Abraham, S., & Chengalur-Smith, I. (2010). An overview of social engineering malware: Trends, tactics, and implications. Technology in Society, 32(3), 183-196. Retrieved from: http://www.sciencedirect.com/science/article
...
Abraham, S., & Chengalur-Smith, I. (2010). An overview of social engineering malware: Trends, tactics, and implications. Technology in Society, 32(3), 183-196. Retrieved from: http://www.sciencedirect.com/science/article/pii/S0160791X10000497
Allen, J., Gomez, L., Green, M., Ricciardi, P., Sanabria, C., & Kim, S. (2012). Social Network Security Issues: Social Engineering and Phishing Attacks. CSIS, Pace University, B1-1. Retrieved from: https://pdfs.semanticscholar.org/84b4/8dab6c7444986e30e8b780b71137d31f7149.pdf
Broadhurst, R. (2013). Crime in cyberspace: offenders and the role of organized crime groups. Retrieved from: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2211842
Daya, B. (2013). Network security: History, importance, and future. University of Florida Department of Electrical and Computer Engineering. Retrieved from: http://www.alphawireless.co.za/wp-content/uploads/2013/01/Network-Security article.pdf
Schneider, D. (2012). The state of network security. Network Security, 2012(2), 14-20. Retrieved from: http://www.sciencedirect.com/science/article/pii/S1353485812700168
Introduction
The acronym used for malicious software is Malware. It consists of several kinds of invasive, annoying and hostile software or program codes used by hackers for causing harm to others by means of damaging their computer systems or stealing private information. Malware can be of many different types for example computer viruses, malicious rootkits, Trojan horses, dishonest spyware and worms. This paper seeks to explain the common targets of malware, why they are attractive, difference between Trojan, viruses and worms and the possible methods that could be implemented for avoiding the risk of malware being entered in a network of an organization.
Identify the common targets of malware. Explain why these targets are so attractive to hackers and what they benefit from each.
[Show More]