Essay Available:
Pages:
4 pages/β1100 words
Sources:
8 Sources
Style:
APA
Subject:
Management
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 20.88
Topic:
Develop a Research Problem Statement and Justification
Essay Instructions:
Develop a Research Problem Statement and Justification
Essay Sample Content Preview:
Rootkits
Name:
Institution:
Course:
Date:
Introduction
Computer security is plays part of the most important element of any network. This is relative to the level and complexity of attacks on the data integrity and that of any organization. There various elements of threats and among them are rootkit malwares. These are computer programs that take control of the computer resources without the consent of the user. There are three main modes of rootkits and they are categorized in reference to their level of operation. User mode rootkits operate at the user level of operations as they interact with applications. The kernel mode rootkits are known to operate within the kernel of the operating system, while the master boot record rootkit operate at the bios level of motherboard instructions. There are a number of rootkit removal tools and can be used to remove some of the malware. However, this is also an aspect that comes with various challenges and the technical teams have to be ready to resolve them and come up with the best solution.
Rootkits
Rootkits are programs that take the form of malware on a computer. As the name suggests, they are software designed to take administrative control of the PC without the consent of the user. Bundled with other software, the rootkits will install itself on the computer and will operate in a clandestine manner, where the user will not know they have a malicious program underneath their programs (Cucu, 2018). Given the administrative control of the computer resources, they can track all the processes that the user interacts with on the operating system and even on the side of the program installed and running. Simply put, they will easily scan through the user’s internet requests, record keystrokes, open programs, control hardware among other resources without the consent of the user. They are stealthy, as they can hide their behavior using a technique that is referred to as Direct Kernel Object Manipulation. As Bencsáth, Pék, Buttyán and Félegyházi indicated in their paper The Cousins of Stuxnet: Duqu, Flame, and Gauss, windows uses a double-linked list to represent system resources such as timers, threads and processes among others (Bencsáth, Pék, Buttyán & Félegyházi, 2012). DKOM operates in such a manner to unlink the listed objects and then present its own processes by modifying the list. This means that, it is becomes invisible to tools such as the task manager. Because scheduling in Windows works at the threads level, the invisible processes are still executed and ran (Bencsáth, Pék, Buttyán & Félegyházi, 2012). This is a technique that is associated with the brilliance of one Jamie Butler, who developed the infamous FU rootkit. However, there is a major weakness in the technique and this relates to the weakness associated with Kernel-level data structures. They tend to be fragile and change between different OS releases and as such, when the processes of the rootkit are running they cause system instability and constantly reboot the PC (Bencsáth, Pék, Buttyán & Félegyházi, 2012).
User Mode Rootkits
There are t...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
π Other Visitors are Viewing These APA Essay Samples:
- The Production of Nike's Product Leather Belts4 pages/β1100 words | No Sources | APA | Management | Essay |
- Learning Resources: Characteristics of hate Crime2 pages/β550 words | 3 Sources | APA | Management | Essay |
- Effect of the Sarbanes-Oxley Act on Incentive Plans2 pages/β550 words | 1 Source | APA | Management | Essay |
- Organizational Vs Employee Focused Training: Importance On Employee1 page/β275 words | 2 Sources | APA | Management | Essay |
- Organisational Context of HR: Relevance of Scientific Management Today9 pages/β2475 words | 12 Sources | APA | Management | Essay |
- Nursing Schedule: Will It Need To Hire Additional Nurses?2 pages/β550 words | 1 Source | APA | Management | Essay |
- Strengths of Botanical Bounty Farm Research Assignment2 pages/β550 words | 3 Sources | APA | Management | Essay |