Digital Security Assignment Sample

Get the best assignment Sample on Digital Security.

Slide 1

  • Malware stands for malicious software, and it is used to transmit viruses.
  • Spyware, ransom ware, and worm are some classifications of malware.
  • Hackers have designed malware to stand-alone damage systems such as computers, mobile, and laptops (Alexander, 2021).
  • Malware usually enters computers in the form of images or files and corrupts the hard disk of computers (, 2019).
  • Spyware is defined as a program that can be installed on a computer with or without any permission.

People usually install spyware to collect confidential data of users, and it can track the browsing history of a personal computer. Spyware can install other malware and sends data to remote users without any permission. It can be defined as adware that is a separate program, and it enters at the time of installing any application on a personal computer (, 2019).

Slide 2

  • Spyware can be used to track internet usage data and capture information on credit cards.
  • Malware steals personal identity and sells bank account details to hackers.
  • More than 978 million people are victims of malware or spyware attacks, and they have lost almost $172 billion in cybercrime (, 2019).
  • Malware is the most vital threat to the internet as it infects personal devices and predicts product or service history.

For instance, spyware shows advertisements to users and provides exciting offers to them. It usually shows some links to users and instructs them to press such links to get prizes. In this way, it snatches information from users, and system monitors capture data of emails, chat-rooms, websites, programs, and dialogs (Agrafiotis et al. 2018).

Technical details of Malware

Slide 1

  • Malware infects computers through pirated media, videos, music, and games.
  • A Trojan is a most popular virus of malware that enters in the form of emails.
  • Cybercriminals send files through images; after clicking on the download button, a backdoor Trojan enters it (Alexander, 2021).
  • Distributed denial service attacks take down networks and spread traffic on computers.
  • People accept pop-up messages and download software from unreliable resources, which is a source of malware.

A software bug can exploit viruses in computers; moreover, software and hardware makers involve a backdoor in computers to fetch information. Phishing and spoofing is another way to accelerate malware or Trojan virus in computers (Harkin et al. 2020).

2nd slide

  • It spreads through spam messages or emails which have been identified through German campaigns.
  • Trojan virus targets infected computers and demands money from users.
  • Twitter accounts and other application software share malware URLs (, 2021).
  • People accidentally click on download button, and malicious APK gets downloaded.

Malware installs applications after downloading its APK and hides on a computer to collect data itself. After collecting all information, it connects to the C & C server (Soni, 2019).

3rd slide

  • Trojan software infects computers and acts as a spy on computers.
  • Root kit extends time of malware software and steals log-in credentials (Souri and Hosseini, 2018).
  • Hackers provide malware in pirate apps, and it redirects traffic to Wi-Fi connected devices.
  • Malware can send unusual emails to companies by which people can face unethical problems.

Malware involves unexpected icons in mobile devices; furthermore, it works invisibly in computer devices and hijacks the browser history of a person. It sends credit card, bank details, and prizes-related spam messages to users (, 2019).

Impact of Malware

Slide 1

  • Malware can reduce network connection speed.
  • Malware can show error messages continuously and gathers personal information of users (Suryati and Budiono, 2020).
  • It generates misleading application software that shows security-related messages to users (Agrafiotis et al. 2018).
  • Spyware infects excel files, data fines, power points, and word files.
  • It disables banking services and breaks down networks.

Malware can easily breakdown software for which an organization can face operational issues. It collects personal information of banking sectors such as bank account details, passwords, and identity proof of a person (Agrafiotis et al. 2018).

Slide 2

  • Malware can control personal devices with the help of unusual application software.
  • Screen lockers, scan wares, and encrypted malware are some parts of malware attacks (Alexander, 2021).
  • People cannot open their computers until screen ware collected all information about users.
  • Encrypted malware helps hackers to collect files and confidential data of industrialists (Agrafiotis et al. 2018).

Malware impacts badly on organizations as hackers demand a considerable amount of money from users and sell files to competitors of a company. It occur technical problems and network-related problems in computers. It involves remote access to disrupt, spy, hack and launch DDoS attacks on computer servers (, 2021).

Slide 3

  • Malware damages enterprise operations and incurred hardware failures.
  • Malware tries to implement risky codes in computers by which companies can quickly lose their brand images (Soni, 2019).
  • Spyware involves social engineering attacks and mobile phishing in network servers.
  • Scan wares address rough security tools in computers and discover all-digital payment activities of users.

Malware can quickly spread through malspam and reduce effectiveness of business organizations; moreover, it destroys the system of users (Suryati and Budiono, 2020).

Impact to individual and society

Slide 1

  • Malware impacts badly on organizational behaviour as it controls applications of an organization.
  • Data breaches, illegal activities, unauthorized access to bank accounts can occur in organizations due to malware attacks (, 2019).
  • In this way, overall profitability, brand image, and assets of an organization can be reduced, and it may face colossal employee turnover.
  • Malware collects browsing data of young people and threatens them with the help of confidential data, which is increasing cyber threats (Agrafiotis et al. 2018).
  • It is affecting financial institutions, which results in security threats.

Hackers demand a considerable amount of money from business people; in this way, the overall condition of society gets decreased (Agrafiotis et al. 2018). Young people are trying to withdraw money from their parents’ accounts. Trojan virus connects infected computers with host servers to attack neighbouring accounts also.

Slide 2

  • Malware is destroying the effectiveness of society as it fetches all account-related information from users (, 2021).
  • Spywares targets instant messages of users to sell passwords on IM platforms.
  • Organizations can experience unethical activities in the workplace as malware can advertise incorrect data of a company.
  • Data can be fetched by third-party vendors; moreover, it can snatch the business planning of a company (Suryati and Budiono, 2020).

A Trojan virus can disrupt, inflict, steal, and snatches information from data networks. Society can face financial problems due to malware attacks on computers as it threatens users (Suryati and Budiono, 2020).

Reference list

Agrafiotis, I., Nurse, J.R., Goldsmith, M., Creese, S. and Upton, D., 2018. A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity4(1), p.tyy006.

Alexander, S.G., (2021), spyware. Available at: [Accessed on: 26/2/2021].

Harkin, D., Molnar, A. and Vowles, E., 2020. The commodification of mobile phone surveillance: An analysis of the consumer spyware industry. Crime, media, culture16(1), pp.33-60., (2021), Spyware.  Available at: [Accessed on: 26/2/2021].

Soni, V.D., 2019. Security issues in using iot enabled devices and their Impact. International Engineering Journal For Research & Development4(2), p.7.

Souri, A. and Hosseini, R., 2018. A state-of-the-art survey of malware detection approaches using data mining techniques. Human-centric Computing and Information Sciences8(1), pp.1-22.

Suryati, O.T. and Budiono, A., 2020. Impact Analysis of Malware Based on Call Network API with Heuristic Detection Method. International Journal of Advances in Data and Information Systems1(1), pp.1-8., (2019), What is spyware? And how to remove it.  Available at:,computer%2C%20often%20without%20your%20knowledge [Accessed on: 26/2/2021].

Know more about UniqueSubmission’s other writing services:

Assignment Writing Help

Essay Writing Help

Dissertation Writing Help

Case Studies Writing Help

MYOB Perdisco Assignment Help

Presentation Assignment Help

Proofreading & Editing Help

Leave a Comment