How Malware Infects a Computer

Write 1 page with APA style on How Malware Infects a Computer. Malware Malware Malware refers to malicious software that is used to disrupt the normal functioning and operations of a computer. The software gathers sensitive information and gains access to private computers (Sikorski & Honig, 2012). Malwares can appear as scripts, codes or active content. Some of the most common malware include computer viruses, spyware, ransomware, scareware and adware. Most of the active malware threats are Trojans and worms (Bayuk, 2010). Some malware may be disguised as genuine software, which is supplied through official company website. Malware may also be supplied as an attractive or useful program. In this case, the malware is used to track and gather statistics and information.

Characteristics of Malware

Don't use plagiarized sources. Get Your Custom Essay on
How Malware Infects a Computer
Just from $13/Page
Order Essay

Malware have the ability to run without being shutdown, detected or deleted. Malware such as Adware has a privacy invasive characteristic. In this case, the malware displays, plays and downloads advertisements automatically. Malware such as Backdoor have secure remote computer access characteristics. In this case, they can circumvent regular authentication processes (Aquilina, Casey & Malin, 2008).

How Malware Infects a Computer

Malware usually infect a computer through executable software. They target a system without the authorization or consent of a user. Running a software or system that is infected by a malware provides opportunities for the malware to spread. A malware needs a user to run an infected system or program in order to facilitate its spread to other executables (Dunham & Abu-Nimeh, 2009). For instance, the Valentine’s Day virus is spread when a user opens an email that has been infected with the virus (Skoudis & Zeltser, 2004). Users are usually compelled to open these emails because they have enticing messages. The aim of the virus was to spread in the computer and capture financial and personal information.

References

Aquilina, J. M., Casey, E., & Malin, C. H. (2008). Malware forensics: Investigating and analyzing malicious code. Burlington, MA: Syngress Pub.

Bayuk, J. L. (2010). CyberForensics: Understanding information security investigations. New York: Humana Press.

Dunham, K., & Abu-Nimeh, S. (2009). Mobile malware attacks and defense. Burlington, Mass: Syngress.

Sikorski, M., & Honig, A. (2012). Practical malware analysis: The hands-on guide to dissecting malicious software. San Francisco: No Starch Press.

Skoudis, E., & Zeltser, L. (2004). Malware: Fighting malicious code. Upper Saddle River, NJ: Prentice Hall PTR.

Order your essay today and save 20% with the discount code: GREEN

Order a unique copy of this paper

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
Top Academic Writers Ready to Help
with Your Research Proposal
error: Content is protected !!
Live Chat+1(978) 822-0999EmailWhatsApp

Order your essay today and save 20% with the discount code GREEN