Cyber Attacks And Its Impacts On The Confidentiality, Integrity, And Availability Of A Network

1296 Words Feb 7th, 2016 6 Pages
Malware Concerns The most compelling category of cyber-attacks is the malware, which negatively impacts the confidentiality, integrity, and availability of a network or system from attacks ranging from the network level up to the operating system level. Therefore, the organizations need to safeguard their network and system components at all possible levels, to avoid a possible malware intrusion (Stallings & Brown, 2012). Various critical categories of malware and their attacking patterns and approaches are comprehensively analyzed in this critical thinking paper. Additionally, one of the critical malware types is highlighted with examples of the various attacks that challenged supposedly well-secured organizations.
Categories of Malware
Stallings and Brown (2012) provided an excellent categorization of malware. The primary categories are derived on the basis of propagation and payloads, where propagation contains types such as infected content, for example, viruses; vulnerability exploits, for example, worms; and social engineering, for example, spam e-mails and Trojans. On the other hand, the payload contains types such as system corruption; attack agent, for example, zombie and botnets; information theft, for example, key-loggers, phishing, and spyware; and stealthing, for example, backdoors and rootkits (Stallings & Brown, 2012).
Propagation Type Malware
In the category of propagation the first significant type is the virus that infects an executable content by…
Open Document