CYB 110 Malware_Attacks.docx Malware Attacks CYB/110 Introduction Malware is malicious software usually disguised as some sort of non-threatening function. These forms of software vary from viruses, worms, Trojan
...
CYB 110 Malware_Attacks.docx Malware Attacks CYB/110 Introduction Malware is malicious software usually disguised as some sort of non-threatening function. These forms of software vary from viruses, worms, Trojan horses, and spyware. The most difficult part of malware is the user normally authorizes it, so it™s able to disguise its malicious activity well. This route the malware uses is known as the attack vector. A prime defense to malware will always be the user. There are vital steps and procedures we should follow to protect yourself from these attacks. Malware Attacks As mentioned, users are one of the best defenses to their computer system. Unfortunately, that also means they can be the biggest vulnerability. Hackers use that exploit to their advantage often. One vector that is very common is sending the user an email with an attachment or link. The user would then click the link or attempt to open the attachment, which would inadvertently launch the malware. œMost malware email attachments include code or exploits to cause your computer to download more malware from the Internet. These email attachments are often small, customized, and not widely spread making them hard to detect by antivirus software (www.msu.edu, 2019). Once these types of viruses are launched, there are several different types of attack methods they can use. A growing popular method of malware, which is now threatening larger corporations, is a ransomware. Once ransomeware is launched, it will encrypt or. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . .
[Show More]