Download presentation
Presentation is loading. Please wait.
Published byHorace Skinner Modified over 9 years ago
1
Dr. Richard Ford
2
By now in the course, we’ve examined a lot about Malicious Mobile Code One thing we’ve learned is that the world looks very different now than it did ten years ago… What does the future look like?
3
What changes to we foresee in computing trends? What trends have we seen in the MMC world? How do these two factors interact?
4
More power – faster processors, more memory More connectivity – higher bandwidth on over-strained links More numbers – computers online keep growing (“always on”) More embedded devices – cell phones, toasters, coke machines
5
Embedded devices Static nature – how often do you update a coke machine? Forgotten devices – we put something up with connectivity and forget about it What do higher numbers of devices do?
6
Cellular Phone viruses pose a unique risk for users Fundamentally different attack profile Fundamentally different threat Repeated dialing of a 900 number? Repeated dialing of 9-1-1 Poor patching profile Low mindshare
7
Fewer worms, more Spyware Entirely $ driven? Unremovable MMC? Speed of Spread mostly irrelevant…
8
What is the difference between Spyware and Adware? Permission-based? Marketing driven? Legitimate/Illegal?
9
Must be careful of legal ramifications Adware vendors can sue you! Cannot impute malfeasance The role of the EULA If you agree to it, can you do it?
10
Differences? What do these differences mean in the real world? What other things can the attackers do? How can we stop them?
11
Is this marketing speak? What do we think…?
12
Like phishing, but for bigger phish…
13
What kind of things can the attack community do that they’re not doing? What kind of things can defenders do that they’re not doing?
14
The only stupid question is the one you don’t ask!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.