Malware Life Cycle Research Paper

Superior Essays
The Malware Life Cycle
Ka Vang
Walden University
The Malware Life Cycle There are many risks involved in cyber security, some more serious than others. This can range from viruses erasing an entire system, attackers hacking into a system and modifying files or attacking others, compromising sensitive information such as credit card and personal information, and more. Although these types of issues exist, there is no guarantee that even taking the best precautions will ensure 100% protection. Instead, the best option is to take the necessary steps to minimize the chances.
Motivations and Evolutions A hacker’s motivation is varied and complex. Siciliano (2011) states that there are seven types of hacker motivations:
• White
…show more content…
During this phase, the social networking and phishing emails are used to intrude into an organization’s network. Deerman (2012) shares that the phishing emails are:
• Highly focused with attacks embedded as part of the email
• Targets individuals with elevated access within the organization
• Malicious attachments are in the emails for users to click so the infectious code can install the malware
The third phase is the infiltration phase. Once the network has been infiltrated, a connection between the installed malware and the compromised system will be controlled by the attacker on a Command & Control (C2) server. Deerman (2012) explains that though the C2 connections may only last a short while and only connect to a single system, it can still achieve gaining privileged access to the system, updating and installing utilities to collect necessary information, spreading the infection in the network, and more. From the defensive perspective, there are also three phases to ensure security. Flynn (2013) states that the phases include:
• Blocking known threats – Real-time protection used to block malware through secure gateways
• Analyzing unknown threats – Using sandboxing technologies to examine unknown content to make sure it is not
…show more content…
Without it, how else will an organization know what their weaknesses are and what they can do to improve their defenses? As mentioned previously, Deerman (2012) found that there are three main phases of the malware lifecycle. Through the good intentions of implementing white hat hacking, an organization will be able to clearly see the vulnerabilities in their system and where attackers will most likely hit first. Understanding the offensive and defensive perspectives of the malware lifecycle will equip the organization with the adequate skills and tools to disable the first phase from developing so the malware never reaches the second or third phases. The best method of security is to always take preventative

Related Documents

  • Superior Essays

    Pt1420 Unit 5 Lab Report

    • 1875 Words
    • 8 Pages

    Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack. It is run on web servers, with the purpose of identifying software susceptibilities in client machines, communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client. 3 e. How many options are there? How many of these are required?…

    • 1875 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Describe 3 ways a hacker can try to intrude a system. To protect from unwanted intrusion, viruses or hacking, we should consider the following points: Antivirus protection: This program scans our computer from any miscellaneous files or viruses and delete them or to move to quarantine. There are lot of antivirus available in market. Move rover most of ISPs also provide antivirus.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This is one of the biggest question that occurs in the head, such as “ How ‘Important Security Alert From Windows’ Pop-Ups sneaks in the computer?” According to experts, this threat comes due to human weakness and unsafe browsing habits. Almost every computer user wants to download free stuff like background images, songs, videos, applications, add-ons at free of cost so that they download it from unreliable sources, which often contains malicious threats. In addition, many users receive floods of spam e-mails, which claims "you are selected as the today's happiest winners" or offers loans at very low interest rates.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy (Malware). Malware is able to accomplish this by its works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. The type of malware that could be used is a Rootkit Malware. A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executable.…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the year 2008, the Comprehensive National Cybersecurity Initiative (CNCI) was formed and it was to ensure the US is able to defend itself from immediate threats should they occur and to be able to educate the government. The Building Blocks of a Computer Network The description of a building block of a network will be explained by the description of one from a shore command in the Navy. First one would need a computer…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In 2014 hosts downloaded malware every 6 minutes In 2014 hosts accessed a malicious site every 24 seconds Corporate Data at Risk When mobile security is weak, it can provide attackers with personal information, passwords, business and personal email, corporate documents, and access to company networks and applications. In the business setting, that concern becomes magnified. In fact, 87 percent of IT professionals say careless employees are a greater threat to security than cybercriminals. And, 92 percent say employee behaviors could have made a difference in preventing high-profile security…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Hackers and viruses are both security threats to a business’s network as they are both capable of stealing information. The difference is that a hacker is an expert in technology who uses their knowledge to break into computers and computer networks for either profit or motivation while a virus is software written with malicious intent to cause annoyance or damage. (Baltzan, 2013) There are several different types of hackers. Two of the most common are black-hat hackers and white-hat hackers.…

    • 1291 Words
    • 6 Pages
    Great Essays
  • Great Essays

    I read chapter 7: Phony Sites and Dangerous Attachments in The Art of Deception by Kevin D. Mitnick and William L. Simon. This chapter was about unsafe sites you may visit and unsafe attachments you may receive in an email. An attacker will do whatever is necessary to break into a network. Computer viruses can do a lot of damage to your computer. Many people have created a software to prevent a virus from harming computers.…

    • 1229 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    Lab 2: OSI Model Introduction: This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people.…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Everyday money is stolen, sites are hacked, and governments seek to gain an advantage over the others by using the internet. It is as if there is a war going on behind the scenes of the internet. A new battlefield erupted in cyber-space. Cyber-warfare is what this called. In Cyber-Warfare not only are vital secrets compromised, but complex systems can be, and have been attacked that put peoples life in danger.…

    • 1383 Words
    • 6 Pages
    Great Essays