A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Slides:



Advertisements
Similar presentations
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Advertisements

By Hiranmayi Pai Neeraj Jain
Computer Virus Presented by Cora Banks MOT-19 Ms.Cross.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
James Tam Computer Security Concepts covered Malicious computer programs Malicious computer use Security measures.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
Nasca Internet Networking and Security viruses.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
 Fundamental terms  Diseases vs. Diseases transmitted by a network  Branching Process  The SIR epidemic model  The SIS epidemic Model  5 Worst Computer.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Unit 2 - Hardware Computer Security.
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
BUSINESS B1 Information Security.
The History and Details of Computer Viruses With Chuck Easttom
1 ISA 662 Information System Security 20 Years Of PC Viruses.
Viruses & Destructive Programs
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
D. Beecroft Fremont High School VIRUSES.
 a crime committed on a computer network, esp. the Internet.
computer Viruses Ever MAde To Protect What Matters
Mobile Code Data Base by Arthur Reloj Overview: What's Mobile Code Purpose of a Mobile Code Data Base Problems concerning Mobile Code & Basic Design.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
 Awesome Stuff Cyber Security Tyler Hoover Auburn University.
Technology Competency Computer Infestations Mr. Locke.
Computer Security By Amy Dennison 7H I Love you Melissa Esafe Happy99.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Computer Viruses By: Eyad Al-Hazmi. Roadmap Introduction : Computer Viruses in brief Danger of Virus attacks Virus Attacks and Ethics Economic Impact.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Computer viruses are programs written by people and they are programed specially to damage the data on our computer by corrupting programs, deleting files,
1 3 Computing System Fundamentals 3.7 Utility Software.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Dogaong, Charlie L. BSIT The Department of Justice categorizes computer crime in three ways: The computer as a target – attacking the computers of others.
Take a tour around my slideshow to learn more about viruses.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
By Thomas Pantone Cosc 380.  A virus is a type of malware that self replicates after being executed and inserts itself into other programs, data files,
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Evolution of Computer Viruses A Technical Presentation by: Logan Kallop.
James Paik. What is a virus? A virus is a malicious program that can be executed on the computer and can cause damage to it.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
MALWARE Autumn Mattis.
Computer Virus Nick DeFabis.
By Quentin Lively Notorious Viruses.
Why Computer Security Need???
Computer Viruses By Aylmer Or.
How to Get Rid of Online Threats Impacting your Computer Device?
Introduction to Internet Worm
Computer System Security
Presentation transcript:

A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

What is Malicious Code  Software intended to cause undesired effects, security breaches or damage to a system.  Malicious code describes a broad category of system security terms  Worms.  Trojan horses  Attack scripts  Viruses INTRODUCTION

Timeline of Malicious Code 1983 The term "computer virus" is proposed

Timeline of Malicious Code 1986 The ‘Brain’ begins to ‘think’ Brain virus

Timeline of Malicious Code 1987 The Lehigh virus discovered at Lehigh University Lehigh virus

Timeline of Malicious Code 1988 The Morris Worm wriggles on ARPANET Morris worm

Timeline of Malicious Code 1990 Symantec launches Norton Norton anti-virus

Timeline of Malicious Code 1995 A new ‘Concept’ Concept virus

Timeline of Malicious Code 1999 Melissa, have you seen her ? Melissa virus

Timeline of Malicious Code 2000 ‘Love’ spreads around the world ILoveYou Virus

Timeline of Malicious Code 2001 ‘Anna’ goes beyond the court Anna virus

Timeline of Malicious Code 2001 Code Red !!! Code Red Worm

Timeline of Malicious Code 2003 You’ve been Slammered Slammer worm

Timeline of Malicious Code 2004 We are all DOOMED ! MyDoom worm

Timeline of Malicious Code 2004 Sasser Sasser worm

Timeline of Malicious Code 2005 Zotob Zotob worm

Timeline of Malicious Code 2006 Too Much Horse Power Trojan horse

Timeline of Malicious Code 2007 A ‘Storm’ is brewing Storm worm

Conclusion Malicious code has been around for a long time. Users should be mindful of the harm viruses can cause a computer system. Malicious code are a clear and present danger. Venture into cyberspace with care and caution

References

Questions Any Questions ?

Thank You