Access over 20 million homework & study documents
search

Computer Malwares Research Paper

Content type

User Generated

Subject

Computer Science

Type

Research Paper

Rating

Showing Page:
1/7
Running head: Computer security 1
Student Name
Course Name
Professor Name
Institution Name
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/7
Running head: Computer security 2
Computer Malwares
Introduction
Malware is a terminology use in representing numerous forms of malicious software’s
within our computers or phones. Any given software tenaciously designed for evil purpose can
thus be categorized as malware. The core objective of the malwares is to detriment purposefully
both the computing devices and the users, either in a direct or indirect manner. Malwares can be
categorized on the basis of how they behavior at a high level. Malwares such as worm, virus,
Trojan horse, key logger, dropper, scareware, spammer, backdoor, rootkit, spyware, adware,
ransomware, script and macro have been identified by business antivirus and cybersecurity dealers
(Christodorescu, 2005). Most of the malwares are a package of numerous dissimilar programs
intended to operate together to attain the aim of the hackers. An explicit example of the malware
discussed in this assignment is the Trojan horse malware, which cannot under self-replication.
Thus, the malware has to combine with worm malware to accomplish the spreading purpose.
Trojan horse malware.
The term Trojan horse is an eminent historic tale employed when Greeks constructed a
huge wooden horse in which they hide their soldiers inside for them to gain entree into the Troy
city. Likewise, in the sector of cyberspace, malicious pieces of codes can be a deceiver and thus
claim to be suitable and valid software package, while on a genuine ground it is a malware. Hence,
it can trick the users by falsifying the valid intention of the software. Thus, the term Trojan horse
malware. Trojan horse malwares lack the ability to replicate by itself unlike virus (Fuentes, 2010).
Once the malware has gain access and become active in your computer system, the hacker can
rightfully use and even remotely control your computer. Thus, the programs normally appear to
possess valuable or nonthreatening drive, but actually mask concealed malicious function (Liu,
2011). This malicious functionality consist of anything ranging from downloading illegal
documents to hacking other peoples’ computers. Currently, Trojan horse malware can sneak
bypass security fortifications install within our computers such as the firewall using the like
minded deception.
Similarly, while looking normal and happy, Trojan horse malware can be employed to
achieve specific aims such as; duping users or system administrators to install the Trojan horse
malware in the initial phase. Thus, the Trojan horse malware and the unsuspicious users serve as
the entry vessels for the mischievous software into the computer system. Once the malware has
enter into the system, it blend with the normal computer programs operating in machine system.
The Trojan horse malwares camouflage themselves in order to look as if they belong to the
computer system so user and administrator merrily continue their normal activities, unmindful of
the presence of mischievous code. Trojan horse malwares are thus self contained programs unlike
computer viruses that attach themselves to other system programs (Milletary, 2012). The malware
can be included in software which one download at a free cost or email attachment message
without knowing it’s a harmful code.
Computer hackers have developed a numberless ways to hide malicious ability within their
wares inside your computer system. These numerous methods consist of using simple but greatly
effective naming game, employing executable wrapper, hacking software sites of distribution,
manipulation of source codes, coopting of installed software in your computer system and lastly,
disguising items employing polymorphic techniques for coding.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/7

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 7 pages?
Access Now

Unformatted Attachment Preview

Running head: Computer security Student Name Course Name Professor Name Institution Name Date 1 Running head: Computer security 2 Computer Malwares Introduction Malware is a terminology use in representing numerous forms of malicious software’s within our computers or phones. Any given software tenaciously designed for evil purpose can thus be categorized as malware. The core objective of the malwares is to detriment purposefully both the computing devices and the users, either in a direct or indirect manner. Malwares can be categorized on the basis of how they behavior at a high level. Malwares such as worm, virus, Trojan horse, key logger, dropper, scareware, spammer, backdoor, rootkit, spyware, adware, ransomware, script and macro have been identified by business antivirus and cybersecurity dealers (Christodorescu, 2005). Most of the malwares are a package of numerous dissimilar programs intended to operate together to attain the aim of the hackers. An explicit example of the malware discussed in this assignment is the Trojan horse malware, which cannot under self-replication. Thus, the malware has to combine with worm malware to accomplish the spreading purpose. Trojan horse malware. The term Trojan horse is an eminent historic tale employed when Greeks constructed a huge wooden horse in which they hide their soldiers inside for them to gain entree into the Troy city. Likewise, in the sector of cyberspace, malicious pieces of codes can be a deceiver and thus claim ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Just the thing I needed, saved me a lot of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4