Cybersecurity for Everyone by David B. Skillicorn
Author:David B. Skillicorn
Language: eng
Format: epub
Publisher: CRC Press
Published: 2020-10-15T00:00:00+00:00
4.3What does malware do?
Most computer systems divide their operations into three different kinds: those that can be done by any user, those that can only be done by the operating system (and so which require administrator accounts with special permissions), and those that are done when the system is first turned on. The actions that can be done by any user are the most restricted; users can use the software on the computer but typically cannot install some kinds of new software, and cannot see or change critical files. The operating system can do anything in the whole running system. Because of this, operating system accounts (administrator accounts) are restricted to systems staff who are trained, including in security. In phone systems, the operating system capabilities are not available to users at all, remaining under the control of the operating system developer (unless the phone is rooted). Finally, the actions that are done when the system is turned on are especially powerful because they happen before any checking can be done.
Malware can be targeted at any of these three layers. User space malware is the easiest to install, because actions of an ordinary user can create the opportunity to install it surreptitiously, but as a consequence it has the smallest opportunities. This is the reason why users are often encouraged to always carry out their ordinary work using an account like this, even when they have full control of their system and could use an administrator account for everything.
Malware targeted at the operating system level is harder to install, because it requires a higher level of permission, but provides greater opportunities. Malware targeted at the code that executes when a device is turned on is the hardest to install but is, of course, the most powerful since it controls the way in which the device is configured.
The ease with which malware can be removed also reflects how difficult it was to install in the first place. Malware detection software can usually find user space malware and often malware in the operating system, but finding and removing malware in the code that runs when the device is turned on is much more difficult.
It is also possible that malware is installed in the hardware itself. This kind of malware requires installation as part of the manufacturing process, making it much more expensive, but also much, much harder to detect. This is typically the realm of governments.
Malware can be used for a range of purposes, from vandalism all the way to non-kinetic military attacks. Some of the goals of those who distribute malware are:
Making money. The most obvious motivation for deploying malware is its use by criminals to make money. This turns out to be harder than it looks, but criminals are inventive and they have found ways. The most successful so far has been ransomware. Here malware encrypts the files of the target machine using a key known only to the attacker. The malware then informs the user of how much money to pay in order to get the file system unencrypted again.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6816)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6815)
Running Windows Containers on AWS by Marcio Morales(6332)
Kotlin in Action by Dmitry Jemerov(5089)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5055)
Combating Crime on the Dark Web by Nearchos Nearchou(4630)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4585)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4319)
The Age of Surveillance Capitalism by Shoshana Zuboff(3978)
Python for Security and Networking - Third Edition by José Manuel Ortega(3881)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3539)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Learn Wireshark by Lisa Bock(3501)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3355)
Blockchain Basics by Daniel Drescher(3322)
