Adware And Spyware Case Study

Superior Essays
1. Distinguish among the categories of malicious computer code that can be used to invade or attack computers. Evaluate their relative threat and potential for damage. Unit 2. Nothing brings more fear to an individual when learning that a malicious code has been entered in his or her computer. This fear is the same feeling one experience when their credit card is stolen or compromised. The feeling of security quickly diminishes. Just what is a malicious code? Simply put, malicious codes are programs just like any other computer program which performs an explicit action. At times, malicious codes are written for lawful purposes such as advertisements, jokes or messages. Other times, malicious codes are written to be destructive or malicious …show more content…
Adware and spyware are programs that are included in email attachments, downloaded as part of another program or website. The capabilities of adware include adjustments to a computer browser, changing startup pages on the browser, replacing search functions, and generating pop-ups or frames that are difficult to delete or shut down. Spyware are programs that are used by publishers or programmers for marketing purposes which are unknown by the user. Spyware can provide information such as user’s computer hardware, software, browsing habits, and other information. Denial-of-Service and Blended Attacks are two damaging strategies used by individuals that employ malicious codes. A DoS attack is an attempt to make a site or Web site unavailable to its intended users, such as temporarily or indefinitely interrupt or suspend services to the Internet. Multiple bogus requests are sent to the server resulting in overloading the server and preventing legitimate usage (Taylor et al., 2011). A blended attack is an attack that involves a combination of attacks using worms, Trojan horse, virus, and other types of malware. The blended attack utilizes multiple payloads and targets that make up the virus programming (Taylor et al.,

Related Documents

  • Improved Essays

    Reconnaissance involves gathering information of a target without any prior knowledge about the company relating to or an individual. It includes both Passive and Active Reconnaissance. This steps helps to discover useful data which can assist them to plan the attack. Scanning is the phase which takes place exactly after the attacker is able to collect enough information to understand the business works and those data which are valuable. Hackers uses this collecteddata to find a way which will help them executing an attack on the Operating System, Installed Software, Open Ports, IP Addresses or user accounts.…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Publish the the advertisements in browser and gain the password account. Sometimes the Malware designed to destroy the network and servers.…

    • 1452 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    1) What is the difference between a virus and other types of malicious code? A virus is a particular type of malicious program designed to duplicate itself and spread from system to system. Normally, viruses attach themselves to files that can be shared enabling the malicious code to access to new computers. Viruses that are more complex may take over your email client, mailing copies of themselves to the contacts for a faster, more effective transmission (Fritsch et al, 2015). Numerous virus contain a load designed to damage the system’s data, while others only spread without causing direct damage to their hosts.…

    • 1458 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    It is considered to be one of the more dangerous forms of Malware, due to its inability to replicate and its difficult classification as a virus. Another reason that it is considered to be one of the more dangerous forms of Malware is due to the fact that it is secretive and unsuspecting. The attachment appears to the user’s email account or server as a harmless attachment. Once the user opens the attachment, the software is downloaded and all of the personal information that is stored on the computer is now in the hacker’s…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Users infected by web site that contain malicious ads. Because the ads have code that scans user 's system for vulnerabilities. The vulnerability can be exploited to cause the system to download malware and execute it. Finally, it infects the system with a data-stealing program. (Nappa, Rafique & Caballero,…

    • 1807 Words
    • 8 Pages
    Improved Essays
  • Superior Essays

    First, routers which share infrastructure can be affected by denial-of-service attack. Second, routers which are used at the core of the network can be affected by modifying the behaviour of router to launch denial-of-service attack. One example is massive distributed denial-of-service attacks generated by BOTNETS which is triggered to manipulate the system without user’s knowledge. ‘The attack is triggered with a single packet, absorbs all bandwidth of the outgoing link on the router, and can propagate to all vulnerable downstream routers’(Chaski, D,Wu, Q and Qolf, T 2011,pp-2). It appears that vulnerability exploited in router leads to absorbing all the bandwidth to disrupt the operation of the router so that can bring the entire network to its…

    • 1094 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Types of Cyber Crime 2.1 Hacking: This type of crime is very dangerous and punishable as it refers to the breaking down into the computer system so that one’s valuable data can be accessed easily without any permission in hacking criminal uses different software to enter a person’s computer and a person may not be aware of that his system is being used from another…

    • 1830 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    To make clear what a security attack is, it is a “A security event that has been identified by correlation and analytics tools as malicious activity that is attempting to collect, disrupt, deny, degrade or destroy information system resources or the information itself” (Gallagher). These attacks can come in any shape or form over the internet and with the little regulation over cyber threats internationally it needs to be a constant cause for alarm for agents. Verizon showed its 2013 data breach investigation report that 95 percent of the advance attacks came through emails that were containing malicious attachments which gave the attackers a a stepping stone into the host networks computers and network devises which then exposed the valuable and/or private…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    During this phase, the social networking and phishing emails are used to intrude into an organization’s network. Deerman (2012) shares that the phishing emails are: • Highly focused with attacks embedded as part of the email • Targets individuals with elevated access within the organization • Malicious attachments are in the emails for users to click so the infectious code can install the malware The third phase is the infiltration phase. Once the network has been infiltrated, a connection between the installed malware and the compromised system will be controlled by the attacker on a Command & Control (C2) server. Deerman (2012) explains that though the C2 connections may only last a short while and only connect to a single system, it can still achieve gaining privileged access to the system, updating and installing utilities to collect necessary information, spreading the infection in the network, and more. From the defensive perspective, there are also three phases to ensure security.…

    • 1603 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Purpose can be to produce report, to identify the behaviors of nodes. If the behaviors of all nodes or the behavior of a particular node is different from other's nodes, this is required to update the reputation system. The attacker’s trick for the attack will be same i.e. an attacker has to create many malicious nodes for overcoming on legitimate nodes. Also after making a removal of normal nodes, the illegal nodes design a defense system to keep themselves…

    • 1265 Words
    • 6 Pages
    Improved Essays

Related Topics