Sunday, 8 September 2013

SCL 2 Question 2

Question          : Discuss different types of threats and malicious program (malware) that can damage a computer, mobile device or disrupt any system.
Search for information on current known malware program. Based on the information that you have found, create a table to list different types of malware, what it does, and how it can be repaired or removed. This information is useful for you to prevent any malware from damage your computer system.
Malware
Malware is a short form of malicious software which used or programmed by attackers to disrupt a computer operation, gather sensitive information, or to gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Malware is a general term used to refer to a variety of forms of hostile or intrusive software. Below are stated the types of malwares, their function and prevention from them.

Types of Malware
Function
Countermeasures
Computer Virus
A malware when executed replicates by inserting copies of itself into other computer programs, data files, or the boot sector of hard drive. Perform some type of harmful activity on infected host.
Install an antivirus that can detect and eliminate known viruses when computer attempts to download or run an executable. Also operating system updated timely, careful Internet browsing and installation of trusted software.
Ransomware
A malware, known as crypto viral extortion, which restricts access to the computer system that it infects, and demands a ransom to paid to the creator of the malware in order for the restriction to be removed.
Keep all of the software on your computer up to date. Keep your firewall turned on. Don't open spam email messages or click links on suspicious websites.
Worms
A standalone malware that replicates itself in order to spread to other computers. Often uses a computer network to spread itself relying on security failures on the target computer to access it and cause some harm to the network
Operating system’s vendors will supply regular security updates. Users should be wary of opening unexpected email, not run attached files or programs, or visit suspicious web sites. Update regularly anti-virus or anti-spyware.
Trojan Horses
A hacking program, non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including backdoor.
Never run an executable file unless you are absolutely sure it comes from a trusted source. Security patches should always be downloaded directly from a vendor's website. Also, turn off computer when not used.
Root-kits
Stealthy malicious software, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer.
Apply security patches, implementing the principle of least privilege, reducing the attack surface and installing anti-virus software. Also routine monitoring is required.
Spyware
Software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer’s consent.
Install an anti-spyware program, which provide real-time protection, which scan all incoming network data for spyware and block the threats if detected.
Rogue Security Software
Fraud tool, a form of Internet fraud using a computer malware that deceives or misleads users into paying money for fake or simulated removal of malware, but instead introduces malware to the computer.
Law enforcement has exerted pressure on banks to shut down merchant gateways involved in processing rogue security software purchases.
 Copyright : Haziq Dines Wandi

No comments:

Post a Comment