essay: Malware Spirit
Posted in the Computer Science Forum
#1 Feb 26, 2013
Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data (digital mostly in the computer-centric Information Age) and the systems and processes used for those purposes. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data (source: Wikipedia).
A virus is a small infectious agent that can replicate only inside the living cells of an organism and destroy genetic or cellular information security. A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
Malware includes computer viruses, computer worms, ransomware, trojan horses, keyloggers, most rootkits, spyware, dishonest adware, malicious BHOs and other malicious software. Worms and Trojans simply distribute themselves across computer linked by networks, while viruses have the ability to replicate themselves (source: Wikipedia).
Most viruses and malware function by substituting flexible algorithms to trick CPUs into outputting data that seems on reading simple answers given by the CPU’s processors.
To “out-trick” malware, anti-virus software and anti-malware software must be written to protect the integrity and output strictness of a given CPU’s algorithm. For example, if a CPU’s algorithm reads,“If input = X and/or Y, then output = 1 and/or 2, and If input = Z, then output = 3,” then a malware algorithm will read,“If input = X, then output =2,” tricking the CPU into thinking that the simplified command is more efficient rather than less strict (and creating potential to insert false data), so an inserted appropriate anti-malware sub-program must read,“If input = X and/or Y, then output = 1 and/or 2, and if input = Z, then output = 3, but if input = X or Y, then output = 1 or 2.”
In other words, to create software protocols that are reliable and verifiable, anti-malware tools must be developed that will effectively assist a CPU or entire network of CPUs to create command template verification stencils, suggesting that relevant skeleton structure descriptive-themed Hollywood (USA) movies such as "Ghost in the Machine" (1993) represent summary intentions.
Are they printing movie posters on hemp/recycled paper yet?
Add your comments below
|Spotlight on ROC resident entrepreneur Ludovic ...||Aug 26||Taz||1|
|Facebook to acquire Oculus VR for $2 billion||Aug 21||Kid_Tomorrow||2|
|4 Convincing Reasons Why ARM Holdings' Pullback...||Aug 7||otr214424||1|
|IT officers facing key industry challenges [Gul...||Aug 5||NITiN||2|
|http://mashable.com/2014/08/02/facebook-viral-v...||Aug 2||FedBook down last...||1|
|Dematic taps BlackBerry executive to launch R&D...||Jul '14||Ukraine launch||1|
|thesis||Jul '14||dona mae||1|
Find what you want!
Search Computer Science Forum Now