Exploitation of Human Trust, Curiosity and Ignorance by Malware

02/26/2020
by   Sundar Krishnan, et al.
0

Despite defensive advances in the Internet realm, Malware (malicious software) remains a Cybersecurity threat. These days, Malware can be purchased and licensed on the Internet to further customize and deploy. With hundreds of Malware variants discovered every day, organizations and users experience enormous financial losses as cybercriminals steal financial and user data. In this article surveys the human characteristics that are key to the defense chain against Malware. The article starts with the attack models/vectors that humans often fall prey to and their fallouts. Next, analysis of their root cause and suggest preventive measures that may be employed is detailed. The article concludes that while Internet user education, training, awareness can reduce the chances of Malware attacks,it cannot entirely eliminate them.

READ FULL TEXT
research
07/11/2023

ATWM: Defense against adversarial malware based on adversarial training

Deep learning technology has made great achievements in the field of ima...
research
11/19/2019

Volenti non fit injuria: Ransomware and its Victims

With the recent growth in the number of malicious activities on the inte...
research
07/24/2023

Malware Resistant Data Protection in Hyper-connected Networks: A survey

Data protection is the process of securing sensitive information from be...
research
08/09/2021

Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware Classification

Malware is a piece of software that was written with the intent of doing...
research
08/14/2020

First Step Towards Modeling Unbreakable Malware

Currently, the construction of concealed malicious code has become a tre...
research
05/17/2022

A compartmental model for cyber-epidemics

In our more and more interconnected world, a specific risk is that of a ...
research
11/11/2022

SUNDEW: An Ensemble of Predictors for Case-Sensitive Detection of Malware

Malware programs are diverse, with varying objectives, functionalities, ...

Please sign up or login with your details

Forgot password? Click here to reset