Analysis of Malware Attack and Strategies for Curbing The Threat

Journal Title: IOSR Journal of Mobile Computing & Application (IOSR-JMCA) - Year 2018, Vol 5, Issue 2

Abstract

Malicious Software otherwise known as Malware is software used or developed by attackers with the intent of disrupting computer operations. It can also be used to gather sensitive information, or to gain access to private computer systems. Today, devastating effects of Malware are not limited to individuals, but also governments, industries and financial institutions. It is very easy to send Malware to targets even at a very remote distance. Most of the users and other beneficiaries of the computer and Information Technology facilities are oblivious of the fact that there are Malware that often bypass their traditional security protection techniques and reside on their computer systems undetected. Users of computer systems face evolving challenges that they are not prepared to deal with. It is very pertinent that these challenges must be attended to with the application of the proper and adequate strategies and technologies. This paper is not only intended to assist stakeholders by creating awareness and bringing to fore the risks involved and other nasty activities associated with Malware in our day-to-day operations with the computer systems, it is also an attempt to bring to the understanding of all, especially security units of organizations and other interested parties, the effective methods and necessary steps to take in order to curb the menace.

Authors and Affiliations

Michael K. Adu, Kayode Okanlawon, Wakilu O. Adesanya, Rashidat Idris- Tajudeen

Keywords

Related Articles

An E-Commerce Model-View-Controller (MVC) Framework For A Cloud Based Environment

E-Commerce has turned into a need for organizations, especially independent companies hoping to augment benefit by utilizing financially savvy web based marketing strategies. Sufficient framework investigation and plan t...

A Theoretical Framework for an Intelligent Result Processing Expert System in Nigerian Universities

Computation of GPA (Grade point average) and CGPA (Cumulative grade point average) in Nigerian universities is usually carried out by contracting the services of the ICT units of such institutions. The ICT approach uses...

Strategic Quality Management Initiatives and Performance of Mobile Communications Service Providers in Kenya

Strategic quality management is one of the management concerns in the modern corporate world that can have a great impact to an organization whether it the organization adopts it or not13. Organizations need to evaluate...

Wechat Uses And Gartifications Among Young Malaysian Adults In Klang Valley, Malaysia

The uses and gratifications (U&G) theory has been widely used in research related to conventional media and now the internet media and mobile platforms. In Malaysia, a number of Internet-related studies revolve around th...

Frequency Re-Use In Mobile Computing Using the Openwns in Sectored Clusters and Non-Sectored Clusters

This work develops a system using a simulation platform (openWNS) for performance evaluation and comparison of the frequency re-use in both sectored cluster and non-sectored cluster in cellular networks. The Signal to No...

Download PDF file
  • EP ID EP439382
  • DOI 10.9790/0050-05022934.
  • Views 108
  • Downloads 0

How To Cite

Michael K. Adu, Kayode Okanlawon, Wakilu O. Adesanya, Rashidat Idris- Tajudeen (2018). Analysis of Malware Attack and Strategies for Curbing The Threat. IOSR Journal of Mobile Computing & Application (IOSR-JMCA), 5(2), 29-34. https://europub.co.uk/articles/-A-439382