Malware
Since the earliest days of humankind, inventions from the wheel to nanotechnology have been used and abused for unethical or illegal purposes. Why would it be any different for computer and Internet technology? In fact, the proliferation of computer exploitation necessitated an entirely new language. Overall, “malware” is software designed to infiltrate or damage a computer system, without the owner’s informed consent. According to Wikipedia, malicious and undesired software such as computer viruses, worms, Trojan horses, spyware, adware and other malicious and unwanted software. In law, it is sometimes called a computer contaminant. In a very short time, malware became so widespread that it developed into a major aspect of computer technology. It raised a host of problems, challenges, dilemmas and questions about security, rules and regulations, prevention and punishment.
As soon as computers were understood, there were those who were ready to exploit them. Viruses started appearing on dedicated networks such as the ARPANET in the 1970s. The boom in personal computers, initiated by Apple in the early 1980s, led to a corresponding boom in viruses. As more and more people gained hands-on access to computers, they were able to learn how the machines worked. And some individuals inevitably used their knowledge with malicious intent.
Viruses were one of the first kinds of malware. Like actual biological viruses, these are self-duplicating computer programs that spread by inserting copies of itself into other executable codes or documents instead of living cells (Wikipedia). Viruses range from bothersome to destructive as eliminating data. Important to note is that viruses cannot procreate without the help of human users. People continue the spread of a computer virus, usually without knowing, by sharing infecting files or sending e-mail that contain the virus. Worms, a subset of viruses, spread from one computer to the next. However, they have the ability to travel without any help from a person. A worm uses a file or information transport to move between computers. Blaster Worm., for example, was designed to tunnel into computer systems and allow devious users to control other people’s computers remotely.
Trojan horses sit and wait until summoned by a certain command and then reak avock, such as destroying files, and worms or pieces of software that use computer networks and security flaws to create copies of itself. Some Trojans are created to be more annoying than malicious: They change a person’s desktop by adding inane desktop icons, for instance. Or they can cause serious damage by deleting files and destroying information (Wikipedia).
Robbers steal because it gives them property to sell. Why do individuals write software that hides until awakened and then causes destruction? At first it was for recognition; it was done because it could be done. Soon, individuals followed the traditional purpose of gaining economically through fraud. They can get something that costs for nothing. The first Trojans were created to get onto the Internet through AOL, and later to do the same with games and other paid software. Such theft was and still remains a crime.
Now there are a host of individuals who do this for much larger payback. They steal valuable information, extract money directly from end users, or creating and selling a spamming platform for others. Presently, virus writers either work for particular spammers or sell their wares to those who will pay the highest. Once in the backdoor control is taken of the infected computer and used to be “spam zombie” and send advertising e-mail. They also create Trojan spies that can steal electronic cash from e-wallets, Pay Pal accounts and/or directly from Internet bank accounts. There are also those who threaten organizations, or actually blackmail, that they will conduct a DoS attack against their, such as e-stores, banking and gambling sites (viruslist.com).
As with any other human behavior, there are grey areas of right and wrong, which are more unethical than illegal. A threat growing along with the Internet is known as spyware. These applications, unknown to the users, make their way into the computer and allow vendors to track your computer habits and buying interests. The dilemma of the right to privacy vs. The right of companies to acquire data continues.
Many ethic and legal problems presently occur in the realm of the Internet, because the technology has developed faster than the corresponding legal system. For example, the U.S. legal system is just starting to look at and decide on cases concerned with privacy the rights. Especially with spyware, end-users do not like to be monitored and manipulated, while the marketing industry sees these technologies as a tool to reach new customers, gather information that is used to provide the products desired.
In fact, a number of states (National Conference of State Legislators) are now studying or enacting legislation regarding the ethics and legality of spyware. In Hawaii, the law prohibits the unauthorized access to or control of a computer or the inducing, by misrepresentation, authorized person to load software. Authorizes attorney general or prosecuting attorney to seek up to $2,500 per violation. Authorizes private action to recover $5,000 per violation or 5 times the amount of damage cause, whichever is greater.
The Illinois Spyware Prevention Initiative Act, if passed, would prohibit a person or entity other than the authorized user of a computer from causing computer software to be copied onto the computer and using the software to: (1) take control of the computer; (2) modify certain settings related to the computer’s access to or use of the Internet; (3) collect, through deceptive means, personally identifiable information; (4) prevent, without authorization, an authorized user’s reasonable efforts to block the installation of or disable software; (5) misrepresent that the software will be uninstalled or disabled by an authorized user’s action; or (6) through deceptive means, remove, disable, or render inoperative security, antispyware, or antivirus software installed on the computer. Prohibits a person or entity who is not an authorized user from inducing an authorized user to install a software component by misrepresenting that it is necessary for security or privacy or in order to open, view, or play a particular type of content. Prohibits a person or entity who is not an authorized user from deceptively causing the copying and execution on the computer of software components with the intent of causing an authorized user to use the components in a way that violates the Act. Makes a violation of the Act a Class B misdemeanor. Contains severability provisions (National Conference of State Legislators).
In the meantime, each organization has to decide how it will best protect the information it has from potential malware. This was especially noted when the computer system of the major insurance company American International Group (AIG) was victimized from a theft that revealed personal account information of almost one million insurers. This included Social Security numbers and tens of thousands of medical records of potential customers. With $843 billion in assets, even this huge business entity could not completely guarantee safety against malware (Smith, 2006).
Ironically, a large number of the security problems are due to the companies themselves. For example, a laptop stolen from the house of an ING employee in Washington, D.C., held the retirement plan data, including Social Security numbers, of 13,000 city employees. Similarly, a laptop of an Aetna employee, which contained the names, addresses and Social Security numbers of 38,000 Department of Defense and Omni Hotel employees, was stolen after he left it in his car (Smith, 2006).
Too frequently, then, the malware problem is internal more than external. According to the security firm ControlGuard about 70% to 80% of data breaches are committed by company insiders. At the enterprise level, there is an agreement that removal media and portable devices with great numbers of data are unmanaged and unsupervised. As organizations increasingly move towards the adoption of new preventative security products, a debate has arisen concerning the best way of detecting and preventing malicious activity — that is, behavioral rules or Many security products detect malicious attacks, but very few actually take preventive action to handle them once they occur (Franklin, 2002). A new form of security product is developed to detect malware, but also to prevent it from causing damage, without human intervention. However, within the field of preventative security products, opinion is divided over the best way to detect and then prevent hacking activity: signatures or behavioral rules.
A signature is a specific description of a known attack, or a pattern of characters that can be matched against a data stream. For example, a signature searches for the string .. / in an HTTP request to a web server. If the signature matches the characters in the request, the signature triggers a response from the security product. Most anti-virus (AV) and intrusion detection systems (IDS) presently use the signature-based approach for the majority of detection schemes. When a new malware threat is discovered, a specific response or signature is written to ensure the system can recognize and deal with the attack if it happens again (Franklin, 2002)
The advantage of a signature-based approach is that it enables the security administrator to specifically identify an attack. However, nothing can be done until the malware actually occurs. With all the different viruses, worms and Trojans, how can security managers possibly predict what malware will occur next? In contrast, a behavioral rule defines legitimate activity in a system. Any activity not matching the profile will cause the security product to be triggered. As rules are not specific to a particular type of attack, they can block malicious behavior without having to recognize the precise attack used. Thus, there is additional protection against new attacks as they emerge. It is to effectively prevent any unauthorized applications, including malicious code and Trojans. or, it could protect a webserver by making it impossible for anyone to access the webserver to change the files and limiting the risk of a hack (Franklin, 2002).
However, the dilemma comes how many rules should the system have? The security manager must decide between an effective security procedure and a low number of false alarms. Applying too many rules will keep the company from meeting its basic business objectives and becomes very difficult to maintain. However, not using enough rules allows the application to proceed unchecked and potential malicious intrusion. In addition, because computer systems are continually changing, rule and signature changes are necessary for each server with every system change. This makes the rules-based solutions not only inaccurate, but also impractical to use across the enterprise on production systems. If one makes a system more secure, it makes a system harder to use, and vice versa.
There is no easy answer to the malware dilemma. Because of this, efforts must be taken at different levels. The states should continue to pass laws against computer crime. Companies need to find the balance between too many and not enough rules. They also have to continually educate their people who have their hands on a great deal of valuable information. As long as there are individuals who are willing to take unethical or illegal steps for personal gain, processes have to be in place to prevent them.
References Cited
Bowyer, K.W. (2003). “Living responsibly in a computerized world.” Ethics and Computing. New York: IEEE press.
Control Guard. http://www.controlguard.com/index.asp
Franklin, I. (November 26, 2002) “Entercept Security Technologies: Rules or signatures?
The best method of prevention.” Toolbox. Retrieved from website September 16,
2006. http://security.ittoolbox.com/documents/peer-publishing/rules-or-best-method-of-prevention-3212.
National Conference of State Legislators (July 13, 2006). “2006 State Legislation
Relating to Internet Spyware or Adware.” Website retrieved September 15, 2006.
Smith, R.E. (September 7, 2006) “Laptop Hall of Shame” Forbes.com. Website Retrieved September 16, 2006.
http://www.forbes.com/columnists/2006/09/06/laptops-hall-of-shame-cx_res_0907laptops.html.
Viruslist. “Malware” Website retrieved September 16, 2006. http://www.virusbtn.com.
Wikipedia. (September 16, 2006) “Malware.” Website retrieved September 17, 2006.
http://en.wikipedia.org/wiki/Malware
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.
Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.
Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!
While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.
Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.
In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.
Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.
We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!
We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.
Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.
We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.
Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.
There is a very low likelihood that you won’t like the paper.
Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.
We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.
You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.
We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more