Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
Malware is one of the biggest threats in the digital environment, as it is constantly evolving and becoming more dangerous. The purpose of this study was to analyse the evolution of malicious software. Historical, comparative and empirical analysis and an assessment of existing security technologies were used to achieve this goal. The main findings revealed several key stages in the development of malicious software. Historical analysis has shown that the evolution of malware has gone through several significant stages, from simple viruses and worms to complex threats such as ransomware and spyware. These changes were driven by technological advances and increased attack capabilities, which allowed malicious software to use new vectors of influence and deception methods. A comparative analysis of modern cyber threats revealed the key characteristics and differences between different types of malwares, including their specific distribution methods and vulnerabilities. It was found that new threats have a more complex architecture and use more innovative tactics, which significantly complicates their detection and neutralisation. An empirical analysis involving the use of threat detection tools provided specific data on malware behaviour in action. A review and testing of modern security methods, including antivirus solutions, intrusion detection systems, and firewalls, showed their strengths and weaknesses, as well as their effectiveness in detecting and preventing new threats. The results of the study highlighted the need for continuous improvement of protection methods, which is critical for effective control of modern cyber threats
Malware is one of the biggest threats in the digital environment, as it is constantly evolving and becoming more dangerous. The purpose of this study was to analyse the evolution of malicious software. Historical, comparative and empirical analysis and an assessment of existing security technologies were used to achieve this goal. The main findings revealed several key stages in the development of malicious software. Historical analysis has shown that the evolution of malware has gone through several significant stages, from simple viruses and worms to complex threats such as ransomware and spyware. These changes were driven by technological advances and increased attack capabilities, which allowed malicious software to use new vectors of influence and deception methods. A comparative analysis of modern cyber threats revealed the key characteristics and differences between different types of malwares, including their specific distribution methods and vulnerabilities. It was found that new threats have a more complex architecture and use more innovative tactics, which significantly complicates their detection and neutralisation. An empirical analysis involving the use of threat detection tools provided specific data on malware behaviour in action. A review and testing of modern security methods, including antivirus solutions, intrusion detection systems, and firewalls, showed their strengths and weaknesses, as well as their effectiveness in detecting and preventing new threats. The results of the study highlighted the need for continuous improvement of protection methods, which is critical for effective control of modern cyber threats
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.