Emerging Malware Essay

1642 Words4 Pages

Debbie Reategui Siles
Kelly Shaw
Dr. Gorrell P. Cheek
10 April 2014
Survey and Analysis of Recent and Emerging Malware
Our world and its infrastructures have become largely dependent on information technology solutions and computer networks. The criminals or “cybercrooks” behind the malware attacks are looking to retrieve information from users for their gain. This is bad news seeing as it can put many companies and users personal information at risk. There have been many articles created in response to the CryptoLocker virus. A recent article suggests that CryptoLocker has opened doors to many more instances of ransomware. PoS (Point of Sales) attacks is the act of gathering important user data from PoS machines, these are ATMs and credit card readers used in all different types of places. OpenSSL is the most commonly used encryption software used on the Internet, big online companies use this software. Malware evolves through time capitalizing on new approaches and exploiting the flaws in the emerging technologies to avoid detection.
Introduction and Background
Cyber attacks are becoming more and more popular lately as they are cheap, convenient and less risky than physical attacks. All it takes is a computer, internet connection, and time. These “Cybercrooks” are hard to find seeing as they can be anywhere in the world and the anonymity of the Internet makes them unreachable. Vulnerable components in IT Infrastructure are the software, hardware, and network. In order for any type of malware to work it needs to get through all these walls (Jang-Jaccard).
To get through these security walls “cybercrooks” are creating more and more different types of malware. What is malware? Microsoft defines it as the following “Malware is sho...

... middle of paper ...

...rovided the necessary information about the vulnerability and how they are working to prevent the issue from recurring. Just like all of the other papers that have been about this type of malware, they all agree on a few simple solutions to stop the majority of these vulnerabilities. A few examples would be: keeping your firewall, antivirus software, and operating system always updated with the latest patches. Most of the patches released are to keep prevent vulnerabilities from occurring. Unfortunately, this issue could not be prevented by the end user because it was a flaw in the implementation of the software from OpenSSL. Even the users that covered all precautions, could have been attacking by this bug. The article also provided the solution to the vulnerability which had the websites update OpenSSL and to administer the end users’ new keys.
Conclusion

More about Emerging Malware Essay

Open Document