This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Character

Characteristics and Operations of Malware

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Characteristics and Operations of Malware

Characteristics of Malware

The malwares in existence have many different characteristics. One characteristic of malware is that they are mandatory to install. They do not require an administrator’s permission for them to install. They install themselves on the user’s computer. The malwares are difficult to uninstall. The malwares do not have the conventional way of uninstallation, and they always run even after unloading procedures. The malwares also hijack browsers. The malwares do this, and they modify the user’s information.

Malwares also collect the user’s information. The information ranges from the user’s internet use behavior to private information like bank details and passwords. The malware also conducts malicious uninstallation of programs. Malware like computer viruses can replicate themselves until they infect the whole system. They also can attach themselves to computer files. Malware also reduces the speeds of the computer system and its related processes like data transfer. Some malwares are polymorphic, meaning they can change the computer’s code.

Operations of Malware

The different malwares operate in many different ways as well. Computer viruses infect clean files in a computer system and replicate within the system. The viruses corrupt the computer system and usually delete other files and programs. Viruses cause extensive damages to a computer system (Cohen, 1987). Adware is generally not aggressive or malicious, but the advertising software can undermine the security of the computer system. By undermining the security protocols of the computer, the adware can enable other malware to attack a user’s computer.

Don't use plagiarised sources.Get your custom essay just from $11/page

Worms can infect entire networks, and they use one computer on the network to infect the next one consecutively. Spyware is malware specifically engineered to spy on the user of a computer. It gathers information like passwords, private information, internet use habits, and many more. Ransomware works by denying user access to critical or private information on the computer until the user pays ransom usually in the form of money. Trojans are malwares that disguise themselves as genuine software, and they discretely run in the background, creating a back door in a user’s system that acts as an entry point for other malwares (Rahbarinia et al., 2017).

 

 

 

 

 

 

 

 

 

 

 

 

Reference

Cohen, F. (1987). Computer viruses: theory and experiments. Computers & security, 6(1), 22-35.

Rahbarinia, B., Balduzzi, M., & Perdisci, R. (2017, June). Exploring the long tail of (malicious) software downloads. In 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (pp. 391-402). IEEE.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask