Project Guidelines
Scenario:
You have recently joined a medium sized organization as an assistant manager. Your manager is
concerned about the number of security breaches that are reported almost on a daily basis in the
press. He has asked you to conduct a good review of software attacks that commonly occur on
the information assets.
Task:
Conduct a good review of the different types of software attacks (commonly known as Malware)
on the information assets of the organizations. Include in your description - name (e.g. Trojan
horse), method of transmission, mode of operation, and type of damage done by each type of
software attack. You should also include what actions your manager should take in order to
prepare and defend the organization against these types of attacks.
Deliverable
1. A word document (5-6 pages excluding cover page and references page).
2. Font (Times New Roman size 12).
3. Double spaced with one-inch margins all around.
4. All citations and the reference list in the report should be formatted in accordance with APA
6th edition (or later) guidelines.
4. Report must be uploaded in the D2L by no later than 12/3/2018, that is last day of the normal
classes.
Computer Malware
A computer malware can be described that it is a program which can disturb the regular working
of a system. It can be attached to the files that are stored on USB, floppy disks, hard disks and
emails. The file to which virus is attached is known as infected file. When an infected file is copied
in the computer system then virus is also copied into the computer system. Malware is also known
Types of Virus
Although the boot sector virus has become outdated but it activates by any way. This malware was
commonly activated when floppy disks were being used for booting the computer system. It
usually takes place in the first sector of the booting record. It usually appears in the master boot
record. It can damage the partition of the computer system. Moreover, the evolution of internet has
Polymorphic Virus
Polymorphic malware are difficult for detection. The programs that are installed in the computer
system for protection of malwares is called antivirus and they use to scan codes of the viruses for
detection. Unfortunately, polymorphic virus use to change its code everytime when it enters in the
computer system. Hence it is very difficult for an ordinary antivirus to detect and remove this
virus.
Browser Hijacker
This kind of malware occurs when someone is doing some browsing on the internet and is jumped
to somewhere else at once. These malwares are attached to different programs, toolbars and with
free downloads that we choose. A good antivirus is enough strong for detecting all these kind of
browser hijackers. These viruses are mostly attached with the word of “search”.
Trojan horse
Trojan is a type of malware which are employed by hackers and cyber-thieves for getting access
into the computer system. These kind of malwares can be attached with different games,
downloads and emails. Once they gets activated, cyber criminals starts spying on you. They can
steal personal and sensitive information from computer. They can perform different kinds of task
Computer malwares can only damage the computer system software it cannot put any negative
with computers for transferring data from one place to another then malware is also transferred
Email Attachments
Many virus are spread with the help of emails. Email attachments are used for spreading viruses.
Email attachment are the files that are sent. When a user opens and downloads the infected email
attachment then the virus is also gets download into the computer automatically. Then the virus
can damage the data, files and different programs of the computer. It is also possible that an
automatic infected email may also be generated and sent to all people in the address book.
Networks
Network is the huge source of spreading virus. When a infected computer is attached to the
network then malware can be spread in the network. The best example of it is internet. When a
infected file is get download by the user then virus is also downloaded into the computer system
Pirated Software
Pirated software is the illegal copy of the software. These software are available in the form of
CD’s and also on internet. Some firms adds viruses in these software intentionally.
There are some rules to which can be followed for prevention of malware.
Do’s
1. Always keep the antivirus program installed in the computer system. Keep the program
always up-to-date.
2. Never allow web browser to download all the email attachments automatically. First check
the email then download it. Remove all the suspicious emails immediately before doing
any download.
3. Ignore all the messages that seems to be suspicious. Never open that emails.
4. Always maintain a backup for not only all your data in your computer but of all your
Don’ts
1. Do not open such emails that were not expected or if the sender is unknown.
2. Do not download any executable file, document if it has been sent by unknown.
3. Do not download any file which have double extension like filename.txt.vbs. it is the
identification of virus.
Never do any negligence in taking strict action against the spreading virus in the computer. Virus
can be prove very harmful for the system. It can damage the important data, files and folders.
Always keep a good antivirus installed in the computer system. Keep that antivirus program to be
up to date.
Symptoms of virus
Following are the symptoms of having a virus installed in the computer system.
New programs and files gets created automatically in the computer system
Different data and files gets deleted or corrupted in the system automatically
If computer shows any symptoms from the above mentioned indications then it can be expected
that the computer is being infected by the virus. Take no delay in downloading and starting the
antivirus program in the system. Following remedies can also be helpful in solving the problem.
Safe Mode
Start booting the system and click on F8 for entering in the advanced boot options menu.
After entering press on safe mode and press enter key. User may have to keep pressing on f8
for several times. By working on safe mode, the files that are infected will stop running.
Remove internet connection also because it is the major source of spreading viruses.
Before starting the virus scan delete all the temporary files. It can help in boosting and increasing
the speed of scanning. The temporary files can be deleted from the computer with the help of disk
clean-up.
Always keep downloaded a malware scanner in the computer. It helps in protecting the computer
from entering the malware. It can only helpful in removing the infections. It cannot delete the
temporary files from the computer. Never keep two malware scanners in the system at a same time.
It will result in weird computer behaviours. Always keep a real time malware scanner in the system
it will keep checking for the viruses automatically and prevents them from entering.
the programs that were destroyed by malware. Always keep a backup of all the important
data.
References
Javad (2013 August 25) what is computer virus? Retrieved from http://www.byte-notes.com/what-
computer-virus#simple-table-of-contents-11
https://antivirus.comodo.com/blog/computer-safety/what-is-virus-and-its-definition/
Daniel Goh (2016 April 4) 9 types of viruses that you should know about and how to avoid them?
that-you-should-know-about-and-how-to-avoid-them/
Brain Benton (2014 April 22) 10 tips how to prevent malware from infecting your computer and
prevent-malware-from-infecting-your-computer/
Panda (2014 September 16) 4 easy steps to avoid viruses. Retrieved from
https://www.pandasecurity.com/mediacenter/security/4-steps-avoid-viruses/