Preventing Systems Intrusions
A) Malware is any program or file that is designed to interfere with operations, gain unauthorized access to computer resources and amass information that results in loss of privacy, among other intrusive behavior. Malware affects computer systems in a number of ways by turning off automatic updates and disabling exceptions in the Windows firewall. Malware is able to achieve this through setting exceptions in the windows firewall by routinely executing any maliciously destructive programs. This is accomplished by using the Actex content that is found in a computer’s security system. In particular, malicious software is used to compromise systems where the entire system is affected by a range of destructive files.
B) Viruses and worms are the most widely known types of malware. The main difference between these two types of malware is in the manner in which they spread. Viruses are programs that infect executable software. When the files are run, the viruses replicate and spread to other files and from on computer to another. On the other hand, worms are programs that transmit themselves actively over computer networks to infect other computers. Anti-virus and Anti-malware software are often used to prevent computer systems from being infected with malware. When installed in a computer system, these malware programs prevent any destructive program files from interfering with the normal functioning of the system. Fundamentally, these malwares scan and check for threats that might be present in the computer, with the intention of correcting the problem beforehand. Antivirus software, for example, are usually used to detect and remove viruses in computer systems.
Bradley, T. (2006). Essential computer security:everyone's guide to e-mail, Internet, and wireless security. Syngress.
Cennamo, K. S., Ross, J. D., & Ertme, P. A. (2009). Technology Integration for Meaningful Classroom Use:A Standards-Based Approach. Cengage Learning.
Morley, D. (2010). Understanding Computers in a Changing Society. Cengage Learning.
Scarfone, K., Grance, T., & Masone, K. (2008, March). Computer Security Incident Handling Guide. Retrieved October 19, 2011, from National Institute of Standards and Technology: http://csrc.nist.gov/publications/nistpubs/800-61-rev1/SP800-61rev1.pdf
Stewart, J. (2008). Rogue Antivirus Dissected. SecureWorks, Inc.
Valdes, A., & Cheung, S. (2008). Malware Characterization through Alert Pattern Discovery.