Wednesday, 9 January 2019

Virus Damage Scenarious in OS Security

Virus
  • Blackmail
  • Denial of service as long as virus runs
  • Permanently damage hardware
  • Target a competitor's computer
            - Do harm
            - Espionage
  • Intra-corporate dirty tricks
            - Practical joke
            - Sabotage another corporate officer's files

Worms vs Viruses
  • Viruses require other programs to run
  • Worms are self-running (separate process)
  • The 1988 Internet Worm
            - Consisted of two programs
                   Bootstrap to upload worm
                   The worm itself
            - Exploited bugs in sendmail and finger
            - Worm first hid its existence
            - Next replicated itself on new machines
            - Brought the Internet (1988 version) to a screeching halt.


0 Comments:

Post a Comment

Popular Posts

Categories

100 Python Programs for Beginner (49) AI (34) Android (24) AngularJS (1) Assembly Language (2) aws (17) Azure (7) BI (10) book (4) Books (173) C (77) C# (12) C++ (82) Course (67) Coursera (226) Cybersecurity (24) data management (11) Data Science (128) Data Strucures (8) Deep Learning (20) Django (14) Downloads (3) edx (2) Engineering (14) Excel (13) Factorial (1) Finance (6) flask (3) flutter (1) FPL (17) Google (34) Hadoop (3) HTML&CSS (47) IBM (25) IoT (1) IS (25) Java (93) Leet Code (4) Machine Learning (59) Meta (22) MICHIGAN (5) microsoft (4) Nvidia (3) Pandas (4) PHP (20) Projects (29) Python (929) Python Coding Challenge (351) Python Quiz (21) Python Tips (2) Questions (2) R (70) React (6) Scripting (1) security (3) Selenium Webdriver (3) Software (17) SQL (42) UX Research (1) web application (8) Web development (2) web scraping (2)

Followers

Person climbing a staircase. Learn Data Science from Scratch: online program with 21 courses