Malware Life Cycle Research Paper

Superior Essays
The Malware Life Cycle
Ka Vang
Walden University
The Malware Life Cycle There are many risks involved in cyber security, some more serious than others. This can range from viruses erasing an entire system, attackers hacking into a system and modifying files or attacking others, compromising sensitive information such as credit card and personal information, and more. Although these types of issues exist, there is no guarantee that even taking the best precautions will ensure 100% protection. Instead, the best option is to take the necessary steps to minimize the chances.
Motivations and Evolutions A hacker’s motivation is varied and complex. Siciliano (2011) states that there are seven types of hacker motivations:
• White
…show more content…
During this phase, the social networking and phishing emails are used to intrude into an organization’s network. Deerman (2012) shares that the phishing emails are:
• Highly focused with attacks embedded as part of the email
• Targets individuals with elevated access within the organization
• Malicious attachments are in the emails for users to click so the infectious code can install the malware
The third phase is the infiltration phase. Once the network has been infiltrated, a connection between the installed malware and the compromised system will be controlled by the attacker on a Command & Control (C2) server. Deerman (2012) explains that though the C2 connections may only last a short while and only connect to a single system, it can still achieve gaining privileged access to the system, updating and installing utilities to collect necessary information, spreading the infection in the network, and more. From the defensive perspective, there are also three phases to ensure security. Flynn (2013) states that the phases include:
• Blocking known threats – Real-time protection used to block malware through secure gateways
• Analyzing unknown threats – Using sandboxing technologies to examine unknown content to make sure it is not
…show more content…
Without it, how else will an organization know what their weaknesses are and what they can do to improve their defenses? As mentioned previously, Deerman (2012) found that there are three main phases of the malware lifecycle. Through the good intentions of implementing white hat hacking, an organization will be able to clearly see the vulnerabilities in their system and where attackers will most likely hit first. Understanding the offensive and defensive perspectives of the malware lifecycle will equip the organization with the adequate skills and tools to disable the first phase from developing so the malware never reaches the second or third phases. The best method of security is to always take preventative

Related Documents

  • Improved Essays

    Abstract- Modern technological advancement made our current internet on the pinnacle of everything related to information technology. However, it is always threatened by various types of security issues, which are mostly due to hackers, their bots and malicious scripts. They attacks, corrupts, collects and destroys the essential information in the system of the valuable organizations. To stop their such harmful and hazardous activities or to take preventive measures, most organizations now started to keep their own hackers who are known as ethical hackers or white hat hackers. This paper is based on what exactly an ethical hacker does, his protective system from illegal trespassing and on the field of ethical hacking with its various aspects.…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    To make clear what a security attack is, it is a “A security event that has been identified by correlation and analytics tools as malicious activity that is attempting to collect, disrupt, deny, degrade or destroy information system resources or the information itself” (Gallagher). These attacks can come in any shape or form over the internet and with the little regulation over cyber threats internationally it needs to be a constant cause for alarm for agents. Verizon showed its 2013 data breach investigation report that 95 percent of the advance attacks came through emails that were containing malicious attachments which gave the attackers a a stepping stone into the host networks computers and network devises which then exposed the valuable and/or private…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    What is the meaning of hackers What is the Malware ? And how many type of it ?. At time time , Malware become more dangerous than before. Even though IT security companies could not figure out how to be warned and discover it after spreading in network. Malware has become a serious issues , as we know the world now depending for technology to communicate , shopping , and educations.…

    • 1452 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    But there are some scholars who argue differently that hackers must rely on both their telecommunication skills along with their technology knowledge to successfully cause harm. Michail Tsikerdekis, author of the article Online Deception in Social Media, argues that hackers employ the use of deception to gain access to another’s account. Tsikerdekis states, “In social media, deception can involve content, sender, and communication channel or all three together (Tsikerdekis 72).” While these sorts of attacks may rely on telecommunication skills, there are still methods of which people can work to protect themselves from being potential targets. Tsikerdekis mentions, “Training and raising awareness (such as might be taught to security personnel) could help protect users of social media (Tsikerdekis 72).” Tsikerdekis’ point serves to show the reader that hackers employ much more than just their technical skills. The scholar provides evidence to the readers that even on social media they must be aware of hackers impersonating someone and trying to trick them into giving up their personal…

    • 1542 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Before making an application live developer may also leave certain debug options running in order to re-examine. Special attention must be given to these backdoors as attacker can gain unprivileged access to the website [31]. Since these debug options facilitate back-end entry to the developers, and sometimes these debug options are left enabled unnoticed, this may provide an easy entry to a hacker into the web-site that let him make changes at the website level [31]. Now that we have seen some of the application level threats to the system we will look into what security measures can be used to avoid such attacks. Best way to achieve an application level security in a cloud environment is to analyze and address security threat at various cloud service model such as SaaS, PaaS and IaaS .For example in case of IaaS service model developers are given capability to develop and deploy application in a cloud environment.…

    • 745 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    You will definitely learn the principles of system security and experiment with different strategies. As a hacker, you might want to go beyond common restrictions and execute your program. Another thing is that you might not worry about possible dangers. Defend like a professional As stated earlier, the major difference between a malicious (“black hat”) hacker and a helpful (“white hat”) hacker is what they intended to achieve with their hacking skills. As a security expert you’ll understand all the possible intricacies and how you can use them to your own benefits.…

    • 803 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Attacks such as DDoS (Distributed Denial of Service) target servers by sending large numbers of connection requests within a short span of time, which renders the server unresponsive. IT strategists should not only take into account the response in such events but how such attacks could be identified early on so that other backup systems could be made operational to service genuine requests. The observation principle also lays special emphasis on the identification of threats and the training of security analysts to detect suspicious behavior in the least possible time. Hackers typically do not repeat a particular style of attack again once it is used against an organization. Security analysts should be trained to detect newer and smarter forms of attacks as…

    • 810 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Adware and spyware are programs that are included in email attachments, downloaded as part of another program or website. The capabilities of adware include adjustments to a computer browser, changing startup pages on the browser, replacing search functions, and generating pop-ups or frames that are difficult to delete or shut down. Spyware are programs that are used by publishers or programmers for marketing purposes which are unknown by the user. Spyware can provide information such as user’s computer hardware, software, browsing habits, and other information. Denial-of-Service and Blended Attacks are two damaging strategies used by individuals that employ malicious codes.…

    • 1682 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    Most, if not all, computers can be inflicted by Malicious software (Malware) are hard to fix an infection found in the system. It can lead to hacking, leaking of valuable information and a vulnerable threat to security. It requires no intervention to propagate across computer networks like the flu shot. Moreover, there are many types of malware like Trojan horses, viruses, worms, rootkits, spyware which penetrates specific application to deteriorate the system thus stealing confidential data from computer. As a consequence, these malware propagates through computer hardware gradually and pave a new way to penetrate operating system.…

    • 1094 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Cyber Terrorism is defined as an attack that targets the information held in computers, or a network that leads to a threat of violence against the property or a person (Weimann, 2004). The information that has been exposed on WikiLeaks has damaged careers and the reputation of organizations. These leaks have also exposed information that threaten the relationships of countries. The breaches can be considered acts of Cyber Terrorism, and understanding how to safe guard all organization from these threats is vital. The Reason behind the Breaches WikiLeaks has released information that has damaged many reputations, including organizations and countries.…

    • 723 Words
    • 3 Pages
    Improved Essays