Malware - Vulnerability To Malware

Vulnerability To Malware

In this context, as throughout, it should be borne in mind that the “system” under attack may be of various types, e.g. a single computer and operating system, a network or an application.

Various factors make a system more vulnerable to malware:

  • Homogeneity: e.g. when all computers in a network run the same operating system; upon exploiting one, one can exploit them all.
  • Weight of numbers: simply because the vast majority of existing malware is written to attack Windows systems, then Windows systems are more vulnerable to succumbing to malware attacks (regardless of the security strengths or weaknesses of Windows itself).
  • Defects: malware using defects in the operating system design.
  • Unconfirmed code: code from a floppy disk, CD-ROM or USB device may be executed without the user’s permission.
  • Over-privileged users: some systems allow all users to modify their internal structures. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an Administrator or root, and a regular user of the system.
  • Over-privileged code: some systems allow code executed by a user to access all rights of that user. Also standard operating procedure for early microcomputer and home computer systems.

Read more about this topic:  Malware