This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
War

Malware

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

 

Malware

Introduction

According to Gierszewski (2016), malware is developed to damage a computer, client, computer network, or serve. The same author noted that different types of malware exist. Some of the commonly used malware include worms, Trojan horses, spyware, ransomware, scareware, and rogue software. In most cases, the malware developers lock the system and demands for a pay to unlock it. According to Rani & Dhindsa (2020) some malware developers corrupts the system despite the payment. The paper will discuss the techniques used by malware developers to disguise their code and prevention measure.

Prevention of Malware

Different organizations have employed malware developers to come up techniques that are essential in stopping malware from unauthorized sources. The first technique is development of good antivirus software. According to it is essential for organizations to pre-install the software that can detect presence of malware prior invasion. According to Gierszewski (2016) the antivirus is vital as it restricts any entry of unauthorized software to the device. The antivirus is in a position to kill any malware that tries to gain access.

The second technique to overcome the malware is the implementation of social engineering. The social engineering involves sending fake emails to clients that are aimed at getting access to personal. For example, cybercriminals in Japan used home delivery services to spread Trojan spyware through CDs. Institutions such as banks can use the social engineering to detect the malware that can be used by suspicious malware developers. The third technique that can be used is ensuring that an organization discards any message that has high chance of carrying a malware. The cybercrime security officers in different organizations should be in a position to identify the keywords used by malware developers that can be used to extract information.

The fourth technique that is used is link downloads that are developed by third party site. The developers always encourages the users of computers to click in order to download and the process gives access to a third party user. The cybercrime security officer in the organization should be trainers the users of the organization ways to discard and filter for the mails. Lastly, the malware developers in organizations can prevent attacks of malwares through installation of automatic scan. The techniques used by malware developers are classified under three ranks; rank 1 is wrapping, rank 2 obfuscations and rank 3 is packers technique.

Techniques Used by Malware Developers to Evade Detection

The first technique is IceFog which is ranked 1. The technique is classified as wrapping as the malware developer links or attaches a malicious payload to a given file. The method is widely used in windows and OS X malware that are distributed through P2P networks and pirate software.

The second technique is exclusive OR which is rank 2. The technique is classified as an Obfuscation  which involves the updating of binary and high-level code is such a way that the functionality of system is not affected. According to Forte & Iskander (2018) the obfuscation works as a piracy and reverse-engineering. The technique has been used by malware authors to bypass and avoid antivirus. The last technique is UPX and Armadillo that is ranked 3. The technique is classified as packers technique as it is applied in compressing and encoding binary files.

 

 

References

Forte, D., & Iskander, Y. (2018). Guest Editorial: Hardware Reverse Engineering and Obfuscation. Journal Of Hardware And Systems Security2(4), 287-288. https://doi.org/10.1007/s41635-018-0059-9

GIERSZEWSKI, T. (2016). Malware – Malicious Software in IT/OT Systems. AUTOMATYKA, ELEKTRYKA, ZAKLOCENIA7(4(26)2016), 158-169. https://doi.org/10.17274/aez.2016.26.09

Rani, S., & Dhindsa, K. (2020). Android application security: detecting Android malware and evaluating anti-malware software. International Journal Of Internet Technology And Secured Transactions10(4), 491. https://doi.org/10.1504/ijitst.2020.10028988

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask