Two of the common known attacks on computing systems are the deployment of computer viruses and malware.
Computer viruses are minute program which is “embedded inside an application or within a data file which can copy itself into another program“(Adams et al, 2008 ) for the sole determination of meddling with normal computer operations. The consequences may range from corruption and deletion of data; propagation of virus on to network and deployment through attachments through emails in order to further creating havoc to all associated computing devices.
Malwares are mischievous programs crafted to agitate or forbid normal operations to gather selected information which may lead to loss of privacy through exploitation; gain unauthorized entry into system resources and other abusive behavior”. The taxonomy of malware includes: Trojan Horses; Viruses, Worms and Zombies (Adams et al, 2008).
The methods which the adversary employs may vary from:
1. Zero Day Exploits where the assailant discovers a flaw ahead of the security community in raises the defense (Wadlow, 2009).
2. Injection Attacks where the attacker deposits the scripts into a web request to execute at the client-end (Wadlow, 2009).
4. XSRF (“Cross site Reference Forgery”) where the victim client is redirected to a webpage that simulates the legitimate site (Wikipedia, 2011)
5. Phishing is where the gullible user is brought to a simulation of the actual site but with a minor difference. Example:...