QUICK DISCUSSION & RESPONSE ACTIVITY
QUICKDISCUSSION & RESPONSE ACTIVITY
Directions: (PART 1)(PROVIDE SOURCES AT END, ONLY 1-2 SOURCES IS NEEDED)
What is Malware? and the impactof malicious code and malware on systems and organizations. Please explain itin two-three paragraphs with 1-2 valid references.
Directions: (PART 2)(There are 2 responses to respond back to)
Respond to these separateresponses with 2-3 sentences each response.
1st Response: Malwareis code that is written with intention of doing something that is notlegitimate. It can have many different attributes depending on what it isdesigned to accomplish. Trojans are programs that appear to have legitimatepurposes that have a hidden file that has a hidden agenda. Trojans can be usedto collect information that compromises the confidentiality. Spyware I alsomalicious code that can be used to collect private or personal information. Itcan gather details that from cookies. Adware is also considered malicious code,but it is not as bad as Spyware because it collects information and uses it formarketing of your online shopping behavior. So, when you us the word malware itis a pretty broad term. It includes viruses that are malicious programsdesigned to do something that could damage or compromise your computingsystems. Rootkits are on such virus that comes to mind. This program does harmthe part of the operating system. They can exist from the boot up area to theapplication that run of the system. They are not easy to detect, and they nowhave some that can be written into BIOS which means they are very hard to findand remediate. Ransomware is very dangerous to everyone. These malware threatshave economic impact. It uses encryption to lock your data. This is a criminaltool to extort finances. Spam is the most annoying by product of malware. Itaccounts for most messages. It throttles bandwidth which comes at a cost forall businesses. In my opinion Spam is modern day junk mail that clutters up ourInternet. In Closing, I only spoke of few items, but I tried to touch a fewareas to make this write up show what areas are touched in totality. You canwrite a book on this because the list of threats grows daily, but what is mostimportant is that you have to patch your systems as needed. You also have toupdate antivirus and malware signatures. The impact on systems is that they areconstantly under attack. The Rootkits are in my opinion one of the biggestthreats to operating systems. You need a layered approach on a network tosignificantly reduce the threats of attack. Businesses have to protect theirintellectual information, customer information as well as preserving theirimage. This would be a full time job for an entire IT staff that never ends.
2nd Response: Whatis malware? technically it is short for malicious software. But the question is,what is its purpose? the main purpose of malicious software is to attack asystem in one way or the other, since there are many different types ofmalicious software, and each type has a function itself. It is important tomention that malicious software is often undetected and also it is hard tocombat it just by using an antivirus. Malware attacks and violates the threemain information security properties (Confidentiality, Integrity, andAvailability). As I mentioned earlier in my discussion, there are manydifferent types of malwares available to attack a system, therefore, asmentioned by the author “You must make yourself aware of the kind ofmalicious code threats you may encounter (Kim, et. all. pp, 356)”. Theauthor explains that by understanding which malware you are being presented,and are asked to combat, you will know the correct counter measurements to takein order to fight it. This leads us to our second question which is, How doesmalware impact systems and organizations? To begin with, we must understandthat malware can come from different sources. Some of the ways that malware canimpact businesses are as follow: Attacks against confidentiality and privacy,Attacks against data integrity, Attacks against availability of services and resources,attacks against productivity and performance, attacks that create legalliability attacks that damage reputation. All of these can occur in fourdifferent types of attacks which are: unstructured attacks, structured attacks,direct attacks, and indirect attacks. it is very important for organizations tomitigate and evade attacks as much as possible.
NOTE: PLEASE RESPOND SEPARATELYTO THESE 2 DIFFERENT RESPONSES! THANK YOU!
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
