ABSTRACT

The nodes in cyberspace consist of both computers and, in a sense, of people. It's useful to divide up the computers in cyberspace into several categories. First, are the computers (and phones) that the people use to interact with online information, and to communicate with one another. Second, there are the computers, usually much bigger and more powerful, that are used by organizations to run their businesses. Malware targeted at the operating system level is harder to install, because it requires a higher level of permission, but provides greater opportunities. Malware detection software can usually find user space malware and often malware in the operating system, but finding and removing malware in the code that runs when the device is turned on is much more difficult. Most malware will leave a hook in a system that it has infected so that subsequent intrusions are easier.