malware types with multiple functions how ransomware is rising to the top of the malware chain

Malware, also known as malicious software, can be classified several ways to distinguish the unique types of malware from each other. Distinguishing and classifying different types of malware from each other is important to better understanding how they can infect computers and devices, the threat level they pose and how to protect against them.

Malware types with multiple functions

Individual malware programs often include several malicious functions and propagation routines—and, without some additional classification rules, this could lead to confusion.

For example, a specific malicious program may be capable of being spread via an email attachment and as files via P2P networks. The program may also can harvest email addresses from an infected computer, without the consent of the user. With this range of functions, the program could be correctly classified as an Email-Worm, a P2P-Worm or a Trojan-Mailfinder. According to Massachusetts Inventor (2012), there are sets of rules that can automatically categorize a malicious program as having a particular behavior, regardless of the program functions. This classification can be based on behavior which has its own threat level. Additionally, the behavior can be categorized by which may pose a higher risk than the other.

So, in our example, the Email-Worm behavior represents a higher level of threat than either the P2P-Worm or Trojan-Mailfinder behavior—and thus, our example malicious program would be classified as an Email-Worm.

Multiple functions with equal threat levels

If a malicious program has two or more functions that all have equal threat levels—such as Trojan-Ransom, Trojan-ArcBomb, Trojan-Clicker, Trojan-DDoS, Trojan-Downloader, Trojan-Dropper, Trojan-IM, Trojan-Notifier, Trojan-Proxy, Trojan-SMS, Trojan-Spy, Trojan-Mailfinder, Trojan-GameThief, Trojan-PSW, or Trojan-Banker—the program is classified as a Trojan.

If a malicious program has two or more functions with equal threat levels—such as IM-Worm, P2P-Worm, or IRC-Worm—the program is classified as a Worm.

Read the following in preparation for the discussion:

Gallagher, S. (2016). New ransomware installs in boot record, encrypts hard disk[Updated]. Retrieved from https://arstechnica.com/security/2016/03/new-ranso…

Goodin, D. (2017). Tuesday’s massive ransomware outbreak was, in fact, something much worse. Retrieved from https://arstechnica.com/security/2017/06/petya-out…

Given the current state of malware, please discuss how Ransomware is rising to the top of the malware chain. Research the recent outbreaks of ransomware and discuss how this could threaten Saudi companies, personal systems, etc. and disclose methods of ingress into systems as well as methods of countering the threat.

In preparing your response, cite at least one source from professional or academic literature, such as articles from peer-reviewed journals and relevant textbooks. For this course, the use of Wikipedia is not considered an academic or professional reference. You should also be sure to proof-read and spell-check your responses. All sources should be formatted per Saudi Electronic University academic writing standards and APA style guidelines.

Be sure to support your statements with logic and argument, citing any sources referenced. Post your initial response early and check back often to continue the discussion. Be sure to respond to at least two of your peers’ posts, as well.

Reference:

US Patent Issued to CA on July 24 for “System and method for using rules to protect against malware” (Massachusetts Inventor). (2012, July 30). US Fed News Service, Including US State News.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.


Posted

in

by

Tags: