Saturday, June 15, 2019

Malware and how it affects the system and the Victim also how it get Essay

Malware and how it affects the system and the Victim also how it get into a Victim machine - Essay Example parcel as rogue security software, spyware, worms, adware, dialers, Trojan, estimator computer virus and key loggers among others which normally appear in the form of active contents, codes as well as scripts (Klaus, 2013). However, it is worth noting that malwares are different from defective software in the regard that defective software may be legitimate software which would have had defective bugs before release and which were not corrected.Malwares get rise to power into a personal estimator system with a variety of ways, which include through an exchange of contaminated files, accessing contaminated online materials or even through legitimate download of corrupted software from the online stores. Attackers or the developers of these malware are known to attach the malware onto legitimate software online and as such, unsuspecting victims purchase the software except to have the harmful software get into their computer system. However, such malware as spyware spread through individual installation by visiting security holes or even though installation of corrupted programs from harmful websites.Ill intentions by hackers or malware developers lead to the design and programming of the harmful software in effectuate to access sensitive information from organizations or even private system. These software programs are used to steal sensitive financial, personal or even blood information, which is targeted by the hackers. Besides the use of malware to gather or steal important information from corporate systems, the malicious software is used to disrupt the operations of computer systems and as a result bring about much suffering to organizations or corporate. The software has been used in many instances to target government operations, deposit systems as well as corporate and private security systems for profit gains by the hackers (Reavis, 2012).T he working of the different malicious software differs from one type to another. Worms and virus are known to target executable

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.