Download presentation
Presentation is loading. Please wait.
Published byLetitia Logan Modified over 9 years ago
1
Jennifer Leggette and Michael Tyler
2
Four Phases : 1.Experiments 2.Pranks 3.Malicious/For Profit 4.Future of Malware
3
Purpose: benign or caused accidental damage, mostly wanted to spread Why: Programmers wanted to gain experience Example: Creeper
4
Originated in the early 1970’s in Cambridge, Massachusetts Spread through ARPAnet Displayed: I’M THE CREEPER: CATCH ME IF YOU CAN
5
Some were harmless while others were highly damaging First malware prank: Elk Cloner, written by a high school student which the purpose was to display a poem on the screen once in every 50 boot ups.
6
July 2001 Exploited buffer overflow Defaced websites and launched denial of service attacks Affected site read: “HELLO! Welcome to http://www.worm.com! Hacked by Chinese!”http://www.worm.com
7
Microsoft Office, C source and C++ source files
8
Adware Display advertisements Spyware Gain information about the user without their knowledge Ransomware Prevents user from using system as normal
9
Fake antivirus software
10
Espionage Cyberwarfare New Platforms
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.