily operations, providing information on clinical use of products which leads to standardization of product decisions, tracking compliance with contracts, and a better notification system to remind employees of what is coming next. Other common benefits include identifying trends (5), better models (4), and monitoring inventory levels (5). Trends were mentioned to be found in customer behavior, expenses, operational, and financial categories. Models mentioned were used for a centralized supply chain (for multiple hospitals) and predictive analytics. One example described using models to predict usage spikes so that they could be proactive in their
  • 27. procurement as opposed to reactive. The last few benefits included reducing excess (2), identifying fraud (2), and increasing process efficiency (1). 9 Barriers for companies not yet using BDA 5 respondents’ barriers: A current model that is more granularly focused A lack of data analysts A lack of proper systems (mentioned by three of the five respondents) Resources needed for implementation High cost involved in system add-ons No noted ways to overcome these barriers by these respondents However, similar barriers were listed by the respondents who had implemented BDA along with ways to overcome those barriers Barriers and How to Overcome Them Barriers Of the 27 respondents using BDA, 26 of them provided 52 individual barriers The largest category was data integration (11 of 52) Companies are working with data in inconsistent formats across multiple systems that may or may not initially pair successfully with each other Data Accuracy (9) and Data Validation (8) Shared between 12 respondents – 5 of which listed both barriers Data accuracy barriers included not trusting the data source (customers, physicians, nurses), knowing data was manually entered (always a chance for human error), and not trusting the system it is being pulled from to provide consistent results
  • 28. Data validation barriers included manual checks of the data to make sure results and reports were accurate, questioning the data rather than the analysis, and having to validate the source data used in the analytics Remaining barriers: Technology for data manipulation (4), technology for data storage (3), database reporting logic (3), calculation accuracy (3), data security (2) 10 other individual barriers Methods to get past them (if provided) 4 of 11 respondents who faced data integration barriers overcame them By developing a system to standardize data collection, enforcing policy and procedure, persistence, or creating an automated process making data more readily available 7 of 12 respondents who faced data validation and data accuracy barriers overcame them By revising reporting tools, educating staff who uses the data about the value of the data and its accuracy, trial and error, continued use of the data allowing for regular adjustments that provide better information, or developing a system that allowed for more data to be collected at a greater depth so that it could be cross-validated across datasets workforce resistance to their actions being tracked and measured, HIPAA (Health Insurance Portability and Accountability Act) limitations, lack of human resources, building an effective business case to show leadership the benefits of implementing BDA, pushback from suppliers on pricing benchmarks, internal stakeholder pushback, data volume, steep learning curve, end-user pushback, and the ability to drill down into the data 11
  • 29. Leadership, Talent Management, & Company Culture 50% of responses mentioned leadership A quarter of these had a lack of leadership support The remaining three-quarters noted that they had strong leadership buy-in and support which continues to help their team provide benefits to their company 40% discussed the need for strong human resources with analytical skills (talent management) It was noted that it is important to hire people with BDA experience and for the focus of their role to be solely on BDA More than 2/3 already had a strong analytics team while the other 1/3 is searching for better human resources 40% also wrote about how company culture played a role in their BDA usage 3 of 9 truly felt that their company culture helped support BDA usage in their supply chain 2 of 9 don’t have a strong positive or negative connotation 4 of 9 felt culture was hindering their BDA usage and found it particularly difficult trying to work together with other departments 24 of the 27 respondents using BDA answered this question. This was the last question of the survey and may not have been worded very clearly because 6 of the 24 who answered did not directly mention leadership, talent management, or company culture in their response. Limitations of the Results, Future Work Planned, Lessons Learned Future Work Planned: More research specifically on how talent management, leadership, and company culture affect BDA use in SCM in the medical industry Lessons Learned:
  • 30. Don’t rely on one person or company to distribute a survey – take responsibility yourself More respondents were using BDA than initial assumption (this is good in the author’s humble opinion) Many respondents had barriers that they had solved, but there were also others that hadn’t solved theirs yet – it was nice to see that they were still persevering and not just giving up Limitations of Results: Results are specific to the 32 respondents While there were a variety of regions and industries presented the small sample size makes it hard to say that the results would be consistent with a larger group Thank you! References and appendices are provided in the paper with the same title as this presentation RUNNING HEAD: COMPUTER WORMS MALWARE IN CYBER SECURITY COMPUTER WORMS MALWARE IN CYBER SECURITY COMPUTER WORMS MALWARE IN CYBER SECURITY PRAVEEN RANGHAVAJHALA 201696 HARRISBURG UNIVERSITY Table of Contents Abstract………………………………………………………………
  • 31. ………………………………………………………………………… ….3 Introduction………………………………………………………… ………………………………………………………………………… …3 Relationship to CPT.…………………………………………………………………… …………………………………………………….7 Problem statement and justification………………………………………………………… ………………………………………9 Research , Scope, Aims And Objectives….………………………………………………………… …………………………… 12 Research Questions and Hypothesis…………………………………………………………… ………………………………….13 Literature Review……………………………………………………………… ……………………………………………………………14 Computer worms Malware and characteristics……………..…………………………………….…… …………………….14 The way worms are affecting networking system and the likelihood of its impact on the network:……………………………………………………………… ………………………16 Previous strategies used to mitigate cyber security issues generated though computer worms………………………………………………………………… ……………………...17 The loopholes of the existing process used to deal with cyber security issues………………18 Strategic recommendations to resolve the security issues
  • 32. generated by computer worms…..19 Proposed Solution s and Methodologies:……………………………………………………..2 1 Proposed Research Design:……………………………………………………………… …..24 Proposed Data Collection and Analysis Process:…………………………………………….24 Results and Analysis:……………………………………………………………… ………...25 Proposed Work Plan for Research:…………………………………………………………..27 Conclusion…………………………………………………………… ………………………………………………………………………… 29 References…………………………………………………………… ………………………………………………………………………... 30
  • 33. Table of Figures Figure 1: MALWARE DISTRIBUTION4 Figure 2: COMPUTER WORMS7 Figure 3: MALWARE SPECIMEN12 Figure 4: MALWARE15 Key words : · Anti-virus and anti-spyware · Firewall, in order to resist unapproved admission to the system · Intrusion prevention systems (IPS), in order to recognise quick affectingrisks, for example, zero-hour attacks · Virtual Private Networks (VPNs), in order to offer secured remote admittance Abstract: The present research deals with the various computer worms and malware attacks which occur as a result of the cyber security breach. The research aims to identify the characteristics of the various computer worm s and malware. It will also help to assess the effects of the malware on the computers and the networking systems. Here, secondary data collection method has been utilized for the current research. Exploratory approach and deductive research design have been taken up by the researcher.
  • 34. Finally, the researcher has recommended certain ways to prevent and mitigate the attacks as the impacts of malware attacks are disastrous.Introduction: The techniques of protecting computers, networks, programs and data from illegal access or attacks are combined together to form cyber security. These attacks are simply aimed for corruption. The usability, dependability, veracity and security of the network are protected by cyber security. Huge number of threats are targeted and blocked from infecting the network by cyber security. Its components include: · Anti-virus and anti-spyware · Firewall, in order to resist unapproved admission to the system · Intrusion prevention systems (IPS), in order to recognise quick affecting risks, for example, zero-hour attacks · Virtual Private Networks (VPNs), in order to offer secured remote admittance Protection of personal and professional information from cyber threats is an urgent necessity today and hence cyber security comes to the rescue. People think that the systems are safe whereas they actually are not (Horowitz & Lucero, 2017). If the proper and appropriate safeguards are not in place, every system will become a victim of cybercrime, sooner or later. Cyber security is incredibly important as - The world today is taken over by Smartphone’s. It has become a necessity. People spend a major part of their day looking into
  • 35. the Smartphone’s. These are extremely vulnerable to loss or theft. People generally are of the opinion that cyber security deals with online hacking, whereas a lost or stolen phone is easier to hack as it already contains many information in it. A huge number of devices are synced to the internet and enormous quantity of data is shared. All these constitute the Internet of Things (IoT). Hence, hackers can very conveniently hack or manipulate any piece of information from this huge pool of data. Figure 1: MALWARE DISTRIBUTION People generally give out a lot of information online, either personal or professional and it is a very common phenomenon. This should actually be extremely alarming considering the frequency of cyber-attacks (Kak, 2018). The attackers are taking advantage of the fact that most of the people do not practice safe online care of the data. Malicious software or malware, as it is called is generally a file or code, which is delivered via a network. It infects, explores, steals or manipulates any activity as per the hacker’s choice. Malware usually has one or more of the following objectives, though diverse is type and abilities: · In order to use an infected machine, the remote control for an attacker is provided. · From the infected machine, spam messages, mails, links, etc.
  • 36. are sent to the unsuspecting targets. · The infected user’s local network is explored. · Sensitive information is stolen. Malwares can be or many types, namely, Viruses, spyware, Trojans, rootkits, worms, polymorphic malware, botnets, Remote Administration Tools (RATs), etc. Previously, the malware programs that were designed used to replicate games or send mysterious messages to various users. In 1971, the Creeper Virus was generated. Short messages, daring the user to capture the creeper, were displayed when initially a system was infected by the said virus (Yılmaz&Gönen, 2018). The Creeper did not cause damage as it was a trial. It paved the way for future attacks it could quickly spread through the various systems. In 1988, the Morris worm or Internet worm was distributed via the Internet. It was the one of the first computer worms that pulled in a lot of media consideration. The various symptoms of the computer worms must be made extremely familiar to the users. This will help to recognize the infections quickly and take necessary steps. Some of the evident indications are: · Slowing down of the computer performance · System crashing · Automatic opening and running of various programs · Abnormality in the performance of the web browser · Any unusual behaviour of the system, including messages,
  • 37. images, sounds, etc. · Warming from Firewall · Files may go missing or modified · Unusual desktop icons or files appear · Error messages from the system or operation system faults · Without the user’s knowledge, emails are sent to contacts The user should keep a track of these symptoms. There may be some genuine issues which might lead to anyone of the above mentioned symptoms but if many of these symptoms appear then definitely the system has been affected by a worm. A computer’s operating system and applications should always be updated with the latest versions, because the software susceptibilities are the foremost infection vectors for the various computer worms (Farral, 2017). The updates should be installed as soon as they are released. The updates contain patches for the security faults and hence are very important. Various types of malwares and worms can be spread by the phishing attacks also. Unwanted mails from unknown senders, which too containing doubtful links and attachments, should always be avoided. A very strong internet security software solution should be installed to block such intimidations. Anti-phishing technology together with defences against various malwares and other online threats should be present in the security solution. Artificial Intelligence (AI) and machine learning are still new
  • 38. and has been explored fully in the field of cyber security yet. This brand new technology has been developed as a totally self- governing and autonomous system. It can be deployed as a coating over the manual attempts at cyber security. This boundless as well as nonlinear technology is way smarter and faster than any human or computer(Gregory, 2016). It additionally becomes more commanding on more training and usage. It can proactively classify and alleviate a threat even before a patch is developed, without being reactive. It can also be functional and certified. The partnership between man and machine is the future of cyber security. Both have to rely on each other for fighting and mitigating cyber threats. Figure 2: COMPUTER WORMSRelationship with CPT: I have worked with the global IT firm, Cisco Systems Inc., for completing my CPT assignment. 170 W Tasman Dr, San Jose, CA 95134, Cisco Systems Inc., was established in 1984. The said company deals with various computer malwares and worms and helps to develop cyber-security techniques in order to mitigate these threats. What Cisco Systems does? Cisco provides a technology which enables endpoint cyber- security. It delivers solutions to deploy, monitor and safeguard
  • 39. users’ applications as well as systems. It also provides safety assurance, compliance, intelligence and training services. Helping users to reach their cyber-security goal through various consultations and services is its main aim. Highlights of the Proposed Research The research will focus mainly on malware and worm attack as a result of cyber-security breach. The research will further explain the causes and effects of the security breaches. It will also provide recommendations as to how to deal with the security and virus attack issues. So, as computer and computer network security is prime focus in today’s world where data loss and theft is on full swing, this research will definitely be helpful in finding out the reasons and some solutions of the said problem. Overview of the CPT Assignment I have worked as a trainee in Cisco. I have focussed on observing and learning the various malware mitigation techniques as well as their following deployment and support. Thus, providing the much needed solutions and services to the clients within a stipulated time without bothering the client much has been the highlights of my training. I have been asked to document my studies and observations in a proper format and have also presented a report after the completion of the training. As a trainee from the technical background, it was necessary for me to learn how to detect the malware that has affected any
  • 40. system, diagnose the perfect technological solution for it and deploy the solution so that it starts working. The end-user satisfaction has been of immense importance. I have developed myself regarding the work procedures, implementation and improvement of the solutions during my training period. Relationship between the CPT Assignment and the Proposed Project My field of training and the selected research topic is closely related. I will come across various other research papers, online articles and journals in the entire duration of this research work. This will help to gain more knowledge regarding my subject of work and this it will help me to fare well in my assignments. Completing this research work will also enhance my reporting and research skills. All these learning together will help me to enrich my knowledge and experience.Problems Statement and Justification: Any company can undergo a huge loss on being subjected to a successful cyber-attack. Economic, reputational as well as legal issues can be the effects of security breach. Economic damage: Extensive financial loss can occur because of cyber-attacks, such as: · Corporate and financial information stealing · Money theft · Trade disruption
  • 41. · Business or contract loss Reputational damage: The main element of customer relation is faith and cyber-attacks can destroy that by damaging the reputation of the business this could potentially lead to loss of customers and sales as well as reduced profits. Legal damage: The security of all personal and sensitive data is made mandatory by the data protection and privacy laws. On deliberate negotiation of the data and security measures’ deployment failure, the owner may have to pay fines as well as give up supervisory authorizations. Some level of data protection prioritization is required in order to mitigate the security breaches. Important assets should be protected before the unimportant ones(Ismail et al., 2015). Keeping records of actions to take up during the breach is vital and in this case, checklists can be helpful. Software updates should be installed as they contain patches. Every user should be made aware of the various types of attacks and breaches and should be trained in handling those. Dry runs should definitely be conducted. Data security vendors should also be kept handy. The damage caused by a malware can be different. Malwares and worms can cause insignificant increase in outgoing traffic as well as complete network breakdown or even sensitive data loss (Kapse& Gupta, 2015). The target of
  • 42. the malware decides the measure of the damage. Operability of computers and networks: Deletion of critical system essentials, restriction of the OS as well as overloading of the network with a DDoS attack can be caused by a virus or Trojan attack. Often a bug in the code of the virus or the operation’s principle can cause severe issues. Hardware failure: As modern computers are relatively secured from software errors, hardware failures are rare. The CD/DVD tray can be opened or closed by Trojan. The computers that run continuously may experience drive failures due to these. Data loss or theft: The value of the lost information can be used to gauge the intensity of the damage caused by a successful attack. Many important and sensitive data, including presentations, calculations, videos, pictures, etc. or any type of coveted interaction can be lost or erased as a result of worm attacks(Ansari, 2016). Taking regular backups is considered to be one of the most ignored ways to avert data loss or theft. A worm inside a network of many systems is a major issue because on the one hand, it will damage every system and because huge loss, similarly, on the other hand, it will consume a lot of time in order to disinfect the systems (Kamal et al, 2016). The downtime of the systems will be considerably long.
  • 43. Even though, a Trojan is not a huge threat to the system, its presence in the system is not desired. The basic steps to protect users from most of the computer worms are – · In order to run the functions as a limited user, a system’s user accounts should be set. It should not be able to install software automatically. · In order to limit illegal network movement, all network firewalls should be turned on. · Installation of robust anti-virus software is necessary so that automatic updating and scanning keeps continuing. Figure 3: MALWARE SPECIMENResearch Scope, Aims and Objectives: Scope of the study: In the recent era, computer worms have significantly drawn attention to the research people, as it leaves undesirable influence on the internet and local networking system. Past scholars tried to assess the likelihood of adverse impact of computer worms, by analyzing different classification. On the other hand, the timeline of varied computer worms have been assessed to know the degree of impact and future threats of computer worms to a networking system and global internet
  • 44. users. Considering the fact, the study prioritises analyzing typical worm behaviour in the networks and its life cycle, so that new strategic path can be implemented to resist these devastating activities. The scope for the current study is also limited as, it can only address the issues for a specific range of network system, which is actually feasible. Classification of computer worms would be based on behaviour and scanning mode. Analysing the classification the researcher would be able to identify the evolution pattern of the computer worms and the types of damage caused by the attack to the global networks. Thus, strategies can be implemented to cut those attacks and mathematical modelling can also help to determine the projected future attacks that might happen against another set of evolution of computer worms. To some extent, these predictions would be helpful saving network attacking activities in both ways theoretically and practically. Aim: The primary aim of the current paper is to assess how computer malware worms affecting the cyber security. The secondary aim is to evaluate the inadequacy of current security measures and provide recommendations to resolve cyber crimes generated by computer worms. Objectives: · To identify the characteristics of computer worm malwares
  • 45. · To assess how the worms are affecting networking system and its impact · To evaluate existing strategies used to mitigate cyber security issues generated though computer worms · To estimate the loopholes of the existing process used to deal with cyber security issues · To recommend approaches that could be effective enough to resolve the security issues generated by computer wormsResearch Questions and Hypotheses: Questions: · What are the typical characteristics of computer worm malwares? · How the worms are evolving and affecting networking system? · What is the risk likelihood of computer worm attack? · Which existing strategies used to mitigate cyber security issues generated though computer worms? · How much loopholes are found in the existing threat mitigation process against cyber security issues? · Which strategic recommendations could be effective to resolve the security issues generated by computer worms? Hypothesis: First set: H0: Typical computer worms affects and damage global network security H1: Typical computer worms do not affect and damage global
  • 46. network security Second set: H0: Mathematical modelling and its projection towards the evolution of computer worms can safeguard the cyber security attack H1: Evolving replica of computer worms would be more powerful which cannot be destroyed by the implementation of recommendations drawn from mathematical modelling to a significant extentLiterature Review:Computer worm malwares and its characteristics: A computer worm is kind of malwares which are standalone in nature and these programs can reproduce or create duplicates to spread to other computers or operating systems. It generally uses the network to spread through the other computers. It creates problem to security measures and make them fail on the targeted systems or computers to access it (Sharma & Sahay, 2017). Malwares are generally the malicious software which gets in to the system through various viruses via the network and spread through the computers and operating systems. There are different kinds of Malwares like adware, worms, Trojan, backdoor etc. Figure 4: MALWARE (Source: Singh, 2017, 870)
  • 47. Adware It is meant to steal the user information, its added capability helps it to activate the spyware running with it, and they are dangerous in nature and harm the system completely (Velliangiri & Premalatha, 2017). Bot Bots are used for malicious purposes to steal user activity and information. Spam bots are sent to user systems or computers through third party vendors. Bugs: Those are generally used by the compilers on source codes of the program. Ransom ware It is the most harmful malwares which are generally used for harming the user operating system and can also ask for forceful ransom payment. Spyware As the name says it used to spy on the user system and programs and activities and try to steal them.The way worms are affecting networking system and the likelihood of its impact on the network: As there are many kinds of computer worms or network worms like it can be email worm, bot worm, hybrid worms, and Virus worms etc. Computer or Network worms affect the network
  • 48. security and even system securities in various ways as below: · They affect the network and systems depending on its codes. Generally, they make copies and spread highly through other computers or systems without any bodies knowledge. · They can also send malicious emails to any address book those are stored on user system. · This kind of malwares are very malicious and it can access the computer so easily and go on to the system files, which help it to spread the · It creates bypass and able to dominate the firewall of the user system helping to affect the hard disk files of the operating system. Impact of Computer Worms or malwares on Network Security There are various worms or harmful malwares which generally used to corrupt the data from the user system, disable the computers network security. Worms are less harmful but can create problem for small business giving risk for their user data and the computer networks. It hampers the performance of the user system while doing important tasks and infects the computer thoroughly. Hamper capacity: Velliangiri & Premalatha (2017) stated that in a computer any program, software, resources etc consumes hard drive storage. While there a threat of worms or malwares it used to create duplicate spaces and consumes the capacity of the system unnecessarily without the knowledge of the user.
  • 49. Time: When the computer or system gets infected by the worms it takes much longer time to perform as the worm used to create duplicate files and slow down the processor speed. Computer Security: After the worm or malware get installed it can perform numerous actions without user’s knowledge and steal computer data which can be an issue of breach of security. Hackers can get the financial data and give the user monetary loses. People can face a lot of issues if those worms infect their system like instability of data, cope of undesirable of contents, data harvesting etc. To get rid of those problems every user should install strong firewalls, should use genuine version of operating system and use a strong antivirus to protect their system data and life.Previous strategies used to mitigate cyber security issues generated though computer worms Computer network which is affected by the malicious worm not only suffer from disruption of service but also become weak to any kind of cyber-attack in the form of viruses or malicious worms which duplicates its structure and affect each and every part of computer to generate the loss of data and mainly attacking the operating system. Now days the technology had upgraded to Internet of things or clouds computing but prior to that to stop the malicious work affecting the whole network system of computer different strategies were undertaken to fight against these malicious worm.
  • 50. · The operating system must be updated with new version in timely manner and install all the new version of patches which has the ability to fight with new cyber-attacks of malicious worms. · The previous and existing strategies is the use of the firewall which is an authenticate method to protect the computer network from worm attack and also the software running in the computer reducing the risk (Gregory, 2016). · Many work threat or worms comes in encrypted method, so there are codes which are used to run in computer to decrypt the code and delete it before it could do a great harm to the computer and the system method running in the computer. · Another new and previous strategy were to remove that computer which is running in a group of computer network system and hence the affected computer could be replaced with the new one to avoid the risk of vulnerabilities to the computer. · The other main strategy is to be careful to any links or email or any messaging app, which could contain the worms and on clicking it may affect the computer, should be readily avoided.The loopholes of the existing process used to deal with cyber security issues Cyber security is a serious issue which is faced by every organization. Attacking and attempting to hack databases or malware attacks on computer systems have become frequent cases. As per Gregory (2016) with the huge advancement of
  • 51. technology as everyone is getting benefits and also advancing the business utilizing these technologies, attackers with malicious intents are also the same to increase the degree of the attacks. Therefore, the attackers can find new methods using the technologies to get past the present security system implemented in the cyber security. In many cases it has been seen that the attackers have invented new way to affect the computer systems which cannot be countered by the existed security system (Farral, 2017). The most critical fact about safety is to maintain and monitor the security system and to check if the security system patch is up to date with advancements of new technologies. Ansari (2016) said that with the up gradations of software the security associated with it always need to be rechecked and to need to be upgrade, so that it can match up to the software with proper safety. As this is much more expensive process than implementation of the security systems many organizations decides to ignore it. Therefore, the safety system loses its effectiveness and gradually becomes an easy target for the attackers. When an advanced, upgraded operational technology is implemented into the cloud or connected with the internet, a proper threat assessment is required (Yılmaz & Gönen, 2018). Attackers are generating more malicious software or malware which cannot be identified by the present security measurements. Also new
  • 52. advance techniques are being adopted using the technologies to breach any computer systems of any organization. Without proper security systems the organization are completely vulnerable against these attacks.Strategic recommendations to resolve the security issues generated by computer worms Computer Worms malware infection is a method to attack the computer systems to make it unbearably slow for operation or hijacking the system. To protect the sensitive and important data from these undesired attacks proper strategies is need to be adopted by the organization. Some of the strategies that can be considered are: Anti-worm Software: To prevent this malicious attack, it is recommended that the computer system is contained with effective anti-worm software which can identify the threat and can notify to the administration or management. This software can scan any data received by outside source to check any possible threat and can notify the users to avoid it from opening or take countermeasures to remove it. Spam Filters: The spam filters have the ability to block and confinement any email or messages containing any suspicious content and send from any unknown sender and alerts the user to avoid it. Many large and small organizations along with many personal email provider currently have implemented the spam filter.
  • 53. Security Scans: It is important to avoid any malicious and suspicious content and also need to avoid any software which can spread worm in the computer system. That is why computer systems should be contain with effective software which can scan the software that would be installed or have been installed in the computer system to check if it is infected with the worm. Regular Updates: The networks, devices and computer systems are need to be updated regularly. The updated security patches provided by the software vendor are needed to be purchased and installed to handle the latest threats. Firewalls: Firewalls are considered to be the finest defence line up in the computer system. This technology can block anything suspicious to be accessed and installed in the computer network. Proposed