Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Malware

Contemporary Challenges for Cyber Security and Data Privacy
Is a variety of computer codes, like viruses, trojan horses, and logic bombs, which are designed to interfere or disrupt the computer’s normal operation ( Yar, 2006 ).
Published in Chapter:
Hacking: Evolution, Conceptualization, and the Perpetrators
Carolina Roque (Faculty of Law, University of Porto, Portugal), Maria Canudo (Faculty of Law, University of Porto, Portugal), Samuel Moreira (Faculty of Law, University of Porto, Portugal & Faculty of Law, University Lusíada, Portugal), and Inês Sousa Guedes (Faculty of Law, University of Porto, Portugal)
Copyright: © 2023 |Pages: 25
DOI: 10.4018/979-8-3693-1528-6.ch006
Abstract
This chapter aims to present a theoretical foundation on hacking, focusing on the perpetrator's profile, his modus operandi, and typologies. First, a conceptualization and characterization of the phenomenon's key terms is presented. Next, the chapter addresses the historical evolution of the perception of the phenomenon, from the moment of its emergence to the current understanding. The most prominent typologies in the scientific literature will be described, which seek to distinguish the perpetrators of the behaviors according to criteria related to their practice. While focusing on the cybercriminals, the chapter emphasizes the hacker's figure, directing the review on their sociodemographic profile and contextual aspects. Finally, the personality factors prevalent in hackers are characterized, namely according to the big five model and the dark triad model. This chapter, using criminological lens, will increase the knowledge of the hackers and its modus operandi. The implications of this knowledge will be outlined.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Honeypots and Honeynets: Analysis and Case Study
Kind of software intended for host intrusion and/or damage. The term covers hostile, intrusive and rogue software such as viruses, worms, trojans, most rootkits, scareware, spyware, crimeware and other malicious software.
Full Text Chapter Download: US $37.50 Add to Cart
BYOD and the Evolving Workplace
Malware constitutes software with malevolent objectives, aiming to inflict harm on computer systems. Occasionally, this malicious software unintentionally opens a gateway due to errors, glitches, or bad code.
Full Text Chapter Download: US $37.50 Add to Cart
The Impacts of Blockchain in Elections: Can It Improve Voting Outcomes?
A software that is designed to disrupt, damage, or gain unauthorized access to a computer or IT system.
Full Text Chapter Download: US $37.50 Add to Cart
Role of Artificial Intelligence in Cyber Security: A Useful Overview
Is a malicious software which is meant for damaging a user’s device and is often installed into devices by unsolicited emails.
Full Text Chapter Download: US $37.50 Add to Cart
Internet of Things Application for Intelligent Cities: Security Risk Assessment Challenges
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity Disclosure and Corporate Reputation: Rising Popularity of Cybersecurity in the Business World
Malware is any software that is purposefully created to disrupt a computer, server, client, or computer network, leak confidential information, obtain unauthorised access to data or systems, prevent access to data, or inadvertently compromise a user's privacy and security online.
Full Text Chapter Download: US $37.50 Add to Cart
Analysis of Possible Future Global Scenarios in the Field of Cyber Warfare: National Cyber Defense and Cyber Attack Capabilities
Short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of executable code, scripts, active content, and other software.
Full Text Chapter Download: US $37.50 Add to Cart
Development and Mitigation of Android Malware
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity and Electronic Services Oriented to E-Government in Europe
Malicious software designed specifically to damage or disrupt a system, attacking confidentiality, integrity and/or availability.
Full Text Chapter Download: US $37.50 Add to Cart
Artificial Moral Agency in Technoethics
Software or software agents that are consciously programmed and set lose to create evil affects in the operation of information technology. A computer virus is an example of malware.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Attacks on Critical Infrastructure: Review and Challenges
Short for malicious software, is software designed specifically to damage or gain access without the knowledge of the owner.
Full Text Chapter Download: US $37.50 Add to Cart
Benefits of Information Security Awareness Training Against Phishing Attacks: A Field Study
A ny program that is intentionally harmful to a computer, server, or network. Viruses, worms, Trojan horses, ransomware, and spyware are the examples of malware.
Full Text Chapter Download: US $37.50 Add to Cart
The Role of Artificial Intelligence in Cyber Security
Malware stands for malicious software. Malware intended to infiltrate and damage or disable computers.
Full Text Chapter Download: US $37.50 Add to Cart
Identity Theft through the Web
malicious software including viruses, worms, Trojan horses, bots, spyware, and other unwanted software, distributed mainly through e-mail and web sites
Full Text Chapter Download: US $37.50 Add to Cart
The Role of Education and Awareness in Tackling Insider Threats
This is short for malicious software which is designed purposely with the focus of initiating damage on a computer, server, or computer network. Malware causes damage once it is implanted or introduced in some manner to the target computer in the form of executable code, active content or other software while the user is still unaware that their system has been compromised.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Threats and Attacks on the Philippine Alternative Press: Range, Responses, and Remedies
A portmanteau of “malicious” and “software,” this refers to software designed to gain unauthorized access to and/or damage a computer system.
Full Text Chapter Download: US $37.50 Add to Cart
Auditing Defense against XSS Worms in Online Social Network-Based Web Applications
These are the malicious software or computer programs to interrupt the computer processing to take control of user computer or collect the sensitive information like login details. Examples are: viruses, Trojans horses, net worms etc.
Full Text Chapter Download: US $37.50 Add to Cart
Threats and Vulnerabilities of Mobile Applications
It is malicious software that can be in any file or a program.
Full Text Chapter Download: US $37.50 Add to Cart
E-Banking Frauds: The Current Scenario and Security Techniques
Malware, or malicious software, is any program or file that is detrimental to a computer operator. Malware comprises computer viruses, worms, Trojan horses and spyware.
Full Text Chapter Download: US $37.50 Add to Cart
POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing
Malware is a program designed to cause damage or to illegally access information on computer systems.
Full Text Chapter Download: US $37.50 Add to Cart
Malicious Software
Software intended to perform a malicious action.
Full Text Chapter Download: US $37.50 Add to Cart
Limitation of COTS Antiviruses: Issues, Controversies, and Problems of COTS Antiviruses
Full Text Chapter Download: US $37.50 Add to Cart
IT Security Investment Decision by New Zealand Owner-Managers
A type of software that can cause damage to business information.
Full Text Chapter Download: US $37.50 Add to Cart
The Advancing Cybersecurity Ecosystem of Israel: An Overview of Current Challenges and Opportunities in the Early 2020s
Software that is capable of copying itself while running an infected program. Depending on their prevalence, they can be viruses that infect files (such as macro viruses, executable infectious files, etc.) or viruses that infect the boot sector required to boot systems.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Crime Hidden in Email Spam
Malicious software that is designed to compromise a computer, server, or a computer network so as to gain unauthorized access or to cause damage.
Full Text Chapter Download: US $37.50 Add to Cart
An Analysis of Industry 4.0
Specially crafted code/software used to subvert or compromise a computerized asset, which may include viruses, worms, or trojan horses.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Malware Detection in Industrial Scenarios Using Machine Learning and Deep Learning Techniques
A software specially designed to cause damage to the user computer.
Full Text Chapter Download: US $37.50 Add to Cart
Defending Information Networks in Cyberspace: Some Notes on Security Needs
Also referred to as malicious software, or software which is installed without authorization upon a victim computer that has a malicious or criminal purpose; it comes in many forms and can be any program or source code producing output that the computer owner does not need, want, or expect. For example, malware can be a remote access Trojan horse that can not only open a back door to a remote computer but also control someone’s computer or network from a remote location. Malware includes viruses, worms, Trojan horses (that can, for example, spy on the system and display ads when the user least expects it), and malicious active content arriving through email or Web pages visited. These forms of malware normally run without the knowledge and permission of the user.
Full Text Chapter Download: US $37.50 Add to Cart
Use of Social Media for Policing
Malware is short form of Malicious Software and refers to the software specifically designed to damage computer systems.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Threat Ransomware and Marketing to Networked Consumers
A malicious software intentionally designed to harm computer systems or networks.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
BDS: Browser Dependent XSS Sanitizer
It is any type of malicious software or a program created to access unauthorized use of information or produces undesirable results. Any type of computer virus is a malware.
Full Text Chapter Download: US $37.50 Add to Cart
Realizing a Multi-Layered Mobile Strategy for Underserved Areas for Cybersecurity Leadership
This is software that is clearly intended to disrupt, harm, or gain unsanctioned access to a computer system.
Full Text Chapter Download: US $37.50 Add to Cart
Artificial Intelligence Applications in Cybersecurity
A file or a network that is sent to target devices through a network to create a vulnerability or malfunctioning behavior that is designed by an attacker.
Full Text Chapter Download: US $37.50 Add to Cart
The Age of Ransomware: Understanding Ransomware and Its Countermeasures.
Any malicious software that is used to inflict damage on computers and devices.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Security Strategy
A form of cyberattack involving software designed to damage a computer or network.
Full Text Chapter Download: US $37.50 Add to Cart
Emerging Cyber Security Threats During the COVID-19 Pandemic and Possible Countermeasures
Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.” Examples of common malware includes viruses, worms, Trojan viruses, spyware, adware, and ransomware.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR