英国计算机信息技术学论文代写:防病毒程序

英国计算机信息技术学论文代写:防病毒程序

Rootkit是一款可以在用户同意的情况下安装和隐藏在计算机上的软件。如果安装这些rootkit,传统的防病毒程序可能无法检测到这些恶意程序(Blunden,2011)。它可能被包含在一个更大的软件包中,或被攻击者安装,攻击者利用了计算机上的漏洞,或者说服用户下载并安装它,它们主要与软件安装文件捆绑在一起并在不知情的情况下安装。 Rootkit本质上不一定是恶意的,但它们可能隐藏它们的恶意行为(Andress和Winterfeld,2013)。攻击者可能能够访问存储在您计算机中的信息,监控您的活动,修改程序或在您的计算机上执行其他功能而不被检测到。一旦这个rootkit获得访问权限,他们要么禁用或破坏安全软件,以使您的计算机暴露于威胁(Rid,2012)。这些背后的主要动机是访问诸如银行账户详细信息,卡号等的财务信息以利用用户。攻击者正在创建更复杂的程序,这些程序会自动更新并更难以检测到。

英国计算机信息技术学论文代写:防病毒程序

它也是一种自我复制的恶意程序,它消耗网络的带宽并可能导致性能下降。它可能在僵尸网络中扮演着重要的角色,取决于他们携带的有效载荷,例如允许黑客获得对被感染计算机的控制权的后门变成无人机或僵尸(Geers Kenneth。2011)。该计算机稍后成为用于发送垃圾邮件或发起DDoS攻击的僵尸网络的一部分。但是,对于僵尸网络来说,它们具有统一的控制能力,但是在蠕虫中却没有对它的统一控制。

Rootkit is a piece of software that can be installed and hidden on computer with user’s consent. If these rootkits get installed, the traditional antivirus programs may not able to detect these malicious programs(Blunden, 2011). It may be included in a larger software package or installed by an attacker who has been taken advantage of vulnerability on your computer or has convinced the users to download and installed it which are mainly bundled up with software installation file and get installed unknowingly. Rootkits are not necessarily malicious in nature, but they may hide their malicious activity (Andress and Winterfeld, 2013). Attackers may be able to access information stored in your computer, monitor your activities, modify programs, or perform other functions on your computer without being detected. Once this rootkit gains access, they either disable or corrupt the security software to make your computer expose to threats (Rid, 2012). The major motive behind these is to access the financial information such as bank account details, card numbers and, etc. to exploit the users. Attackers are creating more sophisticated programs which update automatically and get even harder to get detected.

英国计算机信息技术学论文代写:防病毒程序
Worm
It is also a self-replicating, malicious nature program which consumes the bandwidth of the network and can cause degraded performance. It may play an important role for botnet depending upon the payload they are carrying such as backdoors which allow hackers to gain control of your infected computer turn in into drone or zombie (Geers Kenneth. 2011). That computer later on becomes part of a botnet used to send spam or launch DDoS attacks. However, in case of botnet they have unified control but in worm there is no unified control over it.

相关的论文代写的话题