Anda di halaman 1dari 8

Business Information Systems and Analytics (GBA 327)

Project Guidelines

Scenario:
You have recently joined a medium sized organization as an assistant manager. Your manager is
concerned about the number of security breaches that are reported almost on a daily basis in the
press. He has asked you to conduct a good review of software attacks that commonly occur on
the information assets.
Task:
Conduct a good review of the different types of software attacks (commonly known as Malware)
on the information assets of the organizations. Include in your description - name (e.g. Trojan
horse), method of transmission, mode of operation, and type of damage done by each type of
software attack. You should also include what actions your manager should take in order to
prepare and defend the organization against these types of attacks.

Deliverable
1. A word document (5-6 pages excluding cover page and references page).
2. Font (Times New Roman size 12).
3. Double spaced with one-inch margins all around.
4. All citations and the reference list in the report should be formatted in accordance with APA
6th edition (or later) guidelines.
4. Report must be uploaded in the D2L by no later than 12/3/2018, that is last day of the normal
classes.
Computer Malware

A computer malware can be described that it is a program which can disturb the regular working

of a system. It can be attached to the files that are stored on USB, floppy disks, hard disks and

emails. The file to which virus is attached is known as infected file. When an infected file is copied

in the computer system then virus is also copied into the computer system. Malware is also known

as computer virus or worm.

Types of Virus

Boot Sector Virus

Although the boot sector virus has become outdated but it activates by any way. This malware was

commonly activated when floppy disks were being used for booting the computer system. It

usually takes place in the first sector of the booting record. It usually appears in the master boot

record. It can damage the partition of the computer system. Moreover, the evolution of internet has

made this virus some less sever now.

Polymorphic Virus

Polymorphic malware are difficult for detection. The programs that are installed in the computer

system for protection of malwares is called antivirus and they use to scan codes of the viruses for

detection. Unfortunately, polymorphic virus use to change its code everytime when it enters in the

computer system. Hence it is very difficult for an ordinary antivirus to detect and remove this

virus.

Browser Hijacker
This kind of malware occurs when someone is doing some browsing on the internet and is jumped

to somewhere else at once. These malwares are attached to different programs, toolbars and with

free downloads that we choose. A good antivirus is enough strong for detecting all these kind of

browser hijackers. These viruses are mostly attached with the word of “search”.

Trojan horse

Trojan is a type of malware which are employed by hackers and cyber-thieves for getting access

into the computer system. These kind of malwares can be attached with different games,

downloads and emails. Once they gets activated, cyber criminals starts spying on you. They can

steal personal and sensitive information from computer. They can perform different kinds of task

like deletion, modification, blocking or copying of data.

Damages caused by virus

Computer malwares can only damage the computer system software it cannot put any negative

impact on computer hardware. A malware can perform only following actions:

 It can perform damage to software or data of the computer.

 It can delete the important files of the computer

 It can do formatting of hard disk which can cause deletion of data.

Causes of Computer Virus

Main causes of the computer malwares are explained in the following.

Infected Flash Drives or Disks


The main source of expanding viruses is USB drives and Disks. When flash drives are attached

with computers for transferring data from one place to another then malware is also transferred

from one computer to another with the infected file.

Email Attachments

Many virus are spread with the help of emails. Email attachments are used for spreading viruses.

Email attachment are the files that are sent. When a user opens and downloads the infected email

attachment then the virus is also gets download into the computer automatically. Then the virus

can damage the data, files and different programs of the computer. It is also possible that an

automatic infected email may also be generated and sent to all people in the address book.

Networks

Network is the huge source of spreading virus. When a infected computer is attached to the

network then malware can be spread in the network. The best example of it is internet. When a

infected file is get download by the user then virus is also downloaded into the computer system

and can put damage to the files.

Pirated Software

Pirated software is the illegal copy of the software. These software are available in the form of

CD’s and also on internet. Some firms adds viruses in these software intentionally.

There are some rules to which can be followed for prevention of malware.

Do’s
1. Always keep the antivirus program installed in the computer system. Keep the program

always up-to-date.

2. Never allow web browser to download all the email attachments automatically. First check

the email then download it. Remove all the suspicious emails immediately before doing

any download.

3. Ignore all the messages that seems to be suspicious. Never open that emails.

4. Always maintain a backup for not only all your data in your computer but of all your

important emails also. A virus can destroy all your emails.

Don’ts

1. Do not open such emails that were not expected or if the sender is unknown.

2. Do not download any executable file, document if it has been sent by unknown.

3. Do not download any file which have double extension like filename.txt.vbs. it is the

identification of virus.

How to Get Rid Of Malwares

Never do any negligence in taking strict action against the spreading virus in the computer. Virus

can be prove very harmful for the system. It can damage the important data, files and folders.

Always keep a good antivirus installed in the computer system. Keep that antivirus program to be

up to date.

Symptoms of virus

Following are the symptoms of having a virus installed in the computer system.

 Performance of the computer system becomes slow down

 Computer screen gets flooded with huge number of pop-ups

 Different programs starts working by their own self


 Different files gets duplicated automatically in the computer system

 New programs and files gets created automatically in the computer system

 Different data and files gets deleted or corrupted in the system automatically

Protection from Malwares

If computer shows any symptoms from the above mentioned indications then it can be expected

that the computer is being infected by the virus. Take no delay in downloading and starting the

antivirus program in the system. Following remedies can also be helpful in solving the problem.

Safe Mode

Start booting the system and click on F8 for entering in the advanced boot options menu.

After entering press on safe mode and press enter key. User may have to keep pressing on f8

for several times. By working on safe mode, the files that are infected will stop running.

Remove internet connection also because it is the major source of spreading viruses.

Delete Temporary Files

Before starting the virus scan delete all the temporary files. It can help in boosting and increasing

the speed of scanning. The temporary files can be deleted from the computer with the help of disk

clean-up.

Download Malware Scanner

Always keep downloaded a malware scanner in the computer. It helps in protecting the computer

from entering the malware. It can only helpful in removing the infections. It cannot delete the

temporary files from the computer. Never keep two malware scanners in the system at a same time.

It will result in weird computer behaviours. Always keep a real time malware scanner in the system

it will keep checking for the viruses automatically and prevents them from entering.

Reinstall the damaged files


After running the malware scanner and completing the process of virus removal, reinstall

the programs that were destroyed by malware. Always keep a backup of all the important

data.
References

Javad (2013 August 25) what is computer virus? Retrieved from http://www.byte-notes.com/what-

computer-virus#simple-table-of-contents-11

Kevin Judge (2018 August 3) what is Computer Virus? Retrieved from

https://antivirus.comodo.com/blog/computer-safety/what-is-virus-and-its-definition/

Daniel Goh (2016 April 4) 9 types of viruses that you should know about and how to avoid them?

Retrieved from http://www.youngupstarts.com/2016/04/14/9-types-of-computer-viruses-

that-you-should-know-about-and-how-to-avoid-them/

Brain Benton (2014 April 22) 10 tips how to prevent malware from infecting your computer and

your livelihood. Retrieved from https://www.autodesk.com/redshift/10-tips-on-how-to-

prevent-malware-from-infecting-your-computer/

Panda (2014 September 16) 4 easy steps to avoid viruses. Retrieved from

https://www.pandasecurity.com/mediacenter/security/4-steps-avoid-viruses/

Anda mungkin juga menyukai