![]() Graduate student at Cornell Released worm onto Internet from MIT computer Effect of worm Spread to 6,000 Unix computers Infected computers kept crashing or became unresponsive Took a day for fixes to be published Impact on Morris Suspended from Cornell 3 years probation hours community service $150,000 in legal fees and fines 1-7 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-6ħ The Internet Worm Robert Tappan Morris, Jr. Publishing as Pearson Addison-Wesley 6-5Ħ Worms Worm Self-contained program Spreads through a computer network Exploits security holes in networked computers Famous worms WANK Code Red Sapphire (Slammer) Blaster Sasser 1-6 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-4ĥ Viruses (2/2) Well-known viruses Brain Michelangelo Melissa Love Bug Viruses today Commercial antivirus software Few people keep up-to-date 1-5 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-3Ĥ Viruses (1/2) Virus: piece of self-replicating code embedded within another program (host) Viruses associated with program files Hard disks, floppy disks, CD-ROMS attachments How viruses spread Diskettes or CDs Files downloaded from Internet 1-4 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-2ģ Introduction Computers getting faster and less expensive Utility of computers increasing Web surfing Shopping Managing personal information Increasing use of computers growing importance of computer security 1-3 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-WesleyĢ Chapter Overview Introduction Viruses, worms, and Trojan horses Phreaks and hackers Denial-of-service attacks Online voting 1-2 Copyright 2009 Pearson Education, Inc. Quinn Copyright 2009 Pearson Education, Inc. 1 Chapter 6: Computer and Network Security Ethics for the Information Age Third Edition by Michael J.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |