Top Banner
A Timeline of Malicious Code A Timeline of Malicious Code Sean Watts Sean Watts Department of Computer Science Department of Computer Science Clemson University Clemson University As a partial requirement for CP SC As a partial requirement for CP SC 620. 620.
22

A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Jan 13, 2016

Download

Documents

Moris Bishop
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

A Timeline of Malicious Code A Timeline of Malicious Code

Sean WattsSean WattsDepartment of Computer ScienceDepartment of Computer Science

Clemson UniversityClemson University

As a partial requirement for CP SC As a partial requirement for CP SC 620.620.

Page 2: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

What is Malicious Code

Software intended to cause undesired effects, security breaches or damage to a system.

Malicious code describes a broad category of system security terms

Worms. Trojan horses Attack scripts Viruses

INTRODUCTION

Page 3: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

1983

The term "computer virus" is proposed

Page 4: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

1986 The ‘Brain’ begins to ‘think’

Brain virus

Page 5: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

1987The Lehigh virus discovered at Lehigh University

Lehigh virus

Page 6: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

1988

The Morris Worm wriggles on ARPANET

Morris worm

Page 7: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

1990

Symantec launches Norton

Norton anti-virus

Page 8: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

1995

A new ‘Concept’

Concept virus

Page 9: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

1999

Melissa, have you seen her ?

Melissa virus

Page 10: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2000

‘Love’ spreads around the world

ILoveYou Virus

Page 11: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2001

‘Anna’ goes beyond the court

Anna virus

Page 12: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2001

Code Red !!!

Code Red Worm

Page 13: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2003

You’ve been Slammered

Slammer worm

Page 14: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2004

We are all DOOMED !

MyDoom worm

Page 15: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2004

Sasser

Sasser worm

Page 16: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2005

Zotob

Zotob worm

Page 17: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2006

Too Much Horse Power

Trojan horse

Page 18: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2007

A ‘Storm’ is brewing

Storm worm

Page 19: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Conclusion

• Malicious code has been around for a long time.

• Users should be mindful of the harm viruses can cause a computer system.

• Malicious code are a clear and present danger.

• Venture into cyberspace with care and caution

Page 20: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

References

• www.techshout.com

• http://inventors.about.com

• http://www.techweb.com/

• www.virus-scan-software.com

• www.washingtonpost.com

• http://www.exn.ca

• www.howstuffworks.com

• http://support.microsoft.com

• http://technology.newscientist.com

• http://infoplease.com

Page 21: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Questions

Any Questions ?

Page 22: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Thank You