Cyber Security and Digital Forensics – Coursework Example

Download full paperFile format: .doc, available for editing

The paper "Cyber Security and Digital Forensics" is an engrossing example of coursework on information technology. The rapid penetration of the internet has raised the potential for security threats for businesses globally. At present, cybersecurity is considered as one of the crucial parameters for acceptance of any internet technology. Indeed, in 2013 alone, studies have shown that dealing with malware will cost a global business of up to $112 billion (Ashford). In particular, any node of attack in the wireless network provides an irregular behavior termed as malicious behavior.

Under this scenario, the whole operation of a network becomes compromised by malware. Malware is a common term applied in defining malicious software that contributes to security threats to a computer system and the internet (Rossow 5-6). This essay argues that many businesses are unaware of attacks and have slow responses to these risks that endanger the security of the entire organization. The premise of this argument is that reliance on passive antimalware and antivirus software has created a false sense of security for businesses leaving them vulnerable to serious attacks since they fail to actively monitor their systems. Defining malware and vulnerability of business networks The reliability and availability of wireless networks are increasingly compromised by viruses, Trojans, and warms.

Malware represents an intentional and malicious discharge of software aimed at impacting the profitability and productivity of individuals or businesses. Logan and Logan (301) estimate that for every 1,000 computers, the rate of infection will be 105. A disaster refers to a simultaneous attack on more than 25 computers causing major damage. Viruses, Trojans, and worms all form part of a class of software called malware.

Most malware compromises information privacy and modifies system information and data. Information system experts agree that cyber insecurity caused by different classes of malware is the most inherent cost of doing online business. It is therefore critical that organizations must take the required steps to protect information and to provide proper risk management that could prevent data breach (Sophia). Basically, security threat refers to a potential cause of unwanted occurrences that may damage a system or network. The wireless network is vulnerable to various security threats and attacks, where malware attacks pose the greatest threat by exploiting the weaknesses of the wireless network (BITS 19). Malware, also known as malicious code, is an acronym for malicious software.

Basically, it refers to software or code that is particularly designed to disrupt, damage, and steal or even inflict unwarranted and illegitimate action on the host, network, or data (Rossow 5-6). There are several classes of malware, each with varying degrees of proliferation and ways of infecting systems. Malware infects the system by being bundled with other software programs. Alternatively, it can be attached as macros to files.

Other malware may, however, be installed through the exploitation of a vulnerability in an operating system (OS), other software, or network device, including a hole in a browser that needs users to visit a site in order to infect their computer systems. A majority of the malware may, however, be installed through some action from the user, such as downloading a file from the internet or click on an email attachment (Mohammed et al 115-116).

References

Ashford, Warwick. "Malware in counterfeit software to cost business $114bn in 2013." Computer Weekly, 2013. 31 Oct 2013

BITS. Malware Risks and Mitigation Report. BITS: Washington DC, 2011.

Logan, Patricia & Logan, Stephen. "Bitten by a Bug: A Case Study in Malware Infection." Journal of Information Systems Education, 14.3 (2005) 301-304

Mello, John, "Spear phishing poses threat to industrial control systems." Data Protection, 2013. 31 Oct 2013

Mohammed, Aliyu, Haitham A. Jamil, Sulaiman Mohd Nor, Muhammad Nadzir. "Malware Risk Analysis on the Campus Network with Bayesian Belief Network." International Journal of Network Security & Its Applications 5.4 (2009): 115-128

Padmavathi , G. & Divya, S. "A Survey on Various Security Threats and Classification of Malware Attacks, Vulnerabilities and Detection Techniques." The International Journal of Computer Science & Applications 2.4 (2013): 66-72

Rossow, Christian. Using Malware Analysis to Evaluate Botnet Resilience . Vrije Universiteit, 2012. 31 Oct 2013

Starr, Jasmine. "The Dangers of Malware in Your Business." Yahoo Voices, 2010. 31 Oct 2013

Security TechCenter. Strategies for Managing Malware Risks. 2006. 31 Oct 2013.

Sophia, Mary. UAE Has Highest Malware Infection Rate In ME. Gulf Business, 2013. 31 Oct 2013.

Symantec. The Ongoing Malware Threat: How Malware Infects Websites and Harms Businesses — and What You Can Do to Stop It, 2012. 31 Oct 2013

Download full paperFile format: .doc, available for editing
Contact Us