+ All Categories
Home > Documents > A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a...

A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a...

Date post: 13-Jan-2016
Category:
Upload: moris-bishop
View: 216 times
Download: 0 times
Share this document with a friend
Popular Tags:
22
A Timeline of Malicious Code A Timeline of Malicious Code Sean Watts Sean Watts Department of Computer Science Department of Computer Science Clemson University Clemson University As a partial requirement for CP SC As a partial requirement for CP SC 620. 620.
Transcript
Page 1: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

A Timeline of Malicious Code A Timeline of Malicious Code

Sean WattsSean WattsDepartment of Computer ScienceDepartment of Computer Science

Clemson UniversityClemson University

As a partial requirement for CP SC As a partial requirement for CP SC 620.620.

Page 2: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

What is Malicious Code

Software intended to cause undesired effects, security breaches or damage to a system.

Malicious code describes a broad category of system security terms

Worms. Trojan horses Attack scripts Viruses

INTRODUCTION

Page 3: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

1983

The term "computer virus" is proposed

Page 4: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

1986 The ‘Brain’ begins to ‘think’

Brain virus

Page 5: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

1987The Lehigh virus discovered at Lehigh University

Lehigh virus

Page 6: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

1988

The Morris Worm wriggles on ARPANET

Morris worm

Page 7: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

1990

Symantec launches Norton

Norton anti-virus

Page 8: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

1995

A new ‘Concept’

Concept virus

Page 9: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

1999

Melissa, have you seen her ?

Melissa virus

Page 10: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2000

‘Love’ spreads around the world

ILoveYou Virus

Page 11: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2001

‘Anna’ goes beyond the court

Anna virus

Page 12: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2001

Code Red !!!

Code Red Worm

Page 13: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2003

You’ve been Slammered

Slammer worm

Page 14: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2004

We are all DOOMED !

MyDoom worm

Page 15: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2004

Sasser

Sasser worm

Page 16: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2005

Zotob

Zotob worm

Page 17: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2006

Too Much Horse Power

Trojan horse

Page 18: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Timeline of Malicious Code

2007

A ‘Storm’ is brewing

Storm worm

Page 19: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Conclusion

• Malicious code has been around for a long time.

• Users should be mindful of the harm viruses can cause a computer system.

• Malicious code are a clear and present danger.

• Venture into cyberspace with care and caution

Page 20: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

References

• www.techshout.com

• http://inventors.about.com

• http://www.techweb.com/

• www.virus-scan-software.com

• www.washingtonpost.com

• http://www.exn.ca

• www.howstuffworks.com

• http://support.microsoft.com

• http://technology.newscientist.com

• http://infoplease.com

Page 21: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Questions

Any Questions ?

Page 22: A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.

Thank You


Recommended