Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

please answer this question Types of Malware and viruses in today\'s world there

ID: 3740297 • Letter: P

Question

please answer this question

Types of Malware and viruses in today's world there are a number of major malware, viruses and bugs that are commonly used to infiltrate Internet applications, social engineering and computer networks. List and explain the different malwares and look at what they are, how they work and what tools are available to counter this kind of activities.

When a key-management product or technique is selected for an organization. The ground work expects you to know the advantages and disadvantages of each method. You need to write about any Three Key management techniques and also comment on upfront cost, ongoing cost for maintenance and administration cost.

Explanation / Answer

Malware is short for malicious software, This are basically software programs which cause harm to a system by doing something which a regular uses will not want. Like stealing passwords, corrupting data, erasing memory etc.

Different types of malware

a) ADWARE

  It is short for (advertising-supported software). This are the ones which delivers advertisements automatically. Common examples are websites where just after landing you will face ads. This ads are harmless but they can be harmful then adware causes too much trouble.

Counter: Most bundled with free software, so avoid free software.

b) BOT

  Software programs created to automatically perform specific operations. Chat bots are example of messaging bots. Similarly harmful bots can be created which does malicious jobs.

Counter: Most automated response systems uses bots. So key idea to detect is the bot replying or human. Also identify what intetion is there behind the communication.

C) Bug

Mainly are human error in code, but can also be deliberate to produce unwanted effects in the code.

Counter: Bugs can be prevented with developer education, quality control, and code analysis tools.

D) Ransomware

  This malware restricts user access to the computer either by encrypting files on the hard drive or locking down the system. To get access they force the user to pay the malware creator to remove the restrictions. Commonly found with downloaded files. So download wisely.

Counter: Download wisely

E) Spyware

  Spying user activity without his/her permission. Capabilities can include activity monitoring, collecting keystrokes, data harvesting, hence can get access to password.

Counter: Same as adware

F) Trojan Horse

  Disguises as normal file and make users to download/install malware.

Counter: Check for authenticity of files before install.

G) Virus

Capable of replicating itself. So after sometimes it can hang a system and destroy data.

Key Management Techniques:

Although all of the above needs continuous monitoring and good quality programs to check for vulnerability (ex anti-virus) etc.

1) Using anti-virus and firewall softwares to prevent and continuously check for malware. Cost is buying original software from firms.

2) Keep software and operating systems up to date with current vulnerability patches. Check for recent advancements and update systems. Cost is periodically to update the software.

3) Being wise and diligient and using authentic sources. So accessing anything needs proper research.