Internet Security IT & Computer Science Coursework (Coursework Sample)
Research according to a given criteria
source..
COS80013 Internet Security
Research Assignment
Crimeware and Malware-Based Business Systems
Student Name and ID
Date & Time of Submission
Due Date
Expected Grade
Interest in Public Presentation: Yes
Introduction
The technological advancements in the ICT sector have led to the growth of businesses through the deployment of information systems and other computer-based platforms that drive business ventures. One negative impact of the advancements, especially of the internet, has been cybercrime. Cybercriminals perpetrate their activities by using various means for performing illegal activities on the end user systems for individuals and corporations alike. One of the schemes that these cybercriminals employ in conducting their trade is malware and crimeware. Through these two devices, the perpetrators of criminal activities manage to gain access to various systems and take advantage of such access to pilfer finances from organizations and individuals.
These activities have led to the loss of funds through the theft, in mitigating the compromise on the systems, and in the criminal proceedings that follow such attacks. The perpetrators, on the other hand, reap large financial benefits from such activities and have set up businesses to enhance them develop the malware, license them, trade them, modify them, and use them in perpetrating cybercrime for financial gains. As such, one of the crimeware or malware-based business systems is for the cybercriminals.
On the other side of the divide, there are organizations and individuals that have detected the vulnerability of information systems to information theft and financial losses and have employed technically gifted professionals who have an understanding of cybercrime to develop robust counter-attacking software and systems. Such organizations typically develop the relevant anti-malware software and sell them on open markets as opposed to the first category’s underground trading system. This paper, therefore, analyzes the strategies and the technologies that inform both kinds of businesses that depend on malware and crimeware.
Other Topics:
- SQL IT & Computer Science Coursework Research PaperDescription: SELECT instructor.dept_name,instructor.name,COUNT(instructor.ID) AS TOTAL FROM instructor INNER JOIN teaches ON instructor.ID=teaches.ID WHERE teaches.semester='Spring' AND teaches.year='2018' GROUP BY instructor.dept_name ORDER BY instructor.dept_name DESC;...9 pages/≈2475 words| No Sources | Other | IT & Computer Science | Coursework |
- Network Design IT & Computer Science Coursework PaperDescription: Academy, C. (2018). Private WAN Infrastructures (2.2.2) > Cisco Networking Academy Connecting Networks Companion Guide: Connecting to the WAN. [online] Ciscopress.com. Available at: http://www.ciscopress.com/articles/article.a...11 pages/≈3025 words| 8 Sources | Other | IT & Computer Science | Coursework |
- Implementation Procedures For An Educational Typology Known As xACMEDescription: The paper sets out to present implementation guidelines to help xACME educational typology meet user requirements. The project will focus on; Springfield Device and STP Configurations; Worchester Subnetting Configurations and Boston Site Protocol, Route Summarization, and Topology Improvement....7 pages/≈1925 words| 11 Sources | Other | IT & Computer Science | Coursework |