Topic > Malware Essay - 2604

NTRODUCTION This document is intended to educate about the problem of malicious software (malware). According to research conducted by the AV-Test Institute, over 220 thousand malicious programs are registered due to malware every day. Malicious software or malware, according to the Bull Guard Security Center, refers to computer programs created to interfere with or destroy the functioning of computers, without users' consent. Malware can take the form of worms, viruses, Trojans and spyware threats that can disrupt the security of any data system and even lead to denial of access to information on that system. Since these malicious attacks are so vulnerable in the technological environment, this study is being undertaken in order to gain more knowledge about its roots, its current intrusion mode and its threats for the future if safeguard methods are not implemented with Force. The malware originated in 1970, when it was created by BBN engineer Robert H. Thomas. A brief explanation in this research will be how these engineers' attempt to demonstrate a mobile application via the "Creeper Worm" failed as it initiated a threat that destroyed the system. Also, an outline of how a 15-year-old boy, Rich Skrenta, and his likenesses in computers, turned a prank into a virus and the consequences that followed. Furthermore, malware today is nothing compared to what it was in the 1990s. , because as technology became more advanced, so did malware. Every day, cyber criminals constantly launch attacks on various forms of personal data and information. As a result, safeguarding information has become a priority for many organizations. Details on how this process of rampant intrusion… middle of paper… moves forward, just as it has over the last two decades." They believe, however, that the malware will operate in a much more populated “mobile device landscape,” thus making information security initiatives and efforts even more difficult. (Roberts 2013) CSO Online, which is also a subsidiary of McAfee, highlighted in a 2013 report titled “Malware of the Future Could Damage Bytes, Bones and Brains.” claims from cybersecurity companies that future malware will distort the distinction between digital and similar damage as early as 2020. This concern was presented in a report by the International Cyber ​​Security Protection Alliance and the European Crime Center. According to the report, “evolving threats to critical infrastructure and human facilities will increasingly blur the distinction between cyber attack and physical attack, resulting in offline destruction and physical damage.”.