CIS502

CIS502






Mobile Device Security and Other Threats
Melissa M
Dr. Constance Blanson
Theories of Security Management
November 30, 2014


Analyze the emerging security threats presented within the “Security Threat Report 2014”
Security threats have not only grown and matured quickly, but the people behind these threats have become more creative in camouflaging their work. These criminals have become more adept at eluding their identification and are now relying on cryptography. Malware authors, as with users, are now focusing on mobile devices and web services.
Numerous threats were listed in the Security Threat Report 2014 such as botnets, android malware, attacks on Linux platforms and Mac OS X, web-based malware, targeted threats to your financial accounts, unpatched windows systems and re-invented spam. These items are detrimental to companies and users. The more complex these threats get, the harder it is to protect against them. I will analyze botnets and android malware in this section.
A botnet is a network of private computers infected with malicious software and controlled as a group without the owner’s knowledge. Criminals distribute malicious software that can turn your computer into a “bot”. When this occurs, your computer can perform automated tasked over the Internet without your knowledge. This type of malware is typically used to infect large numbers of computers. They are used to send out spam email messages, spread viruses, attack computers and servers, and commit others kinds of crime and fraud.
Botnets are now more resilient and integrating multiple backup forms of command and control. The operators are now faster and more effective at responding to countermeasures. The bad news is, users are becoming more resistant to fake alerts and antivirus scams, botnots are turning into ransomware instead. You are asked to pay money in order to restore access to your data. Right now, one of the most dangerous botnets out there...

Similar Essays