The information security has become important for every IT user. There are various cases of information hacking and phishing that encountered by IT users. Through this report, we will discuss about an essential topic of cyber threats that put bad influence over security of information. The purpose of making this report on a particular topic of security threat is to build an understanding and insight of current hot topics in information security. The main points that we will cover in this report are challenges, problems, relevant technologies and applications of technologies, impact of information security issues on real life and other important points.
The selected topic in information security is Malware: Present, Past and Future. Malware is a vulnerable cyber-attack on information systems, networks and databases. It is a malicious software and refers to any program that is deliberately created to perform an unauthorized and harmful action. Malware consists of various categories such as virus, spyware, Trojan horses, backdoor etc. The threat of malware is considered most recent threat for security of information. It has potential to cause loss of billions of dollars. Due to these reasons, malware is considered so much vulnerable (Bull, 2017).
To get rid of malware attacks, it is necessary to defend information systems, networks and databases from this vulnerable software. While defending against malware various challenges are faced by developers or security professionals that are listed as below:
Encryption is considered most effective technique to save data from cyber-attacks. But to achieve this, it is necessary to use of encryption techniques properly by network security experts. The lack of encryption services is a big challenge to defend information against malware attacks (Symantec.com, 2017).
Anti-virus is also an effective way to detect and scan malware or another viruses that are harmful for information systems and databases. No use of antivirus leads to heavy loss of information and enhance chances of malware attacks. It is also a main challenge to control malware and its vulnerable attack.
The information stored into database is high affected by malware attacks. In this case, it is better to keep secure that information by taking its backup into alternative storage device. This backup can be used to restore information that has lost due to malware. It is also a way to get defense against malware.
After knowing about these challenges to defend against malware attacks, now we will emphasize on problems that are faced by IT users due to malware attacks.
As we have discussed above harmful impacts of malware on information security and it is necessary to resolve this problem of malware attacks to sustain information security for long time. Here are some relevant technologies that we have found while analyzing prevention from malware.
The above discussion relevant technologies have various applications. These technologies can be used in any system, database and network where their users have detected cyber threats.
Every computer user has knowledge about malware and its effects. But there are some vague points found in case of malware and these are in form of questions asked by IT users.
Question 1: Can a computer virus like malware spread behind firewall?
Answer: In different ways, computer viruses are spread into system. Firewall is important for system but it is possible that computer viruses like malware can spread over local network (Ask(leo.com. 2017).
Question 2: Can firewalls and security packages cause problems?
There is no doubt that firewalls and security packages are helpful to keep things secure. But they can add their own level of confusion (Heimdal Security Blog. (2017).
The selected forum from which we have collected above discussed information regarding malware, its challenges and problems and vague areas, from that forum, we have also found issues of malware that are listed as below (Securelist.com, 2017).:
The given information in forum is accurate, but if we would contribute in this forum by posting essential information about issue of malware then we can understand malware and it effects in different areas in more appropriate way.
In selected forum, some essential malware issues are discussed but one issue that we would like add into given issues is that malware can corrupt boot file of computer system and can damage whole information stored into database. It means if malware has installed into our system then its early solution is required to protect computer from other vulnerabilities.
The above discussed malware issues are malicious enough and put harmful influence on our real life in following ways:
The most important thing that we have learnt from this discussion that malware is very much harmful for our computer systems and databases and can provide more vulnerable results if it will not be controlled on time. In above discussion we got to know essential challenges, problems and issues of malware that can damage information, files and folders from system. Therefore, all discussed prevention techniques should be used by every computer user to get rid of malware or any other attack (Cooney, & World, 2017).
At last we conclude that most of the people work with computers and networks but a few of them take care about security of their systems by using security tools and techniques. Due to these reasons issues of malware attacks occur and increasing continuously. Therefore, every computer user should use security tools and techniques to reduce issues of malware.
Bull, D. (2017). The Past, Present, and Future of Phishing and Malware | McAfee Blogs. McAfee Blogs. Retrieved 19 April 2017, from https://securingtomorrow.mcafee.com/business/security-connected/past-present-andfuture-of-phishing/
Cooney, M., & World, N. (2017). 10 common mobile security problems to attack. PCWorld. Retrieved 19 April 2017, from http://www.pcworld.com/article/2010278/10-commonmobile-security-problems-to-attack.html
Heimdal Security Blog. (2017). 10 Warning Signs that Your Computer is Malware-Infected [Updated]. Retrieved 19 April 2017, from https://heimdalsecurity.com/blog/warningsigns-operating-system-infected-malware/
Reilly, A. (2017). The Challenges in Defending Against Malware - Smallbiztechnology.com. SmallBizTechnology. Retrieved 19 April 2017, from http://www.smallbiztechnology.com/archive/2011/09/the-challenges-in-defendingagainst-malware.html/#.WPdSJGclHIU
Symantec.com. (2017). Malware Infection Vectors: Past, Present, and Future | Symantec Connect. Retrieved 19 April 2017, from https://www.symantec.com/connect/articles/malware-infection-vectors-past-presentand-future
Assignment Writing Help
Engineering Assignment Services
Do My Assignment Help
Write My Essay Services