Sunday, May 5, 2019

Malicious Software, Unknown Threats & Potential Solutions Research Paper

Malicious Software, Unknown Threats & Potential Solutions - question Paper ExampleMalicious intentions result into destruction of system hardware, cultivation, and software whereby, disclosure of confidential information results, through unauthorized users having access to the system and information. Unauthorized usage also results in modification and faulting of the information system. Interception occurs when information that resides in a ready reckoner system is copied by unauthorized user (Abdullah, 2010, p.3). current(prenominal) threats include malware, which is constituted by viruses, estimator worms and Trojan horses that are generally common in the computer networks and clearsites. The possibility of making money through malware distribution and solution has propagated the online distribution, which is a major threat. This is the case since the popularity of viruses, computer worms and Trojan horses consequently increases popularity of similar antivirus that is tra ded for commercial purposes (Ryuya, 2011, p.514). Defects with respect to homogeneous binary files are an indication of front line of unknown threats and malicious software. Indications of threats may include infections such as viruses, Trojan horse programs and even original file format alterations (Weber, et al., 2002, p. 2). Motivation Malicious software and unknown threats have time and again presented new threats that call for new ways of detection and prevention within the information technology environment. Unknown threats and malware software call for modern malware detection solutions such as proactive malware detection system that enables prevention of futurity attacks and those that were previously unknown. Modern detection system also reduces the rate of false alarms, since successful detection of attacks is do (Volynkin, State University of New York at Binghamton Electrical Engineering. 2007, p.47). Dynamics of malicious software are characterized by strains such a s code red-2, which is a fast spreading worm that can be solved victimization a complex mathematical model that is based on approach of compartmentalization. The solution is made likely through predicting the state of the system for the purpose of converting unaffected targeted nodes into noninfectious and infectious nodes (Hemraj and Dinesh, 2007, p. 491). Hackers have gone before to exploit zero day threats, since these threats have no characteristic signature that can be detected. The ontogeny takes advantage of polymorphing code of the unknown threat that varies with every page loaded. However, technological firms have competitively undertaken to kick out models for detecting malicious and unknown threats for their customers. Through intensive marketing and competition, new knowledge regarding malicious software attacks has been created by software firms. Although software firms seek to gain profitability in software applications, solutions for complex and alive(p) maliciou s software attacks are gaining a positive insight (Michael and Mikhael, 2010, p.597). Invisible malicious codes on the sack execute when the browser loads web pages containing the software. Malicious codes use cross-site scripting to retrieve codes that are more spartan from third party sites, which plants the malware, steals data and takes control of the system through leveraging operating system and web browser vulnerability.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.