Presentation is loading. Please wait.

Presentation is loading. Please wait.

Dr. Richard Ford.  By now in the course, we’ve examined a lot about Malicious Mobile Code  One thing we’ve learned is that the world looks very different.

Similar presentations


Presentation on theme: "Dr. Richard Ford.  By now in the course, we’ve examined a lot about Malicious Mobile Code  One thing we’ve learned is that the world looks very different."— Presentation transcript:

1 Dr. Richard Ford

2  By now in the course, we’ve examined a lot about Malicious Mobile Code  One thing we’ve learned is that the world looks very different now than it did ten years ago…  What does the future look like?

3  What changes to we foresee in computing trends?  What trends have we seen in the MMC world?  How do these two factors interact?

4  More power – faster processors, more memory  More connectivity – higher bandwidth on over-strained links  More numbers – computers online keep growing (“always on”)  More embedded devices – cell phones, toasters, coke machines

5  Embedded devices  Static nature – how often do you update a coke machine?  Forgotten devices – we put something up with connectivity and forget about it  What do higher numbers of devices do?

6  Cellular Phone viruses pose a unique risk for users  Fundamentally different attack profile  Fundamentally different threat  Repeated dialing of a 900 number?  Repeated dialing of 9-1-1  Poor patching profile  Low mindshare

7  Fewer worms, more Spyware  Entirely $ driven?  Unremovable MMC?  Speed of Spread mostly irrelevant…

8  What is the difference between Spyware and Adware?  Permission-based?  Marketing driven?  Legitimate/Illegal?

9  Must be careful of legal ramifications  Adware vendors can sue you!  Cannot impute malfeasance  The role of the EULA  If you agree to it, can you do it?

10  Differences?  What do these differences mean in the real world?  What other things can the attackers do?  How can we stop them?

11  Is this marketing speak? What do we think…?

12  Like phishing, but for bigger phish…

13  What kind of things can the attack community do that they’re not doing?  What kind of things can defenders do that they’re not doing?

14  The only stupid question is the one you don’t ask!


Download ppt "Dr. Richard Ford.  By now in the course, we’ve examined a lot about Malicious Mobile Code  One thing we’ve learned is that the world looks very different."

Similar presentations


Ads by Google