(KIM_WIZARD)

Running Head: MALWARE 0

Malware

Name

Institution

Course

Date

Malware Attacks

Potential Malicious Attracts Against the Network Organization

In the world of technology, everything can just happen. Information can pass from one region to another with ease meaning that everything has been simplified. However, the information technology has also been affected by a few challenges that seem to recur from time to time. They include;

Trojan horse virus- Typically, a computer virus has been a challenge for most organizations, but the most common especially in such a company is the Trojan horse virus. The virus is not self-replicating like the majority of others, but it has terrible consequences if it affects the network server of an organization (Durairajan, Saravanan, & Chakkaravarthy, 2016). Apparently, the virus is used by hackers to get access to data from a specified user illegally. With the installation of the video game, other competitor servers can access such kind of data and reproduce a copy even before the initially programmed game gets into the market.

Effects of Trojan horse virus

The data within a user’s computer can be deleted or be modified by the hacker. With new businesses cropping out day in day out, the problem may affect the video game company. A hacker may eliminate valuable data from the program and install a fake one which will, in turn, nullify the whole project. The virus can also be used to steal valuable information from a company that is supposed to be classified.

Computer worms- The worst thing about computer worms is that they are self-replicating. Apparently, they utilize the space in the computer network and dispatch it there where they replicate. The copies of the worms are multiplied and therefore displace the data that was there. Additionally, computer worms don’t need to be attached to the case of Trojan horse virus, but they develop from the network of equipment bit by bit (Anwar, Bakhtiari, Zainal, Abdullah, & Qureshi, 2015). The video game is a program that is used by a lot of people, and there is a high possibility that some computer worms begin to develop slowly.

Impact of computer worms

One of the major troubles with the computer worms is that they replicate themselves on the host server and hence, eliminate valuable files. They apparently take the place of a file which will automatically cause a breakdown in the network system of a company. For instance, the video game has been programmed and is made of various files. If a computer worm takes the place of one of the critical files, it would be nearly impossible for the program to function normally.

Blended threat-The case happens when both the Trojan horse and the computer worms all attack at the same time. The attack by both can have very grave consequences as they require no human efforts. Apparently, the threat uses the internet vulnerabilities and the user to initiate and spread an attack within the system. Importantly, the attack is always in multiple forms, for example, creating problems from the email server and also the file sharing set up.

Effects of blended threat

If not controlled, the threat can cause a computer to crash.

Control Measures of the Malware

It can be difficult to control a problem that is even not visible, but it is only the effects of the problem that are felt. One of the major control measures is to create a strategic diagram. The diagram will clearly illustrate some of the key packet flows that will be very useful to the user as far as putting security mechanisms are concerned. Now, when the security mechanisms are put in place on the strategic diagrams, possible threats are detected and dealt with at the initial stages. Another control measure would be to attain a network visibility program. The malware cannot be seen, and it’s only a visible network control system that can detect them. The system can be complicated as it also requires experts trained specifically to deal with malware.

Potential Concerns for Data Theft and Data Loss

The rise of Cloud computing- cloud computing mainly focuses on the efforts to reduce the cost meant for IT infrastructure and other related application. The video game company is likely to use the program as it would also be interested in reducing the costs while maximizing the profits. With such efforts, the servers of the organizations are exposed to the net, and in one way or another, the data may also be affected.

Effects

The cloud computing will bring a risk to the risk to the non-regulatory compliance. It means that anyone can access the information of the company and tamper with it. Such tricks may cause deletion of the available data.

Unauthorized application use- it happens especially when there are new employees within the firm. Typically, some may not be aware of the security protocols that a company may be putting in place. Essentially, the company may install other unauthorized programs that at times may interfere with the initial set up and thus cause some data to disappear.

Effects

The installed application may interfere with other valuable programs that hold the video game together. A video game is a program that should run without interference under the control of the user. However, with some application in use, the video program may translate into something else or even generate come malware that would, in turn, affect the entire server. The company is also likely to lose a portion of the market share.

Loss of physical asset- a certain program may be stored in a laptop which is usually the case. If the laptop is accidentally lost, the data within the laptop is also lost. It can accidentally get to the long hands which may lead to the alteration or misuse of that data. If the video program files are stored in a computer, and by accident, the computer gets lost, the company would have no access to the files, and any claim of ownership would be a waste of time if they did not have backup files.

Effects

The major effect is the loss of valuable data within the company which may be misused if it falls into the wrong hands. There may also be significant losses concerning finances that may affect the business.

Control for Data Loss and Data Theft

One of the measures of controlling data loss and theft would be to put in place standard codes for all the employees. Apparently, the corporate security mainly starts with them, and they should beware of what to do and with what. With many employees, some may be denied access to some information of the company that requires protection (Cobb, Sudar, Reiter, Anderson, Roesner, & Kohno, 2016). The standard codes are meant to ensure that the enterprise data is safeguarded like any other asset within the enterprise. Another way would be to create awareness to all the employees. Training programs should be put in place to educate all the staff on the care for the available data and how it should be protected.

References

Anwar, R. W., Bakhtiari, M., Zainal, A., Abdullah, A. H., & Qureshi, K. N. (2015). Enhanced trust aware routing against wormhole attacks in wireless sensor networks. In Smart Sensors and Application (ICSSA), , 56-59.

Cobb, C., Sudar, S., Reiter, N., Anderson, R., Roesner, F., & Kohno, T. (2016). Computer Security for Data Collection Technologies. In Proceedings of the Eighth International Conference on Information and Communication Technologies and Development , 2.

Durairajan, M. S., Saravanan, R., & Chakkaravarthy, S. S. (2016). Low Interaction Honeypot: A Defense Against Cyber Attacks. Journal of Computational and Theoretical Nanoscience, 13(8), , 5446-5453.