Adware and spyware are programs that are included in email attachments, downloaded as part of another program or website. The capabilities of adware include adjustments to a computer browser, changing startup pages on the browser, replacing search functions, and generating pop-ups or frames that are difficult to delete or shut down. Spyware are programs that are used by publishers or programmers for marketing purposes which are unknown by the user. Spyware can provide information such as user’s computer hardware, software, browsing habits, and other information. Denial-of-Service and Blended Attacks are two damaging strategies used by individuals that employ malicious codes. A DoS attack is an attempt to make a site or Web site unavailable to its intended users, such as temporarily or indefinitely interrupt or suspend services to the Internet. Multiple bogus requests are sent to the server resulting in overloading the server and preventing legitimate usage (Taylor et al., 2011). A blended attack is an attack that involves a combination of attacks using worms, Trojan horse, virus, and other types of malware. The blended attack utilizes multiple payloads and targets that make up the virus programming (Taylor et al.,
Adware and spyware are programs that are included in email attachments, downloaded as part of another program or website. The capabilities of adware include adjustments to a computer browser, changing startup pages on the browser, replacing search functions, and generating pop-ups or frames that are difficult to delete or shut down. Spyware are programs that are used by publishers or programmers for marketing purposes which are unknown by the user. Spyware can provide information such as user’s computer hardware, software, browsing habits, and other information. Denial-of-Service and Blended Attacks are two damaging strategies used by individuals that employ malicious codes. A DoS attack is an attempt to make a site or Web site unavailable to its intended users, such as temporarily or indefinitely interrupt or suspend services to the Internet. Multiple bogus requests are sent to the server resulting in overloading the server and preventing legitimate usage (Taylor et al., 2011). A blended attack is an attack that involves a combination of attacks using worms, Trojan horse, virus, and other types of malware. The blended attack utilizes multiple payloads and targets that make up the virus programming (Taylor et al.,