Evolution of Malware Threats and Techniques: a Review

Mohammad Nasser Alenezi(1), Haneen Khalid Alabdulrazzaq(2*), Abdullah Abdulhai Alshaher(3), Mubarak Mohammad Alkharang(4)
(1) Public Authority for Applied Education and Training
(2) Public Authority for Applied Education and Training
(3) Public Authority for Applied Education and Training
(4) Public Authority for Applied Education and Training
(*) Corresponding Author

Abstract

The rapid development of technology, and its usage, in our everyday lives caused us to depend on many of the aspects it offers. The evolution of the Internet in recent decades has changed human life drastically as accessing knowledge, communication, and social interaction, became readily available. Nowadays, we have become dependent on our PCs and smart devices in accomplishing everyday tasks. People are using these devices to store valuable information. This information became the target of cybercriminals who are constantly creating new ways to gain unauthorized access to it. In the past few decades, cybercrime and the construction of malicious software (malware), have seen a significant rise. In this research, we present a literature review of the historical evolution of malware. We describe the common characteristics and propagation methods for the types of malware in each phase of its evolution. Furthermore, we illustrate the purpose of its creation and the damages it has caused. The purpose of this study is to provide researchers with background about malware and its evolution leading up to present day threats.

Article Statistic

Abstract view : 26 times
PDF views : 18 times

How To Cite This :

Refbacks

  • There are currently no refbacks.


Institute of Computing, International Journal of Communication Networks and Information Security (IJCNIS)               ISSN: 2073-607X (Online)