Answered You can hire a professional tutor to get the answer.

QUESTION

Write 1 page with APA style on How Malware Infects a Computer. Malware Malware Malware refers to malicious software that is used to disrupt the normal functioning and operations of a computer. The sof

Write 1 page with APA style on How Malware Infects a Computer. Malware Malware Malware refers to malicious software that is used to disrupt the normal functioning and operations of a computer. The software gathers sensitive information and gains access to private computers (Sikorski & Honig, 2012). Malwares can appear as scripts, codes or active content. Some of the most common malware include computer viruses, spyware, ransomware, scareware and adware. Most of the active malware threats are Trojans and worms (Bayuk, 2010). Some malware may be disguised as genuine software, which is supplied through official company website. Malware may also be supplied as an attractive or useful program. In this case, the malware is used to track and gather statistics and information.

Characteristics of Malware

Malware have the ability to run without being shutdown, detected or deleted. Malware such as Adware has a privacy invasive characteristic. In this case, the malware displays, plays and downloads advertisements automatically. Malware such as Backdoor have secure remote computer access characteristics. In this case, they can circumvent regular authentication processes (Aquilina, Casey & Malin, 2008).

How Malware Infects a Computer

Malware usually infect a computer through executable software. They target a system without the authorization or consent of a user. Running a software or system that is infected by a malware provides opportunities for the malware to spread. A malware needs a user to run an infected system or program in order to facilitate its spread to other executables (Dunham & Abu-Nimeh, 2009). For instance, the Valentine’s Day virus is spread when a user opens an email that has been infected with the virus (Skoudis & Zeltser, 2004). Users are usually compelled to open these emails because they have enticing messages. The aim of the virus was to spread in the computer and capture financial and personal information.

References

Aquilina, J. M., Casey, E., & Malin, C. H. (2008). Malware forensics: Investigating and analyzing malicious code. Burlington, MA: Syngress Pub.

Bayuk, J. L. (2010). CyberForensics: Understanding information security investigations. New York: Humana Press.

Dunham, K., & Abu-Nimeh, S. (2009). Mobile malware attacks and defense. Burlington, Mass: Syngress.

Sikorski, M., & Honig, A. (2012). Practical malware analysis: The hands-on guide to dissecting malicious software. San Francisco: No Starch Press.

Skoudis, E., & Zeltser, L. (2004). Malware: Fighting malicious code. Upper Saddle River, NJ: Prentice Hall PTR.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question