Friday, February 14, 2020

Malicious Software, Unknown Threats & Potential Solutions Research Paper

Malicious Software, Unknown Threats & Potential Solutions - Research Paper Example Malicious intentions result into destruction of system hardware, information, and software whereby, disclosure of confidential information results, through unauthorized users having access to the system and information. Unauthorized usage also results in modification and interruption of the information system. Interception occurs when information that resides in a computer system is copied by unauthorized user (Abdullah, 2010, p.3). Other threats include malware, which is constituted by viruses, computer worms and Trojan horses that are generally common in the computer networks and websites. The possibility of making money through malware distribution and solution has propagated the online distribution, which is a major threat. This is the case since the popularity of viruses, computer worms and Trojan horses consequently increases popularity of similar antivirus that is traded for commercial purposes (Ryuya, 2011, p.514). Defects with respect to homogeneous binary files are an indic ation of presence of unknown threats and malicious software. Indications of threats may include infections such as viruses, Trojan horse programs and even original file format alterations (Weber, et al., 2002, p. 2). Motivation Malicious software and unknown threats have time and again presented new threats that call for new ways of detection and prevention within the information technology environment. Unknown threats and malware software call for modern malware detection solutions such as proactive malware detection system that enables prevention of future attacks and those that were previously unknown. Modern detection system also reduces the rate of false alarms, since successful detection of attacks is made (Volynkin, State University of New York at Binghamton: Electrical Engineering. 2007, p.47). Dynamics of malicious software are characterized by strains such as code red-2, which is a fast spreading worm that can be solved using a complex mathematical model that is based on a pproach of compartmentalization. The solution is made possible through predicting the state of the system for the purpose of converting unaffected targeted nodes into noninfectious and infectious nodes (Hemraj and Dinesh, 2007, p. 491). Hackers have gone ahead to exploit zero day threats, since these threats have no characteristic signature that can be detected. The exploitation takes advantage of polymorphing code of the unknown threat that varies with every page loaded. However, technological firms have competitively undertaken to advance models for detecting malicious and unknown threats for their customers. Through intensive marketing and competition, new knowledge regarding malicious software attacks has been created by software firms. Although software firms seek to gain profitability in software applications, solutions for complex and dynamic malicious software attacks are gaining a positive insight (Michael and Mikhael, 2010, p.597). Invisible malicious codes on the web exec ute when the browser loads web pages containing the software. Malicious codes use cross-site scripting to retrieve codes that are more dangerous from third party sites, which plants the malware, steals data and takes control of the system through leveraging operating system and web browser vulnerability.

Saturday, February 1, 2020

Corporate Social Responsibility in McDonalds Essay

Corporate Social Responsibility in McDonalds - Essay Example According to the research findings, McDonald’s corporation is the leading retail outlet in fast foods and hamburgers and has grown to be a major multinational in different parts of the world. Today, the company serves over 68 million customers in over 119 countries in different parts of the world including Asia, Africa, Europe and Latin America.Corporate social responsibility is defined as the relationship that exists between business entities and the society with an aim of giving back and empowering members of the society. Corporate social responsibility brings together business organizations, members of the society and government agencies in an enabling environment. Corporate social responsibility rises above the selfish interest of individual business owners who are motivated by the desire to increase profits at the expense of the society. Corporate social responsibilities engage the society in the process of achieving the missions and objectives of the business organizatio n. This is achieved through the engagement in a number of philanthropic exercises, conservation of the environment and upgrading the economic status of the members of the society. The engagement of business in corporate social responsibility programs is guided by a number of principles aimed at created a leveled playing ground and ensuring that all members of the society benefit from the program. First, corporate social responsibility is controlled by the legal compliance principle, which requires business units to understand and follow both local and international laws which affect its operations in a certain industry. Following procedures such as environmental regulations and treaties signed by the home country of the business demonstrates a commitment to the society and the environment. Corporate social responsibility is also governed by the need to adhere to the customary international laws that govern the operation of various for-profit institutions across the globe. Government agreements and declarations made are binding on all businesses and this must be done based on free will and an understanding of the sector of operation.