Instructions
QUICK DISCUSSION & RESPONSE ACTIVITY
Directions: (PART 1) (PROVIDE SOURCES AT END, ONLY 1-2 SOURCES IS NEEDED)
What is the malicious software and how to do countermeasures against them? Please explain it in two-three paragraphs, with valid references.
Directions: (PART 2) (There are 2 responses to respond back to)
Respond to these separate responses with 2-3 sentences each response.
1st Response: The types of malicious software are viruses, worms, trojan horses, rootkits, and spyware. Viruses attach or copy themselves to programs. The infected program can then be used to spread its contents to other computers through an unaware user. Worms are their own programs that send copies of themselves, usually over a network, on their own. Trojan horses pretend to be a legitimate program. By opening them, they can collect sensitive information and open up vulnerabilities. Rootkits sneak attacks inside of programs by modifying them, or they replace the program altogether. They conceal their presence so they can be difficult to detect. Lastly, spyware targets a user’s personal information to relay to its creator. This info can be in the form of credit card numbers, email addresses, passwords, chat information, keystrokes, cookies, files on a hard drive, and more. The best way to protect against malware like this is to learn how to prevent them from getting on the device in the first place. Do not open files from unknown or untrusted sources. In the event it is absolutely necessary to do so, make sure to download anti-malware utilities that perform regular scans. Quarantine computers that are unable to spread malware to others can be used to test suspicious files. Just a simple secure login and authentication is a good first step before any of the more complex measures. Because new exploits are constantly being discovered, staying on top of the latest malware information is necessary. A firewall can also be used to monitor incoming traffic, checking for abnormalities.
2nd Response: Malicious software is malware designed to damage systems. Regardless of the flavor or type the main goal is to do something to harm, slow down, or potentially steal sensitive information. There are two main categories of malware. One is used to infect and the other is used to hide things. They both can cause harm. The items that infect are viruses and worms, and the items that are hidden to carry out attacks after they are inside the system. Viruses are used to infect systems. They are a software program. Viruses can slow down, and crash systems Viruses need a host to attach themselves to carry out their intended purpose. It is malicious code that is designed to cause normal program to operate not as they normally would. The most common method of getting virus is by being fooled to click on an email, or attachment. The other form of infecting items is a worm. This is also a program or malicious code written to disrupt an application or operating system. The primary difference between a worm and virus is that a worm needs no host. It can survive on its own, and it can travel much easier and faster than a virus. It does not need the user help to prorogate itself. Moving into the more deceptive and harder to detect malicious malware is Trojan, Rootkits and Spyware. Trojans are named after the Mythical wooden horse that the Greek used to defeat the Trojans. The art of hiding a payload inside something else that seems innocuous is exactly how it takes control, steals data and reports back to the originator. These types of malwares can inbreed keylogger and other types of data collection devices. They can cause serious harm and remain undetected for greater length of time for to their stealthies. The other hidden malware is Rootkits. These ae very dangerous in that they are designed to go to the root of an operating system to take control without a hint that it has occurred. Once, installed a persistent threat is present that allows remote access and control of the kernel of the operating system. Spyware is also a hidden program that is used to just what it says spy. What does it spy on? The user’s information like password, login credentials, credit card information. Spyware is also a Trojan in that it is usually embedded in some type of freeware. It can be used to gather information to market and advertise, but it has all the potential to collect sensitive data. In Closing, malware regardless of how it’s deployed has great potential to harm user’s systems, data and personally identifiable information. The best method to avoid being a victim of these types of malicious code is do not click on links, email or other fishing attempts. Also, don’t use freeware or shareware as they are not as advertised. They are not free! The price is the potential malicious code attached to it. Keep your systems antirust, malware and spyware scanner updated. Additionally run Microsoft Malicious Removal Tool. User awareness is the biggest takeaway here. Users should be educated not to open emails, attachments, or embedded links. If there is an infection reload the entire operation system with an ISO image. Remember this prevention is fare better than a cure. Don’t get infected and you won’t need a cure.
NOTE: PLEASE RESPOND SEPARATELY TO THESE 2 DIFFERENT RESPONSES! THANK YOU!