Effects of Malware on a Machine

Document Type:Research Paper

Subject Area:Technology

Document 1

It's not possible to comprehend all the details on malware since multiple malware programs are vast and sophisticated as well. The most vital steps to mitigate online attacker’s identities against malware attacks is through education. It's essential to create awareness among internet consumers concerning malware attack and threats. And also educating them on how to operate the anti-malware tools appropriately. Introduction Malware is a software that is enacted into a system of information with the aim of causing harm or destabilizing the system to use it without the knowledge of the owner (BBC News online 2004). It also provides the automation needed to commit attacks on a previously incomprehensible scale. Malware is modular and multifunctional, several types of malware can be utilized as one or differently to obtain a malicious actor target.

Sign up to view the full document!

In order to adjust and change malware functionality and outcomes, recent features and more capabilities can be introduced to it (Computer Economics 2007). Malware can boost its functionality by entering and compromising the whole system and it can also adjust its performance by downloading several malware. It can utilize some features such as encryption to escape any detection and disguise its operation means. Any device that permits traffic to shift across the internet may become susceptible to malware attacks, for example, the rooters. Malware creates a broader range of cyber-attack, malware is performing several cyber-attacks and also supporting other malicious practices as well as cybercrime, for instance, phishing and spamming. On the other hand, both phishing and spam can be utilized to cause more distribution of malware.

Sign up to view the full document!

Types of Malicious malware Malware is a broad term that pertains all infection that affects a machine. There are eight major types of malware namely; virus, spyware, adware, fileless malware, ransomware, flame, trojans, and worms. Ransomware is a type of malicious malware which is designed to block computer system access till a certain amount of money is paid. Flame is another type of malware. Flame is a greatly complicated malware that is barely noticeable. This malware collect information via audio record, network traffic, Skype conversations, screenshots as well as keyboard activity. It is designed in a way that it has the capability of recording the keys that a user presses. Effects of malware Malicious malware such as the Trojan horses, Bot, drone Logic Bomb, worms, and viruses have severe impacts on a computer.

Sign up to view the full document!

There are various adverse effects on a machine that are as a result of malware infection attack. To begin with, malware infection results to slowing down of a device. It minimizes the performance and the speed at which the machine run. Individuals using their computers either to run their businesses or do their studies can be highly disadvantaged since they will have a slow run of their activities. There is no other alternative for this other than buying a new hard drive for the machine. The other key effect of malicious malware is file modification on the hard drive or any other media that is writable. Malware infection on a computer hard drive can be signified by the appearance of new or unknown applications, folders or files.

Sign up to view the full document!

This file modification which has been a frequent target may lead to either malfunction of the computer system, or the system can seize from functioning. Software modification as an effect of malware infection may lead to disabling of the firewall operating system or another operating system similar to this. The most dangerous malware is the flame. The Flame malware is barely noticeable. This malware collect information via audio record, network traffic, Skype conversations, screenshots as well as keyboard activity. This malware is designed in a way that it has the capability of recording the keys that a user presses. Through this, the designer of this malware is able to retrieve the keys that the individual has pressed and he or she can be able to access the bank accounts and email passwords.

Sign up to view the full document!

Globally, the number of hackers and spammers is rapidly increasing, and new measures are frequently developed, and therefore it becomes so difficult to identify them. In order to fight cyber attackers, users are recommended to apply and follow appropriate steps for instance installation of antimalware and firewalls. After doing this, users will be able to minimize cases of cyber-attacks. Reference A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS. (n. stm CSI/FBI Computer Crime and Security Survey | Request PDF. (n. d. Retrieved from https://www. researchgate. org/sti/40724457. pdf&p=DevEx. LB. 1&rd=1&h=9OlAZmRkFp8oHiNdFLA4ZaTn3l9fJE4tBQh87BtrCiA&v=1&r=http://www. oecd. Retrieved from http://techgenix. com/malwares-impact-serious-long-lasting/ 2007 Malware Report: The Economic Impact of Viruses. (n. d.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable