Malware Analysis and Mitigation in Information Preservation

Journal Title: IOSR Journal of Applied Physics (IOSR-JAP) - Year 2018, Vol 10, Issue 4

Abstract

Malware, also known as malicious software affects the user’s computer system or mobile devices by exploiting the system’s vulnerabilities. It is the major threat to the security of information in the computer systems. Some of the types of malware that are most commonly used are viruses, worms, Trojans, etc. Nowadays, there is a widespread use of malware which allows malware author to get sensitive information like bank details, contact information, which is a serious threat in the world. Most of the malwares are spread through internet because of its frequent use which can destroy large information in any system. Malwares from their early designs which were just for propagation have now developed into more advanced form, stealing sensitive and private information. Hence, this work focuses on analyzing the malware in a restricted environment and how information can be preserved. So, in other to address the negative effects of malicious software, we discussed some of the malware analysis methods which was used to analyze the software in an effective manner and helped us to controlthem. Various malware detection coupled with malware propagation techniques were also highlighted. This work was concluded by examining malware mitigation strategies which can help us protect our system’s information.

Authors and Affiliations

AruOkereke Eze, ChiaghanaChukwunonso E.

Keywords

Related Articles

Synthesis of Magnetite Based Iron Sand by Using Coprecipitation method

Iron sand is a natural material that is easy to obtain. The low utilization of iron sand in Indonesia causes the low price of iron sand material. So, needed a technology in processing iron sand in order to become a produ...

Characterization of Pineal Region in MR Brain Images using Texture Analysis

The classification processes of MRI brain were defining the corpus,pineal gland, techunum, and third ventricle were carried out using Interactive Data Language (IDL) program as platform for the generated codes. The resul...

Expansion of Universe

The origin of matter remains one of the great mysteries in physics. During the last two decades, cosmology has become a precision observational science thanks (in part) to the incredible number of experiments performed t...

Measurements of K- shell X-ray production cross-sections and fluorescence yield for 31Ga element

K shell X- ray production cross-sections (  K and  K ) were measured for 31Ga element. Measurements were carried out at 11.372 keV using secondary excitation method. The results obtained for K X- ray production cross...

Solar Water Heater: Black Versus Transparent Hosepipe Heat Absorbers

We have compared the performances and efficiencies of solar water heatersconstructed using coiled black and coiled transparent hosepipes.The two hosepipes were equivalent in length and diameter measuring about 50 yards (...

Download PDF file
  • EP ID EP415445
  • DOI -
  • Views 28
  • Downloads 0

How To Cite

AruOkereke Eze, ChiaghanaChukwunonso E. (2018). Malware Analysis and Mitigation in Information Preservation. IOSR Journal of Applied Physics (IOSR-JAP), 10(4), 7-16. https://europub.co.uk/articles/-A-415445