a timeline of malicious code sean watts department of computer science clemson university as a...
TRANSCRIPT
![Page 1: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/1.jpg)
A Timeline of Malicious Code A Timeline of Malicious Code
Sean WattsSean WattsDepartment of Computer ScienceDepartment of Computer Science
Clemson UniversityClemson University
As a partial requirement for CP SC As a partial requirement for CP SC 620.620.
![Page 2: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/2.jpg)
What is Malicious Code
Software intended to cause undesired effects, security breaches or damage to a system.
Malicious code describes a broad category of system security terms
Worms. Trojan horses Attack scripts Viruses
INTRODUCTION
![Page 3: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/3.jpg)
Timeline of Malicious Code
1983
The term "computer virus" is proposed
![Page 4: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/4.jpg)
Timeline of Malicious Code
1986 The ‘Brain’ begins to ‘think’
Brain virus
![Page 5: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/5.jpg)
Timeline of Malicious Code
1987The Lehigh virus discovered at Lehigh University
Lehigh virus
![Page 6: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/6.jpg)
Timeline of Malicious Code
1988
The Morris Worm wriggles on ARPANET
Morris worm
![Page 7: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/7.jpg)
Timeline of Malicious Code
1990
Symantec launches Norton
Norton anti-virus
![Page 8: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/8.jpg)
Timeline of Malicious Code
1995
A new ‘Concept’
Concept virus
![Page 9: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/9.jpg)
Timeline of Malicious Code
1999
Melissa, have you seen her ?
Melissa virus
![Page 10: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/10.jpg)
Timeline of Malicious Code
2000
‘Love’ spreads around the world
ILoveYou Virus
![Page 11: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/11.jpg)
Timeline of Malicious Code
2001
‘Anna’ goes beyond the court
Anna virus
![Page 12: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/12.jpg)
Timeline of Malicious Code
2001
Code Red !!!
Code Red Worm
![Page 13: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/13.jpg)
Timeline of Malicious Code
2003
You’ve been Slammered
Slammer worm
![Page 14: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/14.jpg)
Timeline of Malicious Code
2004
We are all DOOMED !
MyDoom worm
![Page 15: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/15.jpg)
Timeline of Malicious Code
2004
Sasser
Sasser worm
![Page 16: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/16.jpg)
Timeline of Malicious Code
2005
Zotob
Zotob worm
![Page 17: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/17.jpg)
Timeline of Malicious Code
2006
Too Much Horse Power
Trojan horse
![Page 18: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/18.jpg)
Timeline of Malicious Code
2007
A ‘Storm’ is brewing
Storm worm
![Page 19: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/19.jpg)
Conclusion
• Malicious code has been around for a long time.
• Users should be mindful of the harm viruses can cause a computer system.
• Malicious code are a clear and present danger.
• Venture into cyberspace with care and caution
![Page 20: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/20.jpg)
References
• www.techshout.com
• http://inventors.about.com
• http://www.techweb.com/
• www.virus-scan-software.com
• www.washingtonpost.com
• http://www.exn.ca
• www.howstuffworks.com
• http://support.microsoft.com
• http://technology.newscientist.com
• http://infoplease.com
![Page 21: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/21.jpg)
Questions
Any Questions ?
![Page 22: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620](https://reader036.vdocuments.us/reader036/viewer/2022062518/56649ebd5503460f94bc6f73/html5/thumbnails/22.jpg)
Thank You