Preview

Case Study: The Malignant Virtual Threat: Malware

Better Essays
Open Document
Open Document
1842 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study: The Malignant Virtual Threat: Malware
The Malignant Virtual Threat: Malware
Malware is a danger to our virtual society and appears in a myriad of forms Worms, Viruses, Trojan Horses, Macro viruses, Spyware. More forms of malware are being developed every day known as zero-day attacks since they haven’t been seen before, some of these have the possibility to be a new form of malware and the rest will fit the types previously listed. These high-profile attacks have consumers and companies considering more high-technology defense strategies. There are countless others that don’t want to consider them and they are weak links in virtual security. Some vendors that control programs or features numerous customers use such as: power grid management, shipping software, hospital patient
…show more content…
Currently there are cars that can drive themselves, but even older models of cars that rely in electronic signals to control steering, speed, GPS, and electronic sensors these systems can become compromised even with a driver behind the wheel trying to give the vehicle the opposite command not just new and driverless ones. Moreover, systems capable of easy exploitation are so wide spread Ubisoft managed to create two games in the Watch Dogs series to point this out and one of the games had a promotional stunt of interacting with people in a smart home Ubisoft had control over; part of said stunt was allowing internet viewers to choose how to meddle with the people inside the smart house. The stunt was live streamed on the large video screens in Toronto’s Younge and Dundas Square as well as on YouTube. Crime Watch Daily’s Ana Garcia did a report about the vulnerabilities of insecure networks and they had some virtual security experts come in and test the defenses on one production member’s smart house they were easily able to hack into the home network with permission due to weak security settings. Nevertheless, the security specialists secured the home network of the vulnerabilities like the camera system having a bad password. A technology channel on YouTube called Motherboard has a series called, Phreaked Out it is about technological dangers this kind of reckless networking puts people in. The media is picking up on the dangers; however, no one is bringing out enough provoking arguments to change the minds of those who want to worry about networking everything, but not applying proper up to date security measures to the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The CIO has requested that we follow up with a plan that is detailing a strategy for addressing all risks identified in the previous research. This plan needs to identify controls in administration, preventative, detective and corrective. With this data, the business will be able to mitigate each risk that we identified earlier. The following paper will explain the approach to correcting the various malware.…

    • 1122 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The Greeks and the Romans were among the most influential societies in the history of the world. Evidence of Greek or Roman influence can be found in almost every culture or country that has ever existed. Though both cultures were different in practice and incredibly competitive with one another, their politics and their beliefs set the stage for future civilizations, including those of the modern world. In particular, the values and practices of Greek and Roman citizenship and politics, more than any other cultures, influences American policies today in terms of values, government, and self-image.…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Good Essays

    1) The subfields of anthropology seem quite diverse in their specific subjects and methods. Why, then, are they all considered parts of the single discipline of anthropology? What ties them together? Anthropology is divided up into four sub-fields of study (Park, 2014). The four sub-fields are biological anthropology, cultural anthropology, linguistic anthropology, and archaeology (Park, 2014).…

    • 1302 Words
    • 6 Pages
    Good Essays
  • Good Essays

    - Endpoint security market in constant growth : lots of customers agree to pay an expensive software if it’s very efficient, because the number of malicious programs is increasing and they want to have a total protection…

    • 872 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nowadays, security software is becoming a major part of enterprise business. Software development is activity connected with advanced technology and high level of knowledge. After viewing the growing number of malicious activity, it is now imperative that we develop a plan and stick to it. There are so many threats to vulnerabilities and threats that leave systems open to malicious attacks. Whenever you sit at a computer and log onto the internet, your system, becomes vulnerable. There is now potential for malicious attacks. Knowing what to look for can prevent a lot of these attacks.…

    • 534 Words
    • 3 Pages
    Good Essays
  • Best Essays

    There is an exigent need for creative ideas leading to the next generation of cyber security capability. Existing approaches are simply not able to meet the demands of a global society growing in cyberspace on the current path. New business models are forcing greater interdependency between people, organisations and nation states in order to successfully manage cyber risk. Success will necessarily require an ability to anticipate, deter, detect, resist and tolerate attacks, understand and predict cyber risks, and respond and recover effectively at all levels, whether individual, enterprise, national or across international markets. In order to meet the demands of the future we will require new understanding, governance, regulation, partnerships, skills, and tools.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Satisfactory Essays

    1984 vs 1983

    • 2142 Words
    • 6 Pages

    Technology is a wonderful thing, but in the words of Spider-Man's Uncle Ben, "With great power, comes great responsibility." If we are not careful, the technology we know and love could be used against us, even subtly. In reality the technology of today better resembles dystopian visions represented by George Orwell’s ‘1984’ following Winston Smith’s fight against the totalitarian state rule of England, Steven Spielberg’s film “Minority Report”, set in a dystopic future where pre-crime bears the authorisation to arrest ‘criminals’ based on the simple predictions of ‘Pre-Cogs’ and Phillip K Dick’s novella “Minority report” based on the paradoxes raised by predicting future. The three texts represent the dystopia we face as we become a more connected society. With social networks, cloud computing and even more specific, less-thought-about tech such as Internet-connected home surveillance systems, we will find ourselves in a delicate balance of trust and paranoia.…

    • 2142 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Autonomous cars have many applications a driver should always be capable of taking over as a safety measure. Putting too much faith into self-driving vehicles will cause people to be less alert they themselves may depend too highly on the vehicle's decision making putting themselves at risk. The authors of a Gale opposing viewpoints article made it known that “At a 2013 technology conference in Las Vegas, researchers demonstrated how the computers in driverless cars could be hacked to making them drive erratically and dangerously. “These virus’ are capable of taking over a car's control system wreaking havoc on the road at any moment. As stated by Zeller “the virus’ supposedly enter the cars over the Bluetooth wireless link that lets drivers use their cellphones to carry on hands-free conversations through the cars' microphones and speakers.” These new devices are flawed misleading car buyers into seeing these system as an improvement reducing the risk while at the same time providing a path to put yourselves in harm’s…

    • 1469 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Self-driving cars should not be legalized for countless reasons; the dangers they bring will result in a dangerous society and a deteriorating economy. Self-driving cars will endanger millions because they come with cybersecurity issues.(Auto Insurance Center) ”The very security behind self-driving cars would be a major obstacle, especially because the technology would be of very high interest to hackers, as pointed out by the Guardian” (Auto Insurance Company) Unlike other hacks, cyber attacks on self-driving cars will put human lives at immediate risk. This is because hackers will have easy access to personal information; this includes credit card numbers and medical information. (Krome, Charles) In addition to this, terrorists would use self-driving cars as a huge ally; they can use the autonomous vehicles as moving bombs by loading them with greatly impactful explosives. (Goodman) The damage that these hackers will cause if…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    These days, We have smart houses that allow you to run everything in your house. Smart Tech is even being used in Trucking. With the way, it works when it comes to your house; people could believe that accidents when it comes to trucks on the road could be non existance. But they are wrong. We do not live in a perfect world. Things like driving cars and never getting into accidents, that does not happen. What happen is that there is smart tech which make so there is less crowding on the highways and people on the road can get to where they are going faster. People driving trucks will love that because they will be less chance of them being late with cargo they have. One such website as http://americancityandcounty.com/technology/transportation-technology-smart-20101015…

    • 137 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Hacking In Driving

    • 373 Words
    • 2 Pages

    But now imagine what they could do to self-driving cars the results would be disastrous. The companies that are making these cars are lying about them because one of their self driving cars ran a red light on self driving mode and it is proven that even though they say these self driving cars are fairly safe and hard to hack but a Cybersecurity expert, Jonathan Petit, had confused “hacked” the self driving car with only $43 and a laser pointer. It shows how weak the Think of this like the British empire they said it would last forever but look where that…

    • 373 Words
    • 2 Pages
    Satisfactory Essays