All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Malicious Code Trends, Essay Example

Pages: 1

Words: 316

Essay

Networks that are targets for malicious code attacks are vulnerable because they are improperly security and may possess errors in configuration. For example, the use of USB storage devices that are not properly secured, as well as open networks without proper password protection and other security measures (Symantec, 2011). The Internet poses a general threat to the security of many information systems because it is not difficult to breach security with malicious websites and links that make computers subject to continuous risk (Symantec, 2011). These attacks may ultimately compromise systems and networks, thereby increasing the level of need for security-based approaches that are comprehensive and effective in meeting the desired objectives (Symantec, 2011).

Other vulnerabilities include weak codes within software programs that are vulnerable to attack and which require higher levels of protection in order to minimize the risks of malicious attacks (Lee et.al). In these scenarios, hosts are compromised as a result of denial of service (DDoS) attack networks, and therefore, compromise system security and other weaknesses that will have a negative impact on operations and functionality of many systems (Lee et.al). With these weaknesses, individual and organizational systems are at risk of serious attacks that could ultimately compromise systems to the extent that they negatively impact functionality, often on a permanent basis (Lee et.al).

It is important to recognize the methods that are available to ensure that networks are not open to vulnerabilities, and that they possess considerable protections so that organizations are prepared to manage any potential compromises of data and information without any difficulties. This will enable organizations to improve their systems and to recognize risks on a continuous basis so that they do not devastate networks to the point that user functionality is no longer available.

References

Lee, R.B., Karig, D.K., McGregor, J.P., & Shi, Z. Enlisting hardware architecture to thwart                  malicious code injection. Retrieved from http://www.cs.jhu.edu/~rubin/courses/fall05/Lee03.pdf

Symantec (2011). Malicious code trends. Retrieved from http://www.symantec.com/threatreport/topic.jsp?id=threatreport&aid=malicious_code_trends_report

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay

The Term “Social Construction of Reality”, Essay Example

The film explores the idea that the reality we experience is not solely determined by objective facts but is also shaped by the social and [...]

Pages: 1

Words: 371

Essay

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay

The Term “Social Construction of Reality”, Essay Example

The film explores the idea that the reality we experience is not solely determined by objective facts but is also shaped by the social and [...]

Pages: 1

Words: 371

Essay