Running Head: MALWARE 1 MALWARE 2 Malware Name Institution Course Date Malware Attacks Potential Malicious Attracts Against the Network Organization In the world of technology, everything can just happen. Information can pass from one region to another with ease meaning that everything has been simplified. However, the information technology has also been affected by a few challenges that seem to recur from time to time. They include; Trojan horse virus- Typically, a computer virus has been a challenge for most organizations, but the most common especially in such a company is the Trojan horse virus. The virus is not self-replicating like the majority of others, but it has terrible consequences if it affects the network server of an organization (Durairajan, Saravanan, & Chakkaravarthy, 2016). Apparently, the virus is used by hackers to get access to data from a specified user illegally. With the installation of the video game, other competitor servers can access such kind of data and reproduce a copy even before the initially programmed game gets into the market. Effects of Trojan horse virus The data within a user’s computer can be deleted or be modified by the hacker. With new businesses cropping out day in day out, the problem may affect the video game company. A hacker may eliminate valuable data from the program and install a fake one which will, in turn, nullify the whole project. The virus can also be used to steal valuable information from a company that is supposed to be classified. Computer worms- The worst thing about computer worms is that they are self-replicating. Apparently, they utilize the space in the computer network and dispatch it there where they replicate. The copies of the worms are multiplied and therefore displace the data that was there. Additionally, computer worms don’t need to be attached to the case of Trojan horse virus, but they develop from the network of equipment bit by bit (Anwar, Bakhtiari, Zainal, Abdullah, & Qureshi, 2015). The video game is a program that is used by a lot of people, and there is a high possibility that some computer worms begin to develop slowly. Impact of computer worms One of the major troubles with the computer worms is that they replicate themselves on the host server and hence, eliminate valuable files. They apparently take the place of a file which will automatically cause a breakdown in the network system of a company. For instance, the video game has been programmed and is made of various files. If a computer worm takes the place of one of the critical files, it would be nearly impossible for the program to function normally. Blended threat-The case happens when both the Trojan horse and the computer worms all attack at the same time. The attack by both can have very grave consequences as they require no human efforts. Apparently, the threat uses the internet vulnerabilities and the user to initiate and spread an attack within the system. Importantly, the attack is a ...