Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Computer viruses and thier effects on computer
Dangers of Surfing the Internet
Computer viruses and thier effects on computer
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Computer viruses and thier effects on computer
INTRODUCTION
Two of the common known attacks on computing systems are the deployment of computer viruses and malware.
Computer viruses are minute program which is “embedded inside an application or within a data file which can copy itself into another program“(Adams et al, 2008 ) for the sole determination of meddling with normal computer operations. The consequences may range from corruption and deletion of data; propagation of virus on to network and deployment through attachments through emails in order to further creating havoc to all associated computing devices.
Malwares are mischievous programs crafted to agitate or forbid normal operations to gather selected information which may lead to loss of privacy through exploitation; gain unauthorized entry into system resources and other abusive behavior”. The taxonomy of malware includes: Trojan Horses; Viruses, Worms and Zombies (Adams et al, 2008).
In the web applications technology, the web browser is the center which revolves around the internet entity. One of the main tool architecture for web design is the recruitment of JavaScript in the DOM “Document Object Model.” JavaScripting language has inherent capabilities which could execute dynamic effect within the web browser and DOM. DOM offers logic structure in which the document is accessed and manipulated. As a consequence, this also poses numerous security issue which plague all users and developers alike (Wadlow et al, 2009).
ANALYSIS
JavaScript is prevalent within many industries such as web design; desktop gadgets such as Dashboard widgets; PDF used in Adobe Reader; Application tools such as the Adobe Creative Suite; office documents used in Open Office, etc. (Wikipedia, 2011).
PROBLE...
... middle of paper ...
...xman, s., Naldurg, P., Venkatesan, R., Lambert, J., Shin, J. (2011) ‘ ZDVUE: prioritization of javascript attacks to discover new vulnerabilities’ [Online. Available from: http://doi.acm.org/10.1145/2046684.2046690 (Accessed 29 October 2011)
Wadlow, T., Gorelik, V. (2009) ‘Security in the Browser. Queue 7, 2 (February 2009)’, pp. 40-41., [Online]. Available from: http://doi.acm.org/10.1145/1515964.1516164 (Accessed 29 October 2011)
Adams, A and McCrindle R (2008) ‘PANDORA’S BOX, SOCIAL AND PROFESSIONAL ISSUES OF THE INFORMATION AGE’, West Sussex, England: John Wiley & Sons Ltd, pp. 565 (accessed 29 October, 2011)
Choi, Y., Kim, T., Choi, S. (2010) ‘Automatic Detection for JavaScript Obfuscation Attacks in Web
Pages through String Pattern Analysis’, [Online]. Available from:
http://www.sersc.org/journals/IJSIA/vol4_no2_2010/2.pdf (accessed 29 October, 2011)
Cyber-attacks are very common in the U.S. and around the world. However, From mid-2009 and through December 2009. One of the most sophisticated cyber-attacks was lunched against Google and 20 other companies (McAfee , 2013). McAfee researchers dubbed the attack Operation Aurora. The cyber-attack was first publicly disclosed by Google on January 12, 2010. A group named "Hidden Lynx” out of China is believed to be responsible. McAfee dubbed the Cyber-attack “Operation Aurora”. According to the anti-virus firm McAfee, the hackers were seeking source codes to Google, Adobe, Yahoo, and dozens of other high-profile companies (Zetter, 2010). McAfee firm reported the tactics used in the attack were unprecedented and used combined encryption and stealth programming to find an unknown backdoor into Microsoft internet explorer. Because of this vulnerability this allowed an access breach and allowed the hackers to steal intellectual property from Google and gain access to user’s accounts. McAfee researchers believe in detail hackers of Operation Aurora invisibly infiltrated different systems without any visible signs of malicious intent or actions in a couple of steps. The attack started with sending a link in an email or instant message from a “trusted” source directed to the targeted company or user. Since the link was believed to be trusted by the user. The user would click on the link a website that contains a malicious JavaScript payload. Due to the nature of an executable file, the browser will download the malicious JavaScript. The script will include a zero-day Internet Explorer exploit that will download a binary pretending to be Taiwan servers that will execute the payload. This Trojan will open a backdoor that is encrypted and ...
Computers are main technological features that allow criminals to step into unsuspecting victims lives. With a simple piggy-backing program hackers are able to track every keystroke made by the victim. One such program is called spyware, not to be confused with adware, which is often referred to interchangeably with spyware, but is potentially harmless (Louis 15). Spyware, hidden within downloaded software, implants itself deep within a computer’s hard drive, allowing it to track every move made by the user (Louis 16).
This paper will perform an analysis of both Java and JavaScript. In order for the reader to gain a better understanding of these languages, the history of these languages with overviews will be presented along with a discussion of the benefits and drawbacks.
In today’s days malware is designated as a software which aims to disturb a computer with the consent or permission of the owner. This term “Malware” is used by computer professionals to describe a varied forms of destructive, annoying and intrusive software code. This word “Malware” is used to indicate all types of malware which include a true set of viruses.
Daniel Bell (1973) coined the expression ‘the post-industrial society’. In this society a substantial proportion of the population are employed or involved in the work of information collection and communication. In this sense we can see that information has become a commodity which can have a value and is therefore marketable. It also can be seen as an indispensable component of our social fabric.
Starting back in the early 1990's with the introduction of Java to the computer scene there has been many updates and advances in how languages interact with web based programs. In this paper we are going to highlight several areas of several different Java flavors. The flavors we are addressing are Java, JavaScript, Java Applets and JavaBeans. We will discuss their history, features, usage and syntax and finally follow up with a chart providing a comparison of the different Java architectures.
The history of cybercrime goes back to 1971 and the first computer virus called the Creeper which was created by Bob H. Thomas, who was a BBN engineer (Dalakov, Meltzer, and Phillips). BBN which stands for Bolt, Beranek and Newman, is now Raytheon BBN Technologies (“About”, Dalakov). A computer virus is a program that is created to cause damage to a computer or perform other malicious acts (204). The Creeper virus was designed to infect the ARPANET network. The ARPANET, which stands for Advance Research Projects Agency was set up by the U.S. Government as an agency in 1969 to provide a network of computers that would connect various academic and research organizations; it was the predecessor of the Internet (“Internet”, Morley, and Parker).
In this globalized arena, with the proliferating computer users as well as computer networks, risks associated like Malware attacks are also multiplying. As the proverb
In this report, Add-on security in firefox was analyzed by practical implementation of addons in javascript and XUL. These addons were successfully able to bypass firefox’s security mechanisms.
A cyber crime called 'Bot Networks', wherein spamsters and other perpetrators of cyber crimes remotely take control of computers without the users realizing it, is increasing at an alarming rate. Computers get linked to Bot Networks when users unknowingly download malicious codes such as Trojan horse sent as e-mail attachments. Such affected computers, known as zombies, can work together whenever the malicious code within them get activated, and those who are behind the Bot Networks attacks get the computing powers of thousands of systems at their disposal.
Within this report is information on how Java Script is used on the Internet. This report will contain information that will help you learn about Java Script and its uses on the Internet. It mentions what Java Script is, where it originated and what some of its uses are.JavaScript is a loosely typed scripting language that resembles the programming language C. It is designed to be an extension to HTML and is usually included within HTML scripts. Java Script is object-oriented and has block-structuring features. The main feature of Java Script is that it lets you build interactive web pages.
Dynamic content is the hottest topic in web development right now. Dynamic content refers to content that constantly changes and adapts to specific users whenever possible. For example, JavaScript can be used to determine if a website visitor is using a computer or a mobile device before deciding whether or not to render the mobile version of the website. It’s these small things behind the scenes that create genuine value in using JavaScript to create dynamic web pages.
Malicious code, also known as malware, installed on a computer provides an attacker with the control over this machine. Therefore, malware can be defined as “a set of instructions that run on your computer and make your system do something that an attacker wants to do”. It is more common to see malicious code to be implemented in binary executable files. However, it can be implemented in almost any computer language. Attackers have used a huge number of scripting languages, word processing macro languages and a h...
Introduction This report will look at viruses. It will look at what a virus is and what they do it will also look at why people create viruses and for what purpose. The report will also look at examples of famous well known viruses and the ways you can defend against viruses. What is a Virus?
Cross-Site Scripting (XSS) was the number one vulnerability in 2007 and remains prevalent today. XSS occur when an application takes untrusted data and sends it to a web browser without proper validation or escaping. This allows the attacker to implement scripts in the victim’s browser which allows them to execute various types of damage. By successfully utilizing cross-site sc...