Get help now

Report on a Malicious Code Attack

  • Pages 3
  • Words 625
  • Views 541
  • dovnload



  • Pages 3
  • Words 625
  • Views 541
  • Academic anxiety?

    Get original paper in 3 hours and nail the task

    Get your paper price

    124 experts online

    Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a computer or system without the owner’s knowledge or consent. There are much exploitation of vulnerabilities, like viruses, worms, Trojan horses, several, Edward, and roots. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, backdoor, and malicious active content. Malicious code is an application security wreath that cannot be efficiently controlled by conventional antivirus software alone.

    Malicious code can either activate itself or activate after a user perform an action, such as clicking on something or opening an email attachment. The most recent cybernetics were laid against the Canadian government by Chinese hackers, who penetrated the computer systems of two key agencies, the Finance Department and the Treasury Board, forcing them offline. With advances in network collaboration tools, from email disappoint 2010, there is incredible potential for sharing and collaborating ideas and information. Unfortunately, mallard can spread just as easily.

    As computers have evolved, so have the attacks against them. But before the Internet became so widely accessible, viruses spread mainly through floppy disks and other removable media. The following article will explore some of the most notorious email hacks and viruses from the past, to the present.

    Worm year: 1971

    Users affected: DECK PDP-II computers running the TENET operating system.

    Infection and spread: Using the Tenet operating system and ARPANET, a self- replicating virus spread between DECK PDP 10 systems displaying the message, I’M THE CREEPER CATCH ME IF YOU CAN”.

    Hacker Motivation: (Experiment) Not intended to be malicious, the virus was designed by BIN Technologies engineer Bob Thomas to explain how a virus could infiltrate, and be replicated throughout a localized computer network. Damage caused: (Minor) Some sources claim the Creeper replicated so many times, that it crowded out other programs, but the extent of the damage is unspecified. Aftermath: The “Reaper” was created to fight the Creeper. It was the first piece of anti-virus software, also a self-replicating aerogram that spread through the system, removing the offending virus from infected computers.

    ELK CLOSER Type : Boot sector Year: 1982 Users affected: Apple DOS 3. 3 computers Infection and spread: Spread “in the wild” via floppy disk. Once an infected disk was booted, the virus loaded into the memory and infected the boot sector. Elk Closer would be copied to the disk, allowing it to spread from disk to disk.

    Hacker Motivation: (Practical joke) Authored by Rich Serenest, a ninth-grade student who wanted to play a joke on his schoolmates. An infected computer would display he short poem displayed above on every 50th boot.

    Damage caused: (Minor) Infected all the computers used by Serenest and his friends, even some used by the staff at his school. Aftermath: Serenest wrote countless other computer programs and also started the online news business Topic. But, he is still remembered most for unleashing the “Elk Closer” virus on the world. OLIVETTI a. K. A. THE LOVE BUG Year: 2000

    Users affected: Computers running the Microsoft Windows operating system Infection and spread: The worm appeared in email inbox, posing as a contact, tit the message “LOUVER” in the subject line.

    Once the attachment was opened, the worm sent a copy of itself to everyone in the person’s Windows Address Book. It also made a number of malicious changes to the user’s system.

    Hacker Motivation: (Revenge) Two young Filipino computer programming students, Roomer Ramose and Noel De Gunman, created the virus. De Gunman was already familiar with computer viruses. He had proposed to create one for his undergraduate thesis, which was not accepted, forcing him to drop out.

    Damage Caused: (Major) Infected over 50 million computers in 9 days.

    This essay was written by a fellow student. You may use it as a guide or sample for writing your own paper, but remember to cite it correctly. Don’t submit it as your own as it will be considered plagiarism.

    Need a custom essay sample written specially to meet your requirements?

    Choose skilled expert on your subject and get original paper with free plagiarism report

    Order custom paper Without paying upfront

    Report on a Malicious Code Attack. (2018, Jul 04). Retrieved from

    Frequently Asked Questions

    Feel free to contact us anytime, we are always ready to help you!

    What are examples of malicious code?
    Taking advantage of common system vulnerabilities, malicious code examples include computer viruses, worms, Trojan horses, logic bombs, spyware, adware, and backdoor programs. Visiting infected websites or clicking on a bad email link or attachment are ways for malicious code to sneak its way into a system.
    What is a possible effect of a malicious code?
    Once inside your environment, malicious code can enter network drives and propagate. Malicious code can also cause network and mail server overload by sending email messages; stealing data and passwords; deleting document files, email files or passwords; and even reformatting hard drives.

    Hi, my name is Amy 👋

    In case you can't find a relevant example, our professional writers are ready to help you write a unique paper. Just talk to our smart assistant Amy and she'll connect you with the best match.

    Get help with your paper
    We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy