Saturday, September 7, 2013

2(A) Discuss different types of treats and malicious program(malware) that can damage a computer, mobile device or disrupt any system.
Malicious software ( malware ) include virus, worms, Trojan horses, adware, rootkits, keyloggers, dialers, ransomware, spyware and many more. These various kind of malwares are dangerous not only to computers but basically any devices that has operating systems in it including mobile phones.
Viruses are the most famous type of malware. People often refer any type of harms infecting their computers as virus. Viruses replicate themselves spontaneously and infect the whole system without authorization. Their source of spreading is mainly the mail when one open the mail without realizing what they actually open up themselves to. However, it can also travel through flash drive and any other file-transferring medium such as CD-drive. Once installed, it will infect other files present in your computer and attempt to propagate to other systems. The harmful effects cover from slowing system performance to worst of all, clearing out the entire computer till every single files.
Worms are completely different than viruses. Although they both have the ability to replicate themselves and propagate other files, worms tend to leach onto network traffic, unlike virus which moves from one machine to another machine. Worms do not need a hard drive to travel through one system to another. It can just easily travel through internet and inflict great damage from deleting files to even creating backdoors that give its creator control of a system from distance.
Spyware is rather safe compared to others. However safe it might sound, spyware is still considered a malware as it invades our privacy by tracking and reporting computer activity without consent. It doesn’t afflict any damage to a system however it tends to slow one’s performance. They usually attached themselves along free software that people tend to download in open source network. It automatically installed alongside the software you download. Spyware is widely connected to adware following its common effects towards the system. Spyware is able to pop up advertisements the same way adware is able to.
Rootkits are aimed to overtake the whole control of a system. This is among the hackers’ favorites as it allows the hackers to take control over someone’s computer from a million miles away. Compatible with its outstanding ability, it’s also very sophisticated to decipher by hackers. Once mastered by hackers, this malware will infect other computers as well and enslave them as zombies, forcing them to do whatever the hacker wants while the real culprit goes undetected.




2(B) Search for information on current known malware program. Base on the information that you have found, create a table to list different types of malware, what it does, how it can be repaired and removed. These information is useful for you to prevent any malware from damaging
MALWARE NAME
TYPE
SPECIFICATION/HARM IT DOES..
HOW TO REMOVE IT
Flame/Skywiper
Trojan
§  Attack computer running Microsoft office
§  Turn infected computer into Bluetooth beacon which transfer contact information from any Bluetooth device nearby
·         By using BITDEFENDER removal tool that only remove FLAME TROJAN
Shamoon
worm
§  Attack computer running Microsoft window
§  Installed SpyHunter’s malware to detect and remove the worm
NGRbot
worm
§  Steals victim’s information
§  Causing redirection
§  Blocking victims from getting updates of security and ant-malware product

§  We can follow the guideline from NGRBot manual removal
Duqu
worm
§  Gather information and supply it to the server
§  Attack Microsoft windows system
§  Delete all recent information entered
§  Steals digital certificate
§  Running a stand-alone virus removal tool from CD or USB flash drive





Reference:en.wikipedia.org/wiki/Wikipedia/computer malware
By: Naufal Khan and Marcyril Marcos


No comments:

Post a Comment