A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Post on 13-Jan-2016

214 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

Transcript

A Timeline of Malicious Code A Timeline of Malicious Code

Sean WattsSean WattsDepartment of Computer ScienceDepartment of Computer Science

Clemson UniversityClemson University

As a partial requirement for CP SC As a partial requirement for CP SC 620.620.

What is Malicious Code

Software intended to cause undesired effects, security breaches or damage to a system.

Malicious code describes a broad category of system security terms

Worms. Trojan horses Attack scripts Viruses

INTRODUCTION

Timeline of Malicious Code

1983

The term "computer virus" is proposed

Timeline of Malicious Code

1986 The ‘Brain’ begins to ‘think’

Brain virus

Timeline of Malicious Code

1987The Lehigh virus discovered at Lehigh University

Lehigh virus

Timeline of Malicious Code

1988

The Morris Worm wriggles on ARPANET

Morris worm

Timeline of Malicious Code

1990

Symantec launches Norton

Norton anti-virus

Timeline of Malicious Code

1995

A new ‘Concept’

Concept virus

Timeline of Malicious Code

1999

Melissa, have you seen her ?

Melissa virus

Timeline of Malicious Code

2000

‘Love’ spreads around the world

ILoveYou Virus

Timeline of Malicious Code

2001

‘Anna’ goes beyond the court

Anna virus

Timeline of Malicious Code

2001

Code Red !!!

Code Red Worm

Timeline of Malicious Code

2003

You’ve been Slammered

Slammer worm

Timeline of Malicious Code

2004

We are all DOOMED !

MyDoom worm

Timeline of Malicious Code

2004

Sasser

Sasser worm

Timeline of Malicious Code

2005

Zotob

Zotob worm

Timeline of Malicious Code

2006

Too Much Horse Power

Trojan horse

Timeline of Malicious Code

2007

A ‘Storm’ is brewing

Storm worm

Conclusion

• Malicious code has been around for a long time.

• Users should be mindful of the harm viruses can cause a computer system.

• Malicious code are a clear and present danger.

• Venture into cyberspace with care and caution

References

• www.techshout.com

• http://inventors.about.com

• http://www.techweb.com/

• www.virus-scan-software.com

• www.washingtonpost.com

• http://www.exn.ca

• www.howstuffworks.com

• http://support.microsoft.com

• http://technology.newscientist.com

• http://infoplease.com

Questions

Any Questions ?

Thank You

top related