Presentation is loading. Please wait.

Presentation is loading. Please wait.

A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Similar presentations


Presentation on theme: "A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620."— Presentation transcript:

1 A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

2 What is Malicious Code  Software intended to cause undesired effects, security breaches or damage to a system.  Malicious code describes a broad category of system security terms  Worms.  Trojan horses  Attack scripts  Viruses INTRODUCTION

3 Timeline of Malicious Code 1983 The term "computer virus" is proposed

4 Timeline of Malicious Code 1986 The ‘Brain’ begins to ‘think’ Brain virus

5 Timeline of Malicious Code 1987 The Lehigh virus discovered at Lehigh University Lehigh virus

6 Timeline of Malicious Code 1988 The Morris Worm wriggles on ARPANET Morris worm

7 Timeline of Malicious Code 1990 Symantec launches Norton Norton anti-virus

8 Timeline of Malicious Code 1995 A new ‘Concept’ Concept virus

9 Timeline of Malicious Code 1999 Melissa, have you seen her ? Melissa virus

10 Timeline of Malicious Code 2000 ‘Love’ spreads around the world ILoveYou Virus

11 Timeline of Malicious Code 2001 ‘Anna’ goes beyond the court Anna virus

12 Timeline of Malicious Code 2001 Code Red !!! Code Red Worm

13 Timeline of Malicious Code 2003 You’ve been Slammered Slammer worm

14 Timeline of Malicious Code 2004 We are all DOOMED ! MyDoom worm

15 Timeline of Malicious Code 2004 Sasser Sasser worm

16 Timeline of Malicious Code 2005 Zotob Zotob worm

17 Timeline of Malicious Code 2006 Too Much Horse Power Trojan horse

18 Timeline of Malicious Code 2007 A ‘Storm’ is brewing Storm worm

19 Conclusion Malicious code has been around for a long time. Users should be mindful of the harm viruses can cause a computer system. Malicious code are a clear and present danger. Venture into cyberspace with care and caution

20 References www.techshout.com http://inventors.about.com http://www.techweb.com/ www.virus-scan-software.com www.washingtonpost.com http://www.exn.ca www.howstuffworks.com http://support.microsoft.com http://technology.newscientist.com http://infoplease.com

21 Questions Any Questions ?

22 Thank You


Download ppt "A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620."

Similar presentations


Ads by Google