Analysis of Malware Attack and Strategies for Curbing The Threat

Journal Title: IOSR Journal of Mobile Computing & Application (IOSR-JMCA) - Year 2018, Vol 5, Issue 2

Abstract

Malicious Software otherwise known as Malware is software used or developed by attackers with the intent of disrupting computer operations. It can also be used to gather sensitive information, or to gain access to private computer systems. Today, devastating effects of Malware are not limited to individuals, but also governments, industries and financial institutions. It is very easy to send Malware to targets even at a very remote distance. Most of the users and other beneficiaries of the computer and Information Technology facilities are oblivious of the fact that there are Malware that often bypass their traditional security protection techniques and reside on their computer systems undetected. Users of computer systems face evolving challenges that they are not prepared to deal with. It is very pertinent that these challenges must be attended to with the application of the proper and adequate strategies and technologies. This paper is not only intended to assist stakeholders by creating awareness and bringing to fore the risks involved and other nasty activities associated with Malware in our day-to-day operations with the computer systems, it is also an attempt to bring to the understanding of all, especially security units of organizations and other interested parties, the effective methods and necessary steps to take in order to curb the menace.

Authors and Affiliations

Michael K. Adu, Kayode Okanlawon, Wakilu O. Adesanya, Rashidat Idris- Tajudeen

Keywords

Related Articles

“Software Defined Network”(SDN)

This paper explains a b out the basic concept of Software Defined Network (SDN). The paper also lists and discuss about the details of two sample products of Software Defined Network. Besides that, this paper also list o...

Wechat Uses And Gartifications Among Young Malaysian Adults In Klang Valley, Malaysia

The uses and gratifications (U&G) theory has been widely used in research related to conventional media and now the internet media and mobile platforms. In Malaysia, a number of Internet-related studies revolve around th...

An E-Commerce Model-View-Controller (MVC) Framework For A Cloud Based Environment

E-Commerce has turned into a need for organizations, especially independent companies hoping to augment benefit by utilizing financially savvy web based marketing strategies. Sufficient framework investigation and plan t...

Role of Social Networking and Media in Political Awareness in Public

The aim of the study is to examine how social networking can influence political awareness. The review of background further depicts that body of literature require focusing upon the fact that social media plays an immea...

Work-related Smartphone Use Outside of Official Working Hours: The Impact on Work-life Conflict and Work Engagement

Work-related communication technology use after hourshas been a profound influence on employee’s work and family lives. The purpose of this study was to investigatethe influence of work-related smartphone use outside of...

Download PDF file
  • EP ID EP439382
  • DOI 10.9790/0050-05022934.
  • Views 125
  • Downloads 0

How To Cite

Michael K. Adu, Kayode Okanlawon, Wakilu O. Adesanya, Rashidat Idris- Tajudeen (2018). Analysis of Malware Attack and Strategies for Curbing The Threat. IOSR Journal of Mobile Computing & Application (IOSR-JMCA), 5(2), 29-34. https://europub.co.uk/articles/-A-439382