blog




  • Essay / Computer Viruses and Malware - 863

    INTRODUCTION Two of the most well-known attacks on computer systems are the deployment of computer viruses and malware. Computer viruses are tiny programs “embedded in an application or data file that can copy themselves into another program” (Adams et al, 2008) for the sole purpose of interfering with normal computer operations. The consequences can range from data corruption and deletion; spread virus over network and deploy via email attachments to create more havoc on all related computer devices. Malware is malicious programs designed to disrupt or inhibit normal operations in order to collect selected information, which may result in loss of privacy through exploitation; gaining unauthorized entry into system resources and other abusive behavior.” Malware taxonomy includes: Trojans; Viruses, worms and zombies (Adams et al, 2008). In web application technology, the web browser is the center that revolves around the Internet entity. One of the main tool architectures for web design is the recruitment of JavaScript into the “Document Object Model” of the DOM. JavaScript language has inherent capabilities that could perform dynamic effect in web browser and DOM. DOM provides a logical structure in which the document is accessed and manipulated. As a result, it also poses many security issues that affect all users and developers (Wadlow et al, 2009).ANALYSISJavaScript is prevalent in many industries such as web design; desktop gadgets such as dashboard widgets; PDF used in Adobe Reader; Application tools such as Adobe Creative Suite; office documents used in Open Office, etc. (Wikipedia, 2011).PROBLE...... middle of paper ......xman, s., Naldurg, P., Venkatesan, R., Lambert, J., Shin, J. (2011) « ZDVUE: prioritizing javascript attacks to discover new vulnerabilities » [Online. Available at: http://doi.acm.org/10.1145/2046684.2046690 (accessed October 29, 2011)Wadlow, T., Gorelik, V. (2009) “Security in the browser. Queue 7, 2 (February 2009)', pp. 40-41., [Online]. Available at: http://doi.acm.org/10.1145/1515964.1516164 (Accessed 29 October 2011)Adams, A and McCrindle R (2008) “PANDORA'S BOX, THE SOCIAL AND PROFESSIONAL ISSUES OF THE AGE OF INFORMATION”, West Sussex, England: John Wiley & Sons Ltd, pp. 565 (accessed October 29, 2011) Choi, Y., Kim, T., Choi, S. (2010) “Automatic Detection of JavaScript Obfuscation Attacks in Web Pages via String Pattern Analysis,” [in line ]. Available at: http://www.sersc.org/journals/IJSIA/vol4_no2_2010/2.pdf (accessed October 29, 2011)