A project is an undertaking that requires specific resources, has a beginning and an end and runs over a specified of period to yield specific results (Schwalbe, 2009). A project may be large or small and requires different resources depending on the expected goals (Square, 2004). A project may a simple or complicated one. Most projects have a defined budgetary allocation. Project definition Malware is software developed to gain unauthorized access to a computer system thereby damaging or interfering with the information stored in that computer.
Espionage via Malware therefore involves spying or gaining unauthorized access to a computer system without the user’s knowledge and leaving evidence of your intrusion (Louisiana, 2006). The project mission/ vision were to analyze the risks or threats resulting from Malware espionage and the control measures that can be taken against such infections in future. Damages caused vary for instance information stealing and overwriting. The objective of the project is to identify ways by which Malware espionage is used and types of Malware particularly information stealing.
Malware attack has been very rampant in many areas. Malware attacks or espionage involves exposure of the confidential information by attacking a computer. This virus attack may involve stealing of the Pretty Good Privacy (PGP) key s and transferring them to a different site through internet. Information stolen may used as a weapon to attack other people through the internet (Louisiana, 2006). Malware attack has been experienced in Israel, China and United States.
The virus has been used for surveillance in or over other countries for instance China to United States. Malware virus that originated from the Chinese server has been used to interfere with the US’s sensitive files and any automated documents. Malware has also been used for black mailing over the internet (Louisiana, 2006). Information has been stolen from other people’s internet accounts and exposed to unauthorized users. Malware attack cases are on the rise and internet or computer users have been threatened.Information is now at risk and this calls for a way to tackle the problem to prevent information loss.
Internet users should be aware that worms, Trojans and viruses could be used for espionage. It is therefore upon internet users to protect their information systems. Computer systems can be protected by installing and updating antivirus or spyware regularly, updating and running scanners often. Operating systems patches and other applications should be run consistently.
It is not clear how it happens but people should protect their computer systems from any Malware infections (Louisiana, 2006). If computer systems are protected against Malware attacks, all intrusions will be notified leading to information protection. All network traffic contents should be scanned to ensure they are virus free. Conclusion Malware espionage is real even though it is not clear how it happens but people have used the software to steal other people’s information.Through this project carried out it is clear how Malware attacks have been done. People have found their secret information in other sites without their knowledge.
Countries have spied on others through the internet and people have stolen other companies’ projects or research done through the internet. Internet users are therefore called upon to secure their systems from any Malware attacks. Computer uses have been advised to install antivirus software to protect their systems from virus attacks (Louisiana, 2006).