Security Attack Research Paper

Superior Essays
The impact of security incidents in today’s computing world is increasing day by day due to the complexity, growing reliance on software with known vulnerabilities, higher user expectations and expanding and changing systems. The computing environment has become highly complex. Networks, operating systems, computers, Web sites, applications, switches, routers, and gateways are interconnected and are driven by hundreds of millions of lines of code. The number of potential entry points to a network expands continually as more devices are added. This will increase the probability of security breaches and other security attacks.
There are various types of computer attacks. Some of the common attacks, including the virus, worm, Trojan horse, spam,
…show more content…
To create to create programs to infect documents and templates, attackers are using and application macro language (such as Visual Basic or VBScript). Virus gets executed when an infected document is opened, and damage the user’s application templates. Unwanted words, phrases, numbers, can insert into documents or alter command functions using macros. Once a macro virus get executed and infect the application, it can embed itself in all future documents created with the application. The “WM97/Resume” virus is a Word macro virus spread through email with the subject “Resume - Janet Simons.” If the email recipient clicks on the attachment, the virus deletes all data in the recipient’s mapped drives.
WORMS
Unlike a computer virus, which requires users intervention, a worm is a harmful program that exist in the active memory of the computer .Worms duplicates itself. Worms will cause a series of negative impacts in user’s computers which includes losing of data’s and programs, decreased productivity due to workers being incapable of using their computers, additional productivity loss¬¬¬¬¬ as workers try to recover programs and data’s, Increased effort for IT workers to clean up the and restore everything to as close to normal as possible.

Related Documents

  • Superior Essays

    Please research one virus and one worm, and write a maximum 2-page single-spaced paper explaining what each of them is, what they do, what their impact was, what the mechanics of how they work are (the technical aspect), and how were they stopped. Computer virus: It is a piece of code which is loaded onto the computer without the user knowledge and runs itself. When this code is executed, it makes a copy of itself and inserts this copy into another computer programs, data files of the hard drive. Such small virus also steals hard disk space and CPU time , corrupts data.…

    • 1405 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In 1776 the founding fathers signed the Declaration of Independence to free themselves from the tyrant King George of Great Britain. This caused a war of independence that freed the people of the United States from an unfair government, but left them in need of leadership. After several failed attempts the leaders of the new nation formed a government that would be free from tyranny. The Founders wrote the constitution to limit the powers of the government to insure that the government would not create a new tyrant.…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Question #1: What would be your response to the order? Explain in detail. My first response towards the operation order is to question the necessity of forcefully removing local evacuee from their homes and destroying their property if they refuse to evacuate. Then explain to the commander that this type of action is prohibited and in clear violation of the Law of War. My second response will be to advice that the operation order be revised before the execution of the order because the destruction of civilian property unnecessary and cannot be justified under military necessity.…

    • 686 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The Department of Homeland Security is one of 15 department in the U.S. Cabinet. Homeland Security is in charge of ensuring the safety of Americans from threats of all kinds. This includes the prevention of terrorist attacks, the protection against natural and man-made disasters, the watching of borders, and the protection against cyberspace. To prevent future terrorist attacks the department informs the government about potental targets based on collected information from files. Homeland security is also the first to send aid to victims of disasters.…

    • 196 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    I read chapter 7: Phony Sites and Dangerous Attachments in The Art of Deception by Kevin D. Mitnick and William L. Simon. This chapter was about unsafe sites you may visit and unsafe attachments you may receive in an email. An attacker will do whatever is necessary to break into a network. Computer viruses can do a lot of damage to your computer. Many people have created a software to prevent a virus from harming computers.…

    • 1229 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Before September eleventh advanced education organizations simply anticipated catastrophic events. Biological, chemical warfare and weaponry was not of concern. A terrorist attack is a man-made occasion that takes human lives and annihilates property. A terrorist attack shows up in numerous structures; biological terrorism, chemical terrorism, explosive terrorism, nuclear terrorism, and radiation terrorism. There are numerous factors included that make crisis getting ready for a dangerous assault troublesome, including the quantity of people in or around the focused on structure and the strategies utilized by fear mongers to execute a touchy assault.…

    • 1131 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Security Threat Groups, also referred to as gangs are either an formal or informal group of prison inmates who set up either by race or by their beliefs. The evolution of gangs have developed a threat to the safety of prison officials and other inmates. Some of the major security threat groups include the Aryan Brotherhood, The Klu Klux Klan, The Folks, The Nation of Islam, and MS13. Groups within the correctional facilities are categorized as STGs depending upon parameters such as gang history, purpose, involvement in illegal activities, propensity for violence, and its structure and composition.…

    • 2127 Words
    • 9 Pages
    Great Essays
  • Great Essays

    Every day thousands of people risk their lives to protect our country from harm, from serving in the army, to working for the government in the Department of Homeland Security because, these people are the ones who keep us protected from harm. For my senior project, I am researching how it is possible to get a job in the Department of Homeland Security. Prior to the start of this project I just had the basic knowledge of what it is and that it is a part of the government. Throughout this project I plan on exploring the system and the skills it takes to get into the Department of Homeland Security starting in college. By doing this I hope to be able to better understand what it takes to become part of the Department of Homeland Security and…

    • 1554 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Homeland Security Department According to the United States Government, Federal Agencies Department of Homeland Security website, The Homeland Security department was established in 2002 from a collaboration of 22 other departments and agencies. The homeland security is just what is names says it’s an agency that tries to find ways to improve security for America. Everyone knows that the military plays an important role in Homeland security, however there are a few parts to the department that some might now realize are, the following is a list of some of the other departments that are also part of homeland security: Customs, Border, immigration enforcement, emergency response to natural and manmade disasters, antiterrorism, and cybersecurity.…

    • 991 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Dos Assault

    • 567 Words
    • 3 Pages

    (DoS) assaults have turned into a noteworthy danger to current PC systems. Early DoS assaults were specialized amusements played among underground assailants. For instance, an assailant might need to gain power of an IRC channel by means of performing DoS assaults against the channel proprietor. Aggressors could get acknowledgment in the underground group by means of bringing down well known sites. Since simple to-utilize DoS apparatuses, for example, Trinoo (Dittrich 1999), can be effortlessly downloaded from the Internet, typical PC clients can get to be DoS aggressors also.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Homeland Security and Our Critical Infrastructure As with most things involved with Homeland Security, the events of September 11, 2001, changed the way America deals with its National Security. After all, our way of life was changed forever, and not for the best. Following the events of September 11, 2001, President Bush created the Department of Homeland Security. The purpose of the Department of Homeland Security is to protect and defend the citizens and the national critical infrastructure of the United States of America, against both enemies foreign and domestic.…

    • 1238 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    Security systems both physical and virtual are utilized to safeguard information from being copied, stolen, or destroyed. This is complicated by the fact that cyber-attacks can originate from hundreds of miles away and the source can be complicated to determine (Kemp 2012, p. 33). This leads to more robust security systems and multiple layers of duplicated…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Abhinandan Yadav Professor Sharifian Govt-2306 April 29, 2018 Assignment-3 If I would be elected then I would like to serve in the committees of Homeland security and public safety or transportation or Higher education. The function of these committee are described below. 1. Homeland Security and Public Safety:…

    • 940 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Hello Everyone, I hope everyone had a good first week. I apologize for the delay on my initial post. This week we are discussing the concept of homeland security in relation to homeland defense and national security. The term homeland security and the concept of national security has been prevalent in the United States since the terrorist attacks along the East coast on September 11th, 2001.…

    • 479 Words
    • 2 Pages
    Improved Essays

Related Topics