Академический Документы
Профессиональный Документы
Культура Документы
MINESKI INFINITY
CHAPTER 2
methodologies and others. Those were included in this chapter helps familiarizing
information about the certain topics that are relevant and similar to the present studies
Related Literature
Malware
Malware, short for malicious software, is any software used to disrupt computer
display unwanted advertising. Malicious software was called computer virus before the
term malware was coined in 1990 by Yisrael Radai. The first category of malware
propagation concerns parasitic software fragments that attach themselves to some existing
executable content. The fragment may be machine code that infects some existing
application, utility, or system program, or even the code used to boot a computer system.
Malware is defined by its malicious intent, acting against the requirements of the computer
user, and does not include software that causes unintentional harm due to some deficiency.
Malware may be stealthy, intended to steal information or spy on computer users for an
extended period without their knowledge, as for example Regin, or it may be designed to
scareware, and other malicious programs. It can take the form of executable code, scripts,
active content, and other software. Malware is often disguised as, or embedded in, non-
malicious files. As of 2011 the majority of active malware threats were worms or trojans
Virus creation laboratory was first UI tool for creating viruses. User could select
features of virus and create it. This made virus creation easy. It has some disadvantages,
but almost anyone using this GUI tool could create virus. (Milošević, Nikola 2015, History
of malware)
The best-known types of malware, viruses and worms, are known for the manner
in which they spread, rather than any specific types of behavior. The term computer virus
is used for a program that embeds itself in some other executable software (including the
operating system itself) on the target system without the user’s consent and when that is
run causes the virus to spread to other executables. On the other hand, a worm is a stand-
alone malware program that actively transmits itself over a network to infect other
computers. These definitions lead to the observation that a virus requires the user to run an
infected program or operating system for the virus to spread, whereas a worm spreads itself.
experiments or pranks. Today, malware is used by both black hat hackers and governments,
information such as personal identification numbers or details, bank or credit card numbers,
and passwords. Left unguarded, personal and networked computers can be at considerable
risk against these threats. (These are most frequently defended 1 2 CHAPTER 1.
Spyware 0.08% Adware 2.27% Worms 7.77% Others 1.18% Malware by categories March
16, 2011 Malware by categories on 16 March 2011. against by various types of firewall,
anti-virus software, and network hardware). Since the rise of widespread broadband
Internet access, malicious software has more frequently been designed for profit. Since
2003, the majority of widespread viruses and worms have been designed to take control of
users’ computers for illicit purposes. Infected "zombie computers" are used to send email
called spyware. Spyware programs do not spread like viruses; instead they are generally
installed by exploiting security holes. They can also be hidden and packaged together with
and demands payment to reverse the damage. For example, programs such as
CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial
sum of money. Some malware is used to generate money by click fraud, making it appear
that the computer user has clicked an advertising link on a site, generating a payment from
the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used
some kind of click fraud, and 22% of all ad-clicks were fraudulent. Malware is usually
used for criminal purposes, but can be used for sabotage, often without direct benefit to the
perpetrators. One example of sabotage was Stuxnet, used to destroy very specific industrial
equipment. There have been politically motivated attacks that have spread over and shut
down large computer networks, including massive deletion of files and corruption of
master boot records, described as “computer killing”. Such attacks were made on Sony
W32.Disttrack) and Saudi Aramco (August 2012). (Creutzburg, Reiner 2016, Handbook
of Malware 2016)
These categories are not mutually exclusive, so malware may use multiple
techniques. This section only applies to malware designed to operate undetected, not
sabotage and ransomware. Viruses are computer program usually hidden within another
seemingly innocuous program that produces copies of itself and inserts them into other
programs or files, and that usually performs a malicious action (such as destroying data).
Trojan Horses In computing, Trojan horse, or Trojan, is any malicious computer program
victim to install it. The term is derived from the Ancient Greek story of the wooden horse
that was used to help Greek troops invade the city of Troy by stealth. Trojans are generally
spread by some form of social engineering, for example where a user is duped into
executing an e-mail attachment disguised to be unsuspicious, (e.g., a routine form to be
filled in), or by drive-by download. Although their payload can be anything, many modern
forms act as a backdoor, contacting a controller which can then have unauthorized access
to the affected computer, While Trojans and backdoors are not easily detectable by
themselves, computers may appear to run slower due to heavy processor or network usage.
Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves
into other files or otherwise propagate themselves. Rootkits Once a malicious program is
packages known as rootkits allow this concealment, by modifying the host’s operating
system so that the malware is hidden from the user. Rootkits can prevent a malicious
process from being visible in the system’s list of processes, or keep its files from being
usually over a connection to a network such as the Internet. Once a system has been
compromised, one or more backdoors may be installed in order to allow access in the
future, invisibly to the user. (Creutzburg, Reiner 2016, Handbook of Malware 2016)
As malware attacks become more frequent, attention has begun to shift from viruses
and spyware protection, to malware protection, and programs that have been specifically
developed to combat malware. (Other preventive and recovery measures, such as backup
and recovery methods, are mentioned in the computer virus article). A specific component
scanner, hooks deep into the operating system’s core or kernel and functions in a manner
similar to how certain malware itself would attempt to operate, though with the user’s
informed permission for protecting the system. Any time the operating system accesses a
file, the on-access scanner checks if the file is a 'legitimate' file or not. If the file is identified
as malware by the scanner, the access operation will be stopped, the file will be dealt with
by the scanner in a pre-defined way (how the anti-virus program was configured
during/post installation), and the user will be notified. This may have a considerable
performance impact on the operating system, though the degree of impact is dependent on
how well the scanner was programmed. The goal is to stop any operations the malware
may attempt on the system before they occur, including activities which might exploit bugs
Malware 2016)
References
[2] Christopher Elisan (5 September 2012). Malware, Rootkits & Botnets A Beginner’s
[3] Stallings, William (2012). Computer security : principles and practice. Boston:
[5] “An Undirected Attack Against Critical Infrastructure” (PDF). United States
[8] "§ 18.2-152.4:1 Penalty for Computer Contamination” (PDF). Joint Commission on
[9] Russinovich, Mark (2005-10-31). “Sony, Rootkits and Digital Rights Management
[14] “South Korea network attack 'a computer virus’". BBC. Retrieved 20 March 2013.
[16] “Child Porn: Malware’s Ultimate Evil”. November 2009. [17] PC World – Zombie
February 2015.
[20] “Shamoon is latest malware to target energy sector”. Retrieved 18 February 2015.
February 2015.
Income Generation
'Income generation' is often talked about in quite generic, broad-brush, terms. This
guidance focuses on generating income through commercial trading of goods and services
and licensing content to third parties. As such it is different from other sources of income
which are likely to be part of an archive's overall funding model, depending on the type of
Income from voluntary fundraising, including grants from trusts and foundations
including the Lottery and Arts Council, individual giving and sponsorship
. Income from Statutory Funders - For those archives in receipt of core funding for the
or trustee has asked what you're doing to generate more income, be sure you're clear you
have the same understanding of what sources of income are in scope. This guidance focuses
on the most commons activities through which archives are generating commercial income,
In-house digitisation/conservation
Events
Online/onsite retail
Catering
Filming in the search room
Storage rental
You may be conscious that particular solutions to generating more income are
being cited as 'silver bullets' or ‘quick wins’. This guidance also aims to help you deter a
rush to solutions by providing a logical process for assessing the right options for you - and
a way to articulate the likely return on investment, and manage expectations. It 5 is unlikely
that many archive services will be able to generate more than 20% of revenue income from
commercially generated sources. (Holen, Andrew, Bohl, Eric, Wynn, Mike, 2016, Income
Generation Guide)
Most of the sources of income generation we discuss in this guidance are not new.
Many archives have been doing them with more or less success, and rigour, for years if not
decades. What is new is the wider funding environment for archives. Whether your archive
is a local authority record office, in a university or a charity, you're probably feeling the
squeeze of austerity in public funding or greater competition for grants and donations, or
both. And the options open to potential users, particularly online, mean competition to
attract visitors keeps getting tougher. So, whether you're seeking to take control of your
broadening your income from commercial sources may make sense. If the money you
generate stays within your service it will give you more flexibility – what is known in
charities as ‘unrestricted income’ - and this will be a big advantage. Identifying the right
mix between different types of income requires an understanding and analysis of the costs
involved in generating income; the market potential; and likely profit margin to be made.
Equally, you need to consider any risks involved in the different income-generating
activities. It's also worth remembering that although you may be trying to become more
entrepreneurial and commercially-minded, you need to keep your overall mission and
values in mind. This could mean that, although a commercial activity doesn't make a
significant difference to your bottom line, for example some limited merchandising or
catering, or discounting space hire for priority groups, there are non-commercial benefits
from the activity. Conversely, some activities may not be consistent with your mission, or
be inappropriate for your existing users and customers. It may be that for some archives,
investing in further fundraising capacity will still represent a better option, given the
balance of costs involved, risks and likely return. But only you will be able to decide that,
having assessed your options with your colleagues and partners. (Holen, Andrew, Bohl, Eric,
A generic planning cycle which you might be familiar with uses a four stage
cyclical process:
Analyse
Plan
Do
Review
This can be the basis for planning all your income-generating activities and we
have included one version of this at Section 5. It’s also helpful to begin to think of the
process as one of continuous business development in your service, which analyses future
prospects for growth and helps you decide where to focus your efforts. (Holen, Andrew,
The findings presented in this fact sheet come from a recent systematic review of twelve
studies.5 Although income generation is a broad topic, for the purposes of the analysis, the
vocational skills or provide capital or commodities that enhance the capacity of individuals
social, and biological outcomes. Of the twelve studies, six were conducted in sub-Saharan
Africa, three in East and Southeast Asia, and three in Latin America and the Caribbean.
(https://www.jhsph.edu/research/centers-and-institutes/research-to-
prevention/publications/income-generation-final.pdf)