Saturday, February 1, 2020
Rootkits Research Paper Example | Topics and Well Written Essays - 2000 words
Rootkits - Research Paper Example ghted. General Overview of Rootkits and How They Work In definition, rootkits refer to programs that are intentionally made to hinder with system functionality and documentation hence doing away with the information or data which is stored in the computer for different uses. At most of times they are a collection of programs that facilitate spying on people computers (Rimon 1). The major difference existing between rootkits and the worm and virus is that a worm, the likes of the Stuxnet remains or continues attacking the computer system. This means that the worm does not necessary require to attach itself to an obtainable program in the system for its multiplication to occur accordingly (Rimon 1). Viruses, Trojans and worms have since been infecting computers of many user and even different servers that are essential in running electronic businesses. In that sense, fighting viruses and worms has become an issues which needs to be solved through the adoption of the appropriate measure if at all the running, operation of computer system and networking management has to be continued been enjoyed globally. On the other hand discovering/detecting of rootkits is even harder. According to Bidgoli Rootkits can therefore act in some instance as computer viruses or worms (21). Computer viruses and worms affect systems through deleting major documents or files or even putting a stop to website right of entry. The manner in which computer virus and worms attack the system clearly defines how they work (Rimon 1). The current state of computer virus basically is concerned with the Stuxnet worm. This is because the worm appears much different from other worms and virus following the manner in which it works and spreads in the computer system. In definition, the Stuxnet refers to a worm or malware that breaks into the categories of system that manages equipment (Douglas & Sturken 9). This results to permitting an attacker to take for granted control of critical equipments thus interfering with them the way in which it should not be. Generally, the worm originally distributes arbitrarily in the computer system although it involves extremely dedicated malware which multiplies while at the same time interfering with the functionality and performance of the system. The worm spreads into computer systems through various ways, although the most common means of spreading is through e-mail services. Virus and worms work in almost similar ways when it comes to interfering with the computer system (Rimon 1). Viruses characteristically need unsuspecting system users to unintentionally split them. Rimon believes that a number of viruses that are complicated like the Stuxnet worms duplicate and transform themselves mechanically to different computers by calculating different programs like e-mail sharing application (1). This clearly explains the idea that, networking technology is the reason behind major development of threats like worms and viruses which completely interfere with performance and functionality of systems. Other viruses like the Trojans
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.