Analysis of Malware Attack and Strategies for Curbing The Threat

Journal Title: IOSR Journal of Mobile Computing & Application (IOSR-JMCA) - Year 2018, Vol 5, Issue 2

Abstract

Malicious Software otherwise known as Malware is software used or developed by attackers with the intent of disrupting computer operations. It can also be used to gather sensitive information, or to gain access to private computer systems. Today, devastating effects of Malware are not limited to individuals, but also governments, industries and financial institutions. It is very easy to send Malware to targets even at a very remote distance. Most of the users and other beneficiaries of the computer and Information Technology facilities are oblivious of the fact that there are Malware that often bypass their traditional security protection techniques and reside on their computer systems undetected. Users of computer systems face evolving challenges that they are not prepared to deal with. It is very pertinent that these challenges must be attended to with the application of the proper and adequate strategies and technologies. This paper is not only intended to assist stakeholders by creating awareness and bringing to fore the risks involved and other nasty activities associated with Malware in our day-to-day operations with the computer systems, it is also an attempt to bring to the understanding of all, especially security units of organizations and other interested parties, the effective methods and necessary steps to take in order to curb the menace.

Authors and Affiliations

Michael K. Adu, Kayode Okanlawon, Wakilu O. Adesanya, Rashidat Idris- Tajudeen

Keywords

Related Articles

Design of visual statistics software for indoor game of indoor six person volleyball

In view of the fact that all kinds of data in volleyball match and the difficulty of statistics increase, it is supposed to develop a visualized software system that can accurately and synchronize statistics and analysis...

Engaging Pictorial Images and Voice Prompts Interface Design Strategy to Create Easy to use banking ATM System Interfaces in Nigeria

The existing banking ATMs in Nigeria do not adequately cater for a variety of people with varying abilities and literacy levels despite the significant importance of ATM technological innovations in Nigeria, especially i...

Frequency Re-Use In Mobile Computing Using the Openwns in Sectored Clusters and Non-Sectored Clusters

This work develops a system using a simulation platform (openWNS) for performance evaluation and comparison of the frequency re-use in both sectored cluster and non-sectored cluster in cellular networks. The Signal to No...

Strategic Quality Management Initiatives and Performance of Mobile Communications Service Providers in Kenya

Strategic quality management is one of the management concerns in the modern corporate world that can have a great impact to an organization whether it the organization adopts it or not13. Organizations need to evaluate...

Stress Faced By Women Entrepreneurs in Madurai District

“Women entrepreneur” is an individual who agrees exciting role to come across her individual wants and become economically autonomous. The development of women entrepreneurs and their involvement to the development of th...

Download PDF file
  • EP ID EP439382
  • DOI 10.9790/0050-05022934.
  • Views 120
  • Downloads 0

How To Cite

Michael K. Adu, Kayode Okanlawon, Wakilu O. Adesanya, Rashidat Idris- Tajudeen (2018). Analysis of Malware Attack and Strategies for Curbing The Threat. IOSR Journal of Mobile Computing & Application (IOSR-JMCA), 5(2), 29-34. https://europub.co.uk./articles/-A-439382