Malware Analysis and Mitigation in Information Preservation
Journal Title: IOSR Journals (IOSR Journal of Electrical and Electronics Engineering) - Year 2018, Vol 13, Issue 4
Abstract
Malware, also known as malicious software affects the user’s computer system or mobile devices by exploiting the system’s vulnerabilities. It is the major threat to the security of information in the computer systems. Some of the types of malware that are most commonly used are viruses, worms, Trojans, etc. Nowadays, there is a widespread use of malware which allows malware author to get sensitive information like bank details, contact information, which is a serious threat in the world. Most of the malwares are spread through internet because of its frequent use which can destroy large information in any system. Malwares from their early designs which were just for propagation have now developed into more advanced form, stealing sensitive and private information. Hence, this work focuses on analyzing the malware in a restricted environment and how information can be preserved. So, in other to address the negative effects of malicious software, we discussed some of the malware analysis methods which was used to analyze the software in an effective manner and helped us to controlthem. Various malware detection coupled with malware propagation techniques were also highlighted. This work was concluded by examining malware mitigation strategies which can help us protect our system’s information.
Authors and Affiliations
AruOkereke Eze, ChiaghanaChukwunonso E.
Modified Six-Degree of Freedom related to Takeoff and Landing stages of Aircraft
Six degrees of freedom (6DoF) means to the freedom of movement of a rigid body (like aircraft) in three-dimensional space. Specifically, the body is free to change position as forward/backward, up/down, left/right transl...
Voltage Stability Assurance Based Optimal Location and Sizing of Distribution Generation in Radial Distribution System
In general during light loading conditions, the feeder voltage may raise significantly and vice versa for heavy loading conditions. In addition, the increasing trend of different Distribution Generation (DG) is focusing...
Design of 10-bit current steering DAC with binary and segmented architecture
This paper presents the design of 10-bit current steering DAC of binary and segmented architectures with 400MHz clock frequency. This circuit is designed in 130nm technology; with a supply voltage of 3.3V.This design is...
Real Time Monitoring of Transient Stability Status ofIntegrated Hybrid Distributed Generation: A Comparison ofANN Approaches
The analytical approach in transient stability assessment is inadequate to handle real time operation of power system due to the unavailability of accurate mathematical equations for most dynamic systems, and given the l...
The Determination of Effects of Primary and Secondary Geometry of Tubular Linear Generator
In this paper, general information on the construction of tubular generators are given. Also, the numeric analyses were conducted by using 2D and 3D finite elements software. The output power, iron loss and cogging force...