Explore chapters and articles related to this topic
Design Features to Address Security Challenges in Additive Manufacturing
Published in T. S. Srivatsan, T. S. Sudarshan, K. Manigandan, Manufacturing Techniques for Materials, 2018
Nikhil Gupta, Fei Chen, Khaled Shahin
A computer worm is a stand-alone malicious computer program that replicates itself and uses a computer network to spread to other computers. Unlike a computer virus, which needs to attach itself to a program or file in order to spread from one computer to another, worms leave infections as they travel. A Trojan horse is a malicious computer program that appears to provide normal functionality, but whose execution usually takes place in the system’s background and results in harmful actions (Kemmerer 2003). Severity of this malware ranges widely: some may cause only mildly annoying effects like unwanted advertisements, while others can damage the hardware, software, or private files. Anti-virus software and firewalls are used to protect against malicious activities and to recover from attacks. The infected computers can be isolated and prevented from disseminating further trusted information by imposing an “air gap,” by completely disconnecting them from all other networks (Guri et al. 2017).
Multi-Pattern Matching Based Dynamic Malware Detection in Smart Phones
Published in Krzysztof Iniewski, Santosh K. Kurinec, Sumeet Walia, Energy Efficient Computing & Electronics, 2019
V. S. Devi, S. Roopak, Tony Thomas, Md. Meraj Uddin
Smart phones contain lots of personal data, such as financial account details, images, documents, and much more. Hence, nowadays, smart phones have become an important target for malware developers. A malware/virus is a piece of software that attaches to an executable file, and, when such a file starts running, the viral code gets executed. Malware is able to perform various functionalities such as overwriting programs on the system, destroying or deleting data, or erasing everything in the memory. They spread when the file is copied or moved from one phone to another using the network, file sharing, or e-mail attachments. There are different types of viruses. Among them, worms and trojans are more common. A worm is a stand-alone malicious program. It is a self-replicating program that uses a communication channel to send its copy to other systems. A worm can delete files, encrypt files, send junk e-mail, and consume network bandwidth. The first smart phone malware was a worm called Cabir, which propagated through Bluetooth. A trojan horse is a program that presents itself as a legitimate program, while it actually contains malicious code segments. A trojan always stays hidden on the infected system and performs many types of attacks, such as generating pop-up windows, deleting files, stealing data, or activating and spreading other malware, like viruses or bots. Trojan can open back doors for providing access to the system for malicious activities. It spreads through e-mail message attachments, copying files from storage media, such as USB keys, or during file downloads from the Internet.
Computer and Internet Crime
Published in G. K. Awari, Sarvesh V. Warjurkar, Ethics in Information Technology, 2022
G. K. Awari, Sarvesh V. Warjurkar
Computer worms, like viruses, replicate functioning copies of themselves and may do the same kind of harm. Unlike viruses, which spread by infecting a host file, worms are isolated programs that do not need a host program or human assistance to spread. To spread, worms either take advantage of a flaw on the target device or use social engineering to persuade users to run them. A worm infects a device by exploiting a system flaw and using the system’s file-transport or information-transport features to fly unaided. To damage their victims, more sophisticated worms use cryptography, wipers, and ransomware technologies.
Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning
Published in Behaviour & Information Technology, 2023
Neha Chhabra Roy, Sreeleakha Prabhakaran
Additionally, cybercriminals must be prosecuted to prevent similar incidents in the future. Under the Information Technology Act, 2000 (Section 66), the punishment for fraudsters is imprisonment of up to one year or a fine of up to INR 1 lakh. For example, banks can monitor and manage unwanted traffic. They can create a denial-of-service response plan, move to cloud computing, enable email authentication, limit routers to prevent overloads, deploy web filters to block malicious websites, and increase the bandwidth of a reactive mitigation plan. They should update their operating systems and software patches, use firewalls, and encrypt sensitive information for security reasons. Implementing these measures can reduce web jacking, malware attacks, spamming, phishing, denial of service attacks, salami attacks, and virus and worm attacks. The cybersecurity culture should be fostered through mandatory awareness and training programmes, non-disclosure agreements with employees, ethical phishing attacks to test employee vigilance, penetration testing, and audit programmes (Ben-Asher and Gonzalez 2015). By implementing these actions, employees will be in a continuous state of readiness and be aware of existing cybersecurity measures within the bank. Yazid and Suryanto (2017) suggested that auditors, board members, and other officials should be trained to maintain strong internal controls, follow regulatory procedures, and ensure corporate governance (Lacey et al. 2020).
Intelligent predictive stochastic computing for nonlinear differential delay computer virus model
Published in Waves in Random and Complex Media, 2022
Nabeela Anwar, Iftikhar Ahmad, Adiqa Kausar Kiani, Shafaq Naz, Muhammad Shoaib, Muhammad Asif Zahoor Raja
As the popularity of the internet grows, the number of network-based apps also increases in our daily lives which can pose a threat to network users in the same way that malware might [1]. Understanding the mechanism of virus spread is crucial for computer security and defensive measures [2]. Computer viruses are computer programs that have the ability to infect other programs by altering and duplicating them [3]. In general, a computer virus itself is a harmful computer program with the ability to replicate itself in order to target a computer or valuable content; examples of common viruses include Trojans, logic bombs, worms, spyware, logic bombs and so on [4,5]. These apps conduct damaging actions on personal data, such as deleting, changing, manipulating, and encrypting files [4]. One of the most ongoing threats to communication and information equipment is blog scanned worms. One type of worm is the Autorun malware [6]. The Autorun.inf file in the current operating system provides the autoplay functionality. Even without information of the hosted user, all such gadgets have been probably infected and confronted without complexity to certain other systems via removable media or networking equipment [7]. When USB peripherals are linked to the operating system, the autoplay worms enable the operating system to launch an installer via the Autorun.inf file.
A game-theoretic method for resilient control design in industrial multi-agent CPSs with Markovian and coupled dynamics
Published in International Journal of Control, 2021
Jiajun Shen, Xiangshen Ye, Dongqin Feng
The globally worst-case disturbance strategy denoted in Equation (7) is indeed designed under the mass of all ‘cooperative’ controller (with same optimisation/control goal, i.e. minimising the overall cost function ), and aims to degrade the overall system performance. The reason why we adopt this worst-case design setting is due to the practical security scenario of industrial multi-agent CPSs where the malware payload of rational attackers is of indirect type (such as Stuxnet Langner, 2011, Duqu worm Tsoumas & Gritzalis, 2012, Flame virus Marks, 2012). Comparing with the direct type malware payload (such as BlackEnergy Kang et al., 2015, PowerGrid attack Zhu et al., 2019), the indirect ones are always more covert and hard to detect since it will not directly give rise to explosion or breakdown of physical plant device but compromise the system/control performance such that some process indices (production standards) are not satisfied. In this case, due to the complexity and large scale of coupled industrial production process, the engineering/administrator is less likely to locate the specific component (or trace the attack route), which has been compromised, and has no choice but to shut down the production line for resetting and re-downloading the secure configuration and control code. Consequently, the rational attack can postpone the specific project/construction, and cause economic loss.