Saturday, May 4, 2019

Malware and how it affects the system and the Victim also how it get Essay

Malw be and how it affects the system and the victim also how it get into a Victim machine - Essay Example package as rogue security software, spyware, worms, adware, dialers, Trojan, computer virus and key loggers among others which normally appear in the form of active contents, codes as well as scripts (Klaus, 2013). However, it is worth noning that malwares are different from defective software in the regard that defective software may be legitimate software which would have had defective bugs before release and which were not corrected.Malwares get access into a personal computer system through a variety of ways, which embroil through an exchange of contaminated files, accessing contaminated online materials or even through legitimate download of devalued software from the online stores. Attackers or the developers of these malware are known to attach the malware onto legitimate software online and as such, unsuspecting victims leveraging the software only to have the har mful software get into their computer system. However, such malware as spyware transmit through individual installation by visiting security holes or even though installation of corrupted programs from harmful websites.Ill intentions by hackers or malware developers lead to the design and programming of the harmful software in order to access sensitive information from organizations or even private system. These software programs are subprogramd to steal sensitive financial, personal or even business information, which is targeted by the hackers. Besides the use of malware to gather or steal important information from corporate systems, the malicious software is used to collapse the operations of computer systems and as a result bring about much suffering to organizations or corporate. The software has been used in many instances to target government operations, bank systems as well as corporate and private security systems for profit gains by the hackers (Reavis, 2012).The work ing of the different malicious software differs from unmatched type to another. Worms and virus are known to target executable

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.