Free Essay

Malicious Code

In:

Submitted By morganr
Words 490
Pages 2
Running head: MALICIOUS CODE

Malicious Code
Randy W. Morgan, Sr.
CIS Management of Information Systems

Malicious Code

This research paper attempts to explain the methodologies used in the creation of viruses, the frequency of their development, and the skill level required in creating this code. Although we live in a society that presents various malicious threats that includes virus, worms, Trojan programs, and logic bombs, the focus of this paper will concentrate on the comparison of viruses and worms. I will also examine the question as to weather of not non-Microsoft operating systems as less prone to virus threats.
Malicious code threats are primarily programmed to create havoc or major problems within the computing and networking environment. Exploitation of internet based services and applications are probably the hardest hit because of the increase in everyday usage and the unfamiliarity of threat countermeasures of many users.
Virus and other malicious are created only to create problems; nothing more. There are various levels that indicate the proficiency in developing or writing the program for viruses. These levels range from low skilled students to program researchers who have acquired many years of experience in developing their programming skills. The researchers are the group that introduces highly complex and sometimes anti-virus resistant code into computing/networking systems.
Although they differ, most users do not distinguish virus and worms; the term virus is simply used by some as a catch-all for both threats. A virus is basically a self-replicating program that causes damage by attaching itself to files. Normally, A virus is spread to various computers through human actions, particularly files sharing and email. Worms are similar to virus in some respect but they are more sophisticated in nature. Worms are often referred to as “bots” because of their robotic characteristics. Although they resemble virus, they have at least 1 major characteristic that set them apart; once a worm infects a system it has the ability to move throughout a network without human assistance. ("Computer Virus vs. Computer Worm.")
Microsoft operating systems (OS) and its components appear to be more prone to malicious threats than other operating systems. ("Security Response." Vulnerabilities). During the 80’s various operating systems were exploited by viruses, however today most threats are concentrated on Microsoft OS because it is the most commonly used OS in today’s market. The United States Computer Emergency Readiness Team (US-CERT) identified Microsoft product vulnerable to various threat. Their report does not show any additional OS other than Microsoft’s as being vulnerable. ("Alerts." US-CERT).

"Computer Virus vs. Computer Worm." - Difference and Comparison. N.p., n.d. Web. 28 Oct. 2012. <http://www.diffen.com/difference/Computer_Virus_vs_Computer_Worm>.

"Security Response." Vulnerabilities. N.p., n.d. Web. 28 Oct. 2012. <http://www.symantec.com/security_response/landing/vulnerabilities.jsp>.
"Alerts." US-CERT -. N.p., n.d. Web. 28 Oct. 2012. <http://www.us-cert.gov/cas/techalerts/index.html>.

Similar Documents

Premium Essay

Malicious Code Attack

...Karen Barber ITM – 5600 – Information and Communications Security Assignment: Summary Report on a Malicious Code Attack Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a computer or system without the owner’s knowledge or consent. Upon entering the system, there are much exploitation of vulnerabilities, like viruses, worms, Trojan horses, spyware, adware, and rootkits. Malicious code is an application security threat that cannot be efficiently controlled by conventional antivirus software alone. Malicious code can either activate itself or activate after a user perform an action, such as clicking on something or opening an email attachment. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content. The Spamhaus Project is a cyber attack that is described as the largest in history apparently starting over an argument over spam. The prolonged denial-of-service assault is targeting The Spamhaus Project; a nonprofit European filtering service that helps organizations to fight spam by weeding out unwanted emails has gone after CyberBunker, a Dutch data-storage company that offers hosting to any websites/content "except child porn and anything related to terrorism." On March 18, 2013, Spamhaus added CyberBunker (whose servers shows “cb3rob...

Words: 728 - Pages: 3

Premium Essay

Malicious Code Attack

...Week 4: Essay 4.1 Malicious Code Attack Harold Streat Jr (15813476) NT2580: Introduction to Information Security March 2, 2014 DeVon Carter Malicious Code Attack The Code Red virus didn't kill the Internet, but it did prove that there is a long way to go in the war against cyber-attacks, and, if the future is anything like the past, it is a war the good guys will never win (Burnett & Gomez, 2001). The Code Red worm is one example where knowledge of emerging vulnerabilities and implementation of security patches plus overall watchfulness of network activity could have saved many systems from falling prey to a well-publicized attack (Burnett & Gomez, 2001). The Code Red or Red Wiggler Worm, as it was known, was a self-replicating program designed to consume computer and network resources creating a Denial of Service (DoS) to the user community. The Code Red worm exploited a known vulnerability in Microsoft Windows NT and Windows 2000, popular operating systems in the business environment. The vulnerability was related to Internet Information Server (IIS), which runs on many Windows-based World Wide Web servers throughout the world. Code Red spread through several variants with mixed effectiveness. As the worm code was mutated, updated and re-released, infection rates increased (Burnett & Gomez, 2001). The worm began by scanning networks to identify hosts running IIS and accepting information on TCP port 80....

Words: 520 - Pages: 3

Premium Essay

Malicious Code Attack

...A Trojan horse (also known as a Trojan) is one of several kinds of malware you might find on your computer after a successful virus attack. Trojans are a particularly sneaky kind of malware because they look harmless or even beneficial and trick you into installing them on your system. Trojans fall into the category of “social engineering” attacks because they trick people. Trojans are typically used by cybercriminals for online fraud and theft. Antivirus software and anti-malware help protect you by keeping Trojans off your computer system by recognizing that they’re actually malware. But don’t rely on antivirus software alone. It is called a Trojan horse because the Greeks won the Trojan War by building a hollow horse, filling it with soldiers and leaving it for the Trojans, supposedly as a gift. A Trojan priest was suspicious of the “gift” and said to “beware of Greeks bearing gifts” but the Trojans ignored him and brought the horse through the gates into the city. Later, when the Trojans were asleep the Greek soldiers jumped out, captured the city and burned it to the ground. And so the “Trojan horse” came about. In the world of viruses and malware, cybercriminals create viruses or malware that look harmless or useful but actually aren’t. Just like the Trojan horse, it’s really hiding something that’s meant to attack you once it’s inside your system. Antivirus and security software helps protects you by looking inside the “horse” to see what’s really there. And if your...

Words: 411 - Pages: 2

Premium Essay

Data Breaches

...the future of data breaches this year and things that we could encounter over the time frame of this year and next decade as technology continues to grow at the rate it is growing. It compare the big breach with Target and aligns it to other situations that are possibilities with the way we use our technology. One of the big theories that the article through out was that we are going to run into issues with all of this cloud computing and big data and that society is very vulnerable to a big data cloud breach. Apple has started the whole ball rolling with cloud computing storing all of your data on a cloud platform easily accessible by all of your devices. The only problem is that it too is easily accessible to other things such as malicious people. Another possible breach that the article discusses is that healthcare is slowly being stored via a cloud platform as well and there are potential ways that a breach of that information could be a reality soon and one day. Results...

Words: 681 - Pages: 3

Free Essay

Ecss Practice Exams

...| | |The most damaging of the denial of service attacks can be a _______________ attacks, where an attacker uses zombie software distributed | |over several machines | | | | | |[pic] | |Bot | | | | | |[pic] | |Distributed denial of service ...

Words: 2882 - Pages: 12

Free Essay

Someones Paper

...Identify the main threats to the security of people, property and premises in a chosen public service People, premises and property: There are many threats to people, premises and property. This distinguishes from accidentally induced threats where there is no deliberate malicious intent to induce damage Whilst all threats aim to cause damage to people, premises or property the type of damage varies. Therefore it is important to understand the objectives of the individual/individuals responsible for inducing the threat. Often this will be done through a terror campaign aimed at causing as much fear as possible. However whilst often indiscriminate there will likely be a particular target it is unlikely that an act terrorism is random, it is more likely strategic as part of a campaign. Therefore for many countries that are at threat from terrorism they have to take into account for many building the threat from terrorism. Therefore it is important to understand the possible objectives behind each threat as they often determine the nature of the threat and its scale Tactics and targets: There are a multitude of different tactics that can be employed to escalate or more precisely use a threat. The sort of threat it is also determines the tactics that will be used. Of course he target itself is determined by who is doing it and the objectives they have, a group anarchists and a group of environmentalist will not have the same target. Therefore all threats to people, premises...

Words: 255 - Pages: 2

Premium Essay

Csec630 Lab 2

...Lab 2 – CSEC630 1. When running Snort IDS why might there be no alerts? When using Snort IDS, there are several modes that if configured properly, will generate alerts. Alerts are set by the user within the command prompt when initiating a rule set. There are five alerting options available with Snort IDS. According to (Roesch, 1999), Alerts may either be sent to syslog, logged to an alert text file in two different formats, or sent as Win-Popup messages using the Samba smbclient program. If there has been no alerts, the selected rule set was set may not have been enabled by the user. Another scenario where alerts may not occur is when another task is being performed. According to (Roesch, 1999) when alerting is unnecessary or inappropriate, such as when network penetrations tests are being performed. 2. If we only went to a few web sites, why are there so many alerts? Snort IDS performs numerous functions that would generate an alert. Alerts are generated based on any suspicious network activity. Although a user may have only visited 5 sites, snort may have generated 12 or more alerts that were generated due to anomalies detected from the 5 sites visited. 3. What are the advantages of logging more information to the alerts file? The advantage of logging additional information within the alerts file is that it can provide additional information as to the origination or source of what caused the alert. If the administrator is better informed on the...

Words: 1119 - Pages: 5

Free Essay

This Is Wonderful

...Consumer Information FCC Notice This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If interference generated by this unit is suspected, call Brink’s Customer Care at 1-800-445-0872. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: ♦ Re-orient the radio/television antenna; ♦ Move the television or receiver away from the unit. ♦ Plug the unit and the TV/radio receiver into different outlets, i.e. not on the same circuit breaker. ♦ Contact Brinks Home Security or an experienced TV/Radio technician for additional suggestions. ♦ Review additional instructions on www.mybrinks.com. This equipment complies with FCC Rules, Part 68. On the outside of this equipment is a label that contains, among other information, the FCC Registration Number and Ringer Equivalence Number (REN) for this equipment. If requested...

Words: 10912 - Pages: 44

Free Essay

Content Analysis

...collected. * Many respondents presented more than one thought or feeling. In some cases they described a sentence to capture the imagery in the pictures. * In such cases all individual thoughts and feelings were captured for coding process * Coding Scheme: - The coding scheme that was obtained is as below (in alphabetical order). Please observe the ads you would find how the below codes were developed. SNo | Code | 1 | Adventure sports | 2 | Business | 3 | Celebrity testimonial | 4 | Dance | 5 | Do’s and Don’ts | 6 | Fashion | 7 | Food | 8 | Festivales | 9 | Food | 10 | Handicrafts | 11 | History | 12 | Hospitality | 13 | Nature | 14 | Natural Landscape | 15 | Monuments | 16 | Music | 17 | People | 18 | Public Awareness | 19 | Religion | 20 | Shopping | 21 | Spirituality | 22 | Sports | 23 | Wellness | 24 | Wildfire | * Theme generation: - Seven themes were identified based on the coding schemes. The list of themes are as below Sno | Code | Theme | No of Ads | 1 | Fashion | Culture(that broadly describes the codes presented in previous column. | 15 | 2 | Festivals | | | 3 | Dance | | | 4 | Food | | | 5 | Handicrafts | | | 6 | Hospitality | | | 7 | Music | | | 8 | People | | | 9 | Religion | | | | | Flora | 9 | 10 | Nature | | | 11 | Natural Landscape | | | 12 | Wildlife | | | | | | | 13...

Words: 294 - Pages: 2

Premium Essay

Case Study: How ICD-10 Impacts Healthcare

...The World Health Organization established the International Classification of Diseases (ICD) to standardize medical records. ICD-10 is an update that reflects changing needs in medicine. The code offers increased detail and flexibility. However, implementing the code presents medical establishments with several challenges. The biggest challenge is finding common ground between the two frameworks. How ICD-10 Impacts Healthcare A presentation published by the Centers for Medicare and Medicaid Services explains that the World Health Organization created ICD-9 in 1979 to reflect current medical advances and establish universal coding procedures. [1] The system outlines the diagnoses, procedures and terminology used by caregivers. Medical organizations...

Words: 937 - Pages: 4

Premium Essay

Unit 9 Vs Icd-9

... ICD-9 has approximately 13,000 codes that are V.S. ICD-10 has about 68,000 codes and are 3 3 to 5 digits. to 7 digits long. ICD-9 first digit is either E or V or numeric ICD-10 first digit is alpha; 2nd and 3rd are numeric; 4th thru 7th are either ICD-9 lacks detail...

Words: 720 - Pages: 3

Premium Essay

Hsc300 Unit 3 Assignment

...Shelly reviewed the updates made to the Carrier Form Codes. • The Carrier Services and Agent Reporting Agreement were updated effective June 15, 2015 to allow the settlement of carrier form codes. • Based on carrier request and ARC approval, ARC will update our form code table in alignment with the carrier’s form code range to prevent transaction errors and duplicate usage in IAR. • Testing may need to be performed. • Carriers should initiate their requests through ARC’s Carrier Help Desk or Shelly Younger. The preference would be to begin with Shelly Younger. • ORION is a multi-year project which will modernize the current settlement system. Work will occur in five phases. • Phase I – Foundation for Travel Agency, Carrier and Credit...

Words: 578 - Pages: 3

Free Essay

Environmental Scie

...“Environmental Sci-Math Camp” (February 16, 2013) Theme: “Utilizing our Scientific and Mathematical Competencies for an Environment-Friendly Community” Registration:……………………………………………………………………………… 6:00-7:00 Program:……………………………………………………………………………………. 7:00-8:00 * Prayer Lester Marcaida * National Anthem Remo De3lovino and Jeffrey Lonceras * Exercise (Bear Dance) SAST,YES-O, and Math Club * Yell Campers * Opening Remarks Mr. Casipit and Mrs. Rossel Garcia. Flag, Poster and Slogan Making:………………………………………………….. 8:00-9:00 * 1 participant/group Ice Breaker:………………………………………………………………………………… 9:00-9:30 * Rubber Band/Head Count Scrapped Art and Logo Making:…………………………………………………. 9:30-10:30 * 1 participant/group Word Puzzle, Rubik’s Cube, Sudoku:……………………………………….. 10:30-12:00 * 1 participant/group Tagis Talino:…………………………………………………………………………… 10:30-12:00 * 4 participant/group Lunch (Command Bracelet and Trivia):……………………………………….12:00-1:00 Ice Breaker:………………………………………………………………………………….1:00-1;30 * Ingatan si Mother Egg/Head Count Obstacle Race:………………………………………………………………………………1:30-2:30 Energizer:……………………………………………………………………………………...

Words: 850 - Pages: 4

Free Essay

Piramid of Giza

... Strayer University Code of conduct in a business is extremely important. It sets boundaries in a work environment that keeps ethical behavior regulated. The Cheesecake Factory is one organization that has a code of conduct in place that is detrimental to the success of its business. Some of those key aspects are Compliance with the law, Non-Solicitation and Non-Raid and Non-Disparage Issues. These codes that are put in place uphold ethical behavior and also protects the organization itself. Compliance with the law is extremely important. This code states: “We expect staff members to comply with all applicable federal, state and local laws,regulations, rules and regulatory orders at all times. Neither a supervisor nor any other staffmember has the authority to direct another staff member to break any law or to conducthim/herself in a manner that is counter to the Code of Ethics”. The Cheesecake factory put this code in effect to make sure that their employees hold up their duties as law abiding citizens. In this they also stated that they do not tolerate sexual harraasement or drugs, which is very important now a days with everything going on. This should and I’m sure it is a basic code of conduct whether it be a business or a school. When we are jobs giving service to the world we must keep in mind that our responsibilities to law and order do not change. The Non-Solicitation code of conduct ensures that customers have a comfortable no...

Words: 981 - Pages: 4

Premium Essay

?? Yu Su

...window.NREUM||(NREUM={});NREUM.info = {"beacon":"bam.nr-data.net","errorBeacon":"bam.nr-data.net","licenseKey":"5c680aaa66","applicationID":"3969032","transactionName":"YFVaZEpRXURTARYKXVkffF9MflZDcQ0MF0BYXFRVSh9gXkYHTTBbQ1V8VUxRWltB","queueTime":0,"applicationTime":22,"ttGuid":"929511F7D923232","agent":"js-agent.newrelic.com/nr-768.min.js"}window.NREUM||(NREUM={}),__nr_require=function(e,n,t){function r(t){if(!n[t]){var o=n[t]={exports:{}};e[t][0].call(o.exports,function(n){var o=e[t][1][n];return r(o||n)},o,o.exports)}return n[t].exports}if("function"==typeof __nr_require)return __nr_require;for(var o=0;op;p++)u[p].apply(s,t);return s}function a(e,n){f[e]=c(e).concat(n)}function c(e){return f[e]||[]}function u(){return t(n)}var f={};return{on:a,emit:n,create:u,listeners:c,_events:f}}function r(){return{}}var o="nr@context",i=e("gos");n.exports=t()},{gos:"7eSDFh"}],ee:[function(e,n){n.exports=e("QJf3ax")},{}],3:[function(e,n){function t(e){return function(){r(e,[(new Date).getTime()].concat(i(arguments)))}}var r=e("handle"),o=e(1),i=e(2);"undefined"==typeof window.newrelic&&(newrelic=window.NREUM);var a=["setPageViewName","addPageAction","setCustomAttribute","finished","addToTrace","inlineHit","noticeError"];o(a,function(e,n){window.NREUM[n]=t("api-"+n)}),n.exports=window.NREUM},{1:12,2:13,handle:"D5DuLP"}],gos:[function(e,n){n.exports=e("7eSDFh")},{}],"7eSDFh":[function(e,n){function t(e,n,t){if(r.call(e,n))return e[n];var o=t();if(Object.defineProperty&&Object.keys)try{return...

Words: 1521 - Pages: 7