Download
a timeline of malicious code n.
Skip this Video
Loading SlideShow in 5 Seconds..
A Timeline of Malicious Code PowerPoint Presentation
Download Presentation
A Timeline of Malicious Code

A Timeline of Malicious Code

2 Vues Download Presentation
Télécharger la présentation

A Timeline of Malicious Code

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

  2. INTRODUCTION • What is Malicious Code • Software intended to cause undesired effects, security breaches or damage to a system. • Malicious code describes a broad category of system security terms • Worms. • Trojan horses • Attack scripts • Viruses

  3. Timeline of Malicious Code 1983 The term "computer virus" is proposed

  4. Timeline of Malicious Code The ‘Brain’ begins to ‘think’ 1986 Brain virus

  5. Timeline of Malicious Code The Lehigh virus discovered at Lehigh University 1987 Lehigh virus

  6. Timeline of Malicious Code The Morris Worm wriggles on ARPANET 1988 Morris worm

  7. Timeline of Malicious Code Symantec launches Norton 1990 Norton anti-virus

  8. Timeline of Malicious Code A new ‘Concept’ 1995 Concept virus

  9. Timeline of Malicious Code Melissa, have you seen her ? 1999 Melissa virus

  10. Timeline of Malicious Code ‘Love’ spreads around the world 2000 ILoveYou Virus

  11. Timeline of Malicious Code ‘Anna’ goes beyond the court 2001 Anna virus

  12. Timeline of Malicious Code Code Red !!! 2001 Code Red Worm

  13. Timeline of Malicious Code You’ve been Slammered 2003 Slammer worm

  14. Timeline of Malicious Code We are all DOOMED ! 2004 MyDoom worm

  15. Timeline of Malicious Code Sasser 2004 Sasser worm

  16. Timeline of Malicious Code Zotob 2005 Zotob worm

  17. Timeline of Malicious Code Too Much Horse Power 2006 Trojan horse

  18. Timeline of Malicious Code A ‘Storm’ is brewing 2007 Storm worm

  19. Conclusion • Malicious code has been around for a long time. • Users should be mindful of the harm viruses can cause a computer system. • Malicious code are a clear and present danger. • Venture into cyberspace with care and caution

  20. References • www.techshout.com • http://inventors.about.com • http://www.techweb.com/ • www.virus-scan-software.com • www.washingtonpost.com • http://www.exn.ca • www.howstuffworks.com • http://support.microsoft.com • http://technology.newscientist.com • http://infoplease.com

  21. Questions Any Questions ?

  22. Thank You