86 results on '"COMPUTER worms"'
Search Results
2. The Threat of Cyber Terrorism and What International Law Should (Try To) Do about It.
- Author
-
Dinniss, Heather A. Harrison
- Subjects
CYBERTERRORISM ,CYBERCRIMINALS ,COMPUTER viruses ,CYBERCULTURE ,INTERNET & terrorism ,WORLD Wide Web ,COMPUTER worms ,COMPUTER hacking ,COMPUTER crimes - Abstract
The article discusses the threat of cyber terrorism and presents suggestions on dealing with it. It refers to some of the many difficulties faced by the international legal community in formulating a response to cyber terrorism including the lack of an agreed definition on acts or conduct to be included in the term cyber terrorism and disagreement across the international community on actions against acts that would amount to terrorism. It mentions instances such as the TV5Monde attack that constitute interference in the domestic affairs of another state and are clearly governed by international law.
- Published
- 2018
- Full Text
- View/download PDF
3. The Impact of Predators on Malicious Worms Propagation: a Theoretical Approach.
- Author
-
Qingyi Zhu, Yi Jiang, and Ye Zhang
- Subjects
COMPUTER viruses ,COMPUTER software ,COMPUTER worms ,COMPUTER security ,COMPUTER science - Abstract
Predators, a class of programs that can travel over Internet, and replicate and multiply themselves, are specifically designed to eliminate the computer viruses. To better understand the effects of predators on virus propagation, a model described the coevolution between viruses and predators is proposed. This model has one virus-free equilibrium and two potential viral equilibria. The existence and global stability of these equilibria are fully studied. Furthermore, the optimal solution to control virus propagation is obtained by using Pontryagin's minimum principle. And some numerical experiments are carried out to verify the theoretical results. From the obtained results it can be deduced that predators are quite effective in preventing the widely propagation of viruses with extremely high infection rate. [ABSTRACT FROM AUTHOR]
- Published
- 2018
4. CyberSN finds the cyber professionals to do the job.
- Subjects
SECURITY personnel ,COMPUTER worms ,CHIEF information officers - Abstract
An excerpt from the book "Business Security: Keep Your Small Business Safe in a Digital World" is presented.
- Published
- 2022
5. Improving sensor network immunity under worm attacks: A software diversity approach.
- Author
-
Yang, Yi, Zhu, Sencun, and Cao, Guohong
- Subjects
SENSOR networks ,COMPUTER worms ,COMPUTER software ,WIRELESS sensor nodes ,COMPUTER operating systems ,COMPUTER security ,MALWARE - Abstract
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-overflow vulnerability that has caused numerous Internet worm attacks could also be exploited to attack sensor networks. We call the malicious code that exploits a buffer-overflow vulnerability in a sensor program sensor worm . Clearly, sensor worm will be a serious threat when an attacker could simply send a single packet to compromise the entire sensor network. Despite its importance, so far little work has focused on sensor worms. In this work, we first illustrate the feasibility of launching sensor worms through trial experiments on Mica2 motes. Inspired by the survivability through heterogeneity philosophy, we then explore the technique of software diversity to combat sensor worms. Given a limited number of software versions, we design an efficient algorithm to assign the appropriate version of software to each sensor, so that sensor worms are restrained from propagation. We also examine the impact of sensor node deployment errors on worm propagation, which directs the selection of our system parameters based on percolation theory. We then extend the above scheme by considering enhanced sensors that can load multiple program versions. We show that the existence of enhanced sensors could further improve the immunity and robustness of sensor networks under worm attacks. Finally, extensive analytical and simulation results confirm the effectiveness of our schemes in various settings. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
6. Integrated Static and Dynamic Analysis for Malware Detection.
- Author
-
Shijo, P.V. and Salim, A.
- Subjects
MALWARE prevention ,COMPUTER worms ,ANTI-malware (Computer software) ,COMPUTER security ,CYBERTERRORISM - Abstract
The number of malware is increasing rapidly regardless of the common use of anti-malware software. Detection of malware continues to be a challenge as attackers device new techniques to evade from the detection methods. Most of the anti-virus software uses signature based detection which is inefficient in the present scenario due to the rapid increase in the number and variants of malware. The signature is a unique identification for a binary file, which is created by analyzing the binary file using static analysis methods. Dynamic analysis uses the behavior and actions while in execution to identify whether the executable is a malware or not. Both methods have its own advantages and disadvantages. This paper proposes an integrated static and dynamic analysis method to analyses and classify an unknown executable file. The method uses machine learning in which known malware and benign programs are used as training data. The feature vector is selected by analyzing the binary code as well as dynamic behavior. The proposed method utilizes the benefits of both static and dynamic analysis thus the efficiency and the classification result are improved. Our experimental results shows an accuracy of 95.8% using static, 97.1% using dynamic and 98.7% using integrated method. Comparing with the standalone dynamic and static methods, our integrated method gives better accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
7. Investigation of Feature Selection Methods for Android Malware Analysis.
- Author
-
Deepa, K., Radhamani, G., and Vinod, P.
- Subjects
MALWARE ,MOBILE operating systems ,COMPUTER worms ,COMPUTER security - Abstract
In this paper we present a method for detecting malicious Android applications using feature selection methods. Three distinguishing features i.e. opcodes, methods and strings are extracted from each Android file and using feature selection techniques, prominent and diverse, top ranking features are mined. Different tree classifiers are used to categorize Android files as either malware or benign. Results show that methods is the most credible feature, which gives accuracy of 88.75% with 600 attributes using Correlation Feature Selection method and Adaboost with J48 as base classifier. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
8. Designing Optimized Architecture for Network Security Devices.
- Author
-
Badlani, Rohan
- Subjects
COMPUTER network security ,COMPUTER crime prevention ,MALWARE prevention ,TROJAN horses (Computer viruses) ,COMPUTER worms ,PHISHING - Abstract
Cyber Crimes are growing and it is expected that by 2017, the global cyber crime market would value at around $120 billion. It has been found that on an average, 18 users become victims of cyber crime. Viruses, Malware, Trojans, Worms, SQL injection and Phishing are some of the malpractices that take place on the network regularly. Many different approaches have been taken by Computer Scientists and researchers to combat this situation but still these malpractices happen to occur at an exponentially growing rate. This calls for the attention of Computer scientists to look for newer security systems to combat such software and hardware based malpractices. [ABSTRACT FROM AUTHOR]
- Published
- 2013
9. CHAPTER 5: Detecting and Countering Malware & Spyware.
- Subjects
SPYWARE prevention ,COMPUTER security ,COMPUTER laws ,COMPUTER viruses ,COMPUTER worms ,ROOTKITS (Computer software) - Abstract
Chapter 5 of the book "How to Stop E-Mail Spam, Spyware, and Computer Viruses from Ruining Your Computer: The Complete Guide for Your Home and Work" is presented. It discusses the detection, prevention and elimination of malware and spyware, the software used for malicious intentions that are commonly illegal depending on the law of the country of the software victim. It offers information on various types of malware on the Internet including viruses, worms and rootkits.
- Published
- 2009
10. SECURITY THREAT SOURCES AND SUPPLIERS: A MANAGEMENT THREAT PROCESS MODEL.
- Author
-
Dawn Medlin, B. and Romaniello, Adriana
- Subjects
BUSINESS information services ,SECURITY measures of computer networks in business enterprises ,COMPUTER network resources ,ELECTRONIC information resources ,ACCESS control ,ACCESS control of computer networks ,COMPUTER virus prevention ,COMPUTER worms ,SECURITY systems - Abstract
Both large and small organizations are increasingly investing additional time and money in the design and implementation of more robust and theoretically more secure systems. In order to fortify against the constant bombardment of internal as well as external security threats and attacks, today's systems are required to remain in an active and reactive status. Further complicating this issue is the necessity to support an ever-increasing requirement for access to business information by corporate branches, business partners, customers, and employees. This paper provides a review and categorization of various technology-based security threats, and their sources. It then provides a process model that can assist organizations in addressing these threats. [ABSTRACT FROM AUTHOR]
- Published
- 2006
11. Employing Machine Learning Algorithms to Detect Unknown Scanning and Email Worms.
- Author
-
Abdulla, Shubair, Ramadass, Sureswaran, Altaher, Altyeb, and Al-Nassiri, Amer
- Subjects
MACHINE learning ,ALGORITHMS ,EMAIL ,COMPUTER worms ,RELIABILITY in engineering ,INTERNET domain naming system - Abstract
We present a worm detection system that leverages the reliability of IP-Flow and the effectiveness of learning machines. Typically, a host infected by a scanning or an email worm initiates a significant amount of traffic that does not rely on DNS to translate names into numeric IP addresses. Based on this fact, we capture and classify NetFlow records to extract feature patterns for each PC on the network within a certain period of time. A feature pattern includes: No of DNS requests, no of DNS responses, no of DNS normals, and no of DNS anomalies. Two learning machines are used, K-Nearest Neighbors (KNN) and Naive Bayes (NB), for the purpose of classification. Solid statistical tests, the cross-validation and paired t-test, are conducted to compare the individual performance between the KNN and NB algorithms. We used the classification accuracy, false alarm rates, and training time as metrics of performance to conclude which algorithm is superior to another. The data set used in training and testing the algorithms is created by using 18 real-life worm variants along with a big amount of benign flows. [ABSTRACT FROM AUTHOR]
- Published
- 2014
12. "A CORRELATION STUDY ON VALUE ORIENTATION AND YOUTH LIFE STYLE".
- Author
-
Kant, Ravi
- Subjects
YOUTH ,LIFESTYLES ,BLENDED learning ,DISTANCE education ,COMPUTER worms - Abstract
Blended learning, the combination of traditional face-to-face teaching methods with authentic on-line learning activities, has the potential to transform student learning experiences and outcomes. The blended learning model also allow for more creative and interactive course assignments. One key limitation of the blended learning model is that it is affected by computer worms, power failures and other technology problem. However while implementing blended learning approach in learning mathematics the curriculum should be modified to suit the blended learning approach and the teachers should be trained as online facilitators and that teachers also need to be subject matter experts and reflective learners of their teaching practices. [ABSTRACT FROM AUTHOR]
- Published
- 2012
13. PEACETIME CYBER-ESPIONAGE: A DANGEROUS BUT NECESSARY GAME.
- Author
-
Pelican, Luke
- Subjects
ESPIONAGE ,COMPUTER crimes ,TELECOMMUNICATIONS laws & regulations ,COMPUTER worms ,COMPUTER virus prevention ,CRIME prevention - Abstract
The article discusses telecommunications law and cyber-espionage during peacetime as of June 2012, focusing on the potential for hackers to breach the U.S. Department of Defense's Non-classified Internet Protocol Router Net (NIPRNet), and it also provides an overview of U.S. and international espionage laws. Besides the U.S., Great Britain and France are also mentioned as possible targets of cyber-espionage. The Stuxnet worm, a dual-purpose computer virus, is also addressed.
- Published
- 2012
14. CYBERCRIME: AN OVERVIEW OF THE FEDERAL COMPUTER FRAUD AND ABUSE STATUTE AND RELATED FEDERAL CRIMINAL LAWS.
- Author
-
Doyle, Charles
- Subjects
COMPUTER fraud ,COMPUTER security laws ,CRIMINAL law ,COMPUTER crimes ,COMPUTER worms ,IDENTITY theft - Abstract
The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of CFAA and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act, P.L. 110-326, 122 Stat. 3560 (2008). In their present form, the seven paragraphs of subsection 1030(a) outlaw * computer trespassing (e.g., hacking) in a government computer, 18 U.S.C. 1030(a)(3); * computer trespassing (e.g., hacking) resulting in exposure to certain governmental, credit, financial, or computer-housed information, 18 U.S.C. 1030(a)(2); * damaging a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce (e.g., a worm, computer virus, Trojan horse, time bomb, a denial of service attack, and other forms of cyber attack, cyber crime, or cyber terrorism), 18 U.S.C. 1030(a)(5); * committing fraud an integral part of which involves unauthorized access to a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce, 18 U.S.C. 1030(a)(4); * threatening to damage a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce, 18 U.S.C. 1030(a)(7); * trafficking in passwords for a government computer, or when the trafficking affects interstate or foreign commerce, 18 U.S.C. 1030(a)(6); and * accessing a computer to commit espionage, 18 U.S.C. 1030(a)(1). Subsection 1030(b) makes it a crime to attempt or conspire to commit any of these offenses. Subsection 1030(c) catalogs the penalties for committing them, penalties that range from imprisonment for not more than a year for simple cyberspace trespassing to a maximum of life imprisonment when death results from intentional computer damage. Subsection 1030(d) preserves the investigative authority of the Secret Service. Subsection 1030(e) supplies common definitions. Subsection 1030(0 disclaims any application to otherwise permissible law enforcement activities. Subsection 1030(g) creates a civil cause of action for victims of these crimes. Subsections 1030(i) and (j) authorize forfeiture of tainted property. [ABSTRACT FROM AUTHOR]
- Published
- 2012
15. ATTACK MODELS FOR VIRTUAL MACHINE SURVIVABILITY ANALYSIS.
- Author
-
Mihai, Ioan-Cosmin
- Subjects
VIRTUAL machine systems ,COMPUTER worms ,COMPUTER security ,COMPUTER viruses ,COMPUTER crimes - Abstract
This paper analyzes the concept of survivability and examines some models to ensure the virtual machines survivability. The virtual machines - an isolated duplicates of the real machines, will be analyzed. Some attack models like the Trojan horse and the computer Worm attacks will be proposed to evaluate the performance of virtual machine survivabilit. [ABSTRACT FROM AUTHOR]
- Published
- 2011
16. BLENDED LEARNING APPROACH IN LEARNING MATHEMATICS.
- Author
-
Tankha, Pallavi
- Subjects
LEARNING ,MATHEMATICS ,COMPUTER worms ,ELECTRIC power failures ,INTERNET in education - Abstract
Blended learning, the combination of traditional face-to-face teaching methods with authentic on-line learning activities, has the potential to transform student learning experiences and outcomes. The blended learning model also allow for more creative and interactive course assignments. One key limitation of the blended learning model is that it is affected by computer worms, power failures and other technology problem. However while implementing blended learning approach in learning mathematics the curriculum should be modified to suit the blended learning approach and the teachers should be trained as online facilitators and that teachers also need to be subject matter experts and reflective learners of their teaching practices. [ABSTRACT FROM AUTHOR]
- Published
- 2011
17. A Group-Based Deployment for Wormhole Prevention in Sensor Networks.
- Author
-
GU-HSIN LAI, CHEN-SEN OUYANG, and CHIA-MEI CHEN
- Subjects
WIRELESS sensor networks ,COMPUTER worms ,COMPUTER virus prevention ,TRAFFIC engineering ,COMPUTER security ,DETECTORS ,COMPUTER engineering - Published
- 2011
18. Robust ICSs Critical for Guarding Against Cyber Threats.
- Author
-
Edwards, Dave
- Subjects
CYBERTERRORISM ,MALWARE ,COMPUTER worms ,WINDOWS (Graphical user interfaces) - Abstract
The article focuses on the threat that cyber attacks and malicious codes pose against industrial control systems (ICS). It states that the malicious software code Stuxnet can manipulate Windows' vulnerabilities and contaminate its targets with worms which have the capacity to reprogram ICS. It adds that the U.S. Department of Homeland Security (DHS) provides various resources for critical infrastructures which include education and training, informational products and incident awareness.
- Published
- 2010
- Full Text
- View/download PDF
19. The Analysis of Random Propagating Worms using Network Bandwidth.
- Author
-
Kwang Sun Ko, Hyunsu Jang, Byuong Woon Park, and Young Ik Eom
- Subjects
COMPUTER worms ,INTERNET security ,COMPUTER network security ,DENIAL of service attacks ,SCANNING systems ,BANDWIDTHS ,COMPUTER virus prevention ,COMPUTER security software ,BROADBAND communication systems ,SECURITY systems - Abstract
There is a well-defined propagation model, named the random constant spread (RCS) model, which explains worms that spread their clones with a random scanning strategy. This model uses the number of infected hosts in a domain as a factor in the worms' propagation. However, there are difficulties in explaining the characteristics of new Internet worms because they have several considerable new features: the denial of service by network saturation, the utilization of a faster scanning strategy, a smaller size in the worm's propagation packet, and to cause maximum damage before human-mediated responses are possible. Therefore, more effective factors are required instead of the number of infected hosts. In this paper, the network bandwidth usage rate is found to be an effective factor that explains the propagations of the new Internet worms with the random scanning strategy. The analysis and simulation results are presented using this factor. The simulation results show that the scan rate is more sensitive than the propagation packet for detecting worms' propagations. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
20. Grid-Based Internet Worm Behavior Simulator.
- Author
-
Yang Liu, Bai-ling Wang, Kai-kun Dong, Le-jun Chi, Ci Zhang, and Ming Rao
- Subjects
COMPUTER worms ,COMPUTER simulation ,GRID computing ,COMPUTER systems ,COMPUTATION laboratories ,INTERNET ,INFORMATION technology ,NETWORK routers ,PARTITIONS (Mathematics) - Abstract
The traditional network simulator has function limitation and performance limitation when simulating Internet worm, so we designed the grid based Internet worm behavior simulator (IWBS Grid). IWBS Grid makes use of the real Internet topology information, link information and routing information, and simulates the worm behavior at the packet event-driven level; proposes a high-performance Internet worm behavior simulation platform by right of the grid computing capability, resource and task management, and etc.. The experimental result shows that IWBS grid surpasses the traditional simulator in simulating capability, and the technology to track the worm propagation in packet level can propose the valuable information for the further study on worm. In the mean while, it can promote further study and development on computing grid technology. [ABSTRACT FROM AUTHOR]
- Published
- 2009
21. Nine lives.
- Author
-
Gold, Steve
- Subjects
COMPUTER worms ,MALWARE ,INFORMATION technology security ,COMPUTER programming ,COMPUTER security - Abstract
As the Conficker (aka Downadup and Kido) worm proved when it first appeared in October 2008, there''s more to a piece of malware code than meets the eye, especially when it is self-updating. But can self-updating also mean self-modifying? Steve Gold investigates whether an IT security manager''s nightmare has become programming reality… [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
22. Propagation of active worms: A survey.
- Author
-
Yang Xiang, Xiang Fan, and Wen Tao Zhu
- Subjects
COMPUTER worms ,COMPUTER security ,CYBERTERRORISM ,PROBABILITY theory ,COMPUTER software - Abstract
This paper serves worm defenders' objective to improve their immunity to future active worms by giving them a deep insight into propagation characteristics of active worms from a worm authors' perspective. Active worms self-propagate across networks by employing scanning, pre-generated target list, or internally generated target lists as their target discovery technique. We find target acquisition and network reconnaissance actions (luring the network propagation phase in a worm's life cycle basically embody its target discovery technique. We derive the significance of target discovery techniques in shaping a worm's propagation characteristics from the life cycles of worms. A variety of target discovery techniques employed by active worms are discussed and compared. We find hitting probability (the probability of hitting a vulnerable or infected host) is the most frequently improved factor by attackers to increase a worm's propagation speed. We anticipate future active worms would employ a combination of target discovery techniques to greatly accelerate their propagation. Various deterministic and stochastic models of active worms are presented and compared. Their accuracy of and applicability to modelling the propagation of active worms under different conditions are discussed. A discussion of opportunities, challenges and solutions from a worm defenders' perspective is presented in this survey paper. We also propose a new defence system called Distributed Active Defence System (DADS) to effectively defend against worms. This new system follows an active surveillance-trace-control cycle, which could be the emerging solution to the active worm problem. [ABSTRACT FROM AUTHOR]
- Published
- 2009
23. An Overview of Content-Based Spam Filtering Techniques.
- Author
-
Khorsi, Ahmed
- Subjects
SPAM filtering (Email) ,INTERNET ,COMPUTER worms ,EMAIL ,EMAIL security - Abstract
So fast, so cheap, so efficient, Internet is nowadays incontestably communication mean of choice for personal, business and academic purposes. Unfortunately, Internet has not only this beautiful face. Malicious activities enjoy as well this so fast, cheap and efficient mean. The last decade, Internet worms took the lights. In the recent years, spams are invading one of the most used services of Internet: email. This paper summarizes most of techniques used to filter spams by analyzing the email content. [ABSTRACT FROM AUTHOR]
- Published
- 2007
24. An Architecture for Automatic and Adaptive Defense.
- Author
-
Dantu, Ram and Cangussu, Joao W.
- Subjects
COMPUTER crime prevention ,COMPUTER network security ,COMPUTER hackers ,COMPUTER architecture ,FEEDBACK control systems ,MACHINE learning ,COMPUTER worms - Abstract
Network attacks have become so fast that human mitigation cannot cope with security requirements. In addition, attackers have become smarter by creating attacks which mutate themselves to prevent detection. Therefore, defense mechanisms must be automated to keep up with attack speed and adapted to seek out mutations. An architecture to support this trend in defense mechanisms is proposed here. The architecture is based upon three conceptual pillars. First is the use of a multi-feedback loop control to slow down an attack. Second, machine learning concepts are employed to properly distinguish between normal and abnormal e-attack traffic. And, third, trust and reputation levels are determined through social networks. A case study on the application of the proposed architecture to a worm propagation attack provides the initial evidence of the e-attack and applicability of the approach. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
25. Worm holes.
- Author
-
Kemp, R. Scott
- Subjects
CYBERTERRORISM ,NUCLEAR energy policy ,COMPUTER worms - Abstract
The article reports on the Stuxnet cyber attack to covertly hamper Iran's nuclear programme, the virus's impact on the country's progress and its probable origin. It is stated that the computer worm was intended to gradually fatigue the country's operating centrifuges, that it required knowledge of its enrichment program and that it was likely perpetrated by Israeli or U.S. intelligence. However, Stuxnet reportedly had minimal effect in slowing down Iran's weapon-making capability.
- Published
- 2011
26. Forced Collision: Detecting Wormhole Attacks with Physical Layer Network Coding.
- Author
-
Li, Zhiwei, Pu, Di, Wang, Weichao, and Wyglinski, Alex
- Subjects
COMPUTER network security ,MALWARE ,COMPUTER simulation ,COMPUTER input-output equipment ,SYNCHRONIZATION ,COMPUTER worms - Abstract
Abstract: Previous research on security of network coding focused on the protection of data dissemination procedures and the detection of malicious activities such as pollution attacks. The capabilities of network coding to detect other attacks have not been fully explored. In this paper, we propose a new mechanism based on physical layer network coding to detect wormhole attacks. When two signal sequences collide at the receiver, the starting point of the collision is determined by the distances between the receiver and the senders. Therefore, by comparing the starting points of the collisions at two receivers, we can estimate the distance between them and detect fake neighbor connections via wormholes. While the basic idea is clear, we have proposed several schemes at both physical and network layers to transform the idea into a practical approach. Simulations using BPSK modulation at the physical layer show that the wireless nodes can effectively detect fake neighbor connections without the adoption of special hardware or time synchronization. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
27. Revealing network threats, fears.
- Author
-
Byres, Eric
- Subjects
COMPUTER network security ,COMPUTER worms ,COMMUNICATION ,CONSUMERS - Abstract
The article discusses how the American National Standards Institute/Internet Security and Acceleration (ANSI/ISA)-99 security standards improve network security in the face of the push for productivity and the threat of the next "Son of Stuxnet" worm. It is stated that ANSI/ISA-99 is a complete security life-cycle program that contains communication in control sub-systems to avoid the migration of security issues in one area into another by way of zones and conduits that isolate subsystems. An example from a real customer application is also given.
- Published
- 2011
28. Exploiting Software Vulnerabilities.
- Author
-
Van der Linder, Maura A.
- Subjects
COMPUTER security ,COMPUTER viruses ,COMPUTER operating systems ,COMPUTER worms ,SOCIAL engineering (Political science) - Abstract
The article discusses several forms of software vulnerabilities and the role of social engineering related to software security. It says that a computer virus is a malicious program that reproduces through addition of itself to other programs such as the operating system. It states that a worm is a computer program that self-replicates to other machines across a network. Meanwhile, it says that social engineering is the manipulation of the human tendency to trust easily.
- Published
- 2010
29. PROTECT YOUR PCs.
- Author
-
VAN WINKLE, WILLIAM
- Subjects
HOME computer networks ,COMPUTER security ,COMPUTER viruses ,COMPUTER worms ,SPAM email ,SPYWARE (Computer software) ,FIREWALLS (Computer security) ,COMPUTER security software - Abstract
The article discusses ways to protect a home network from potential computer security threats. These threats to a home network's security fall into categories and these are malware such as viruses, worms, spam, spyware and Trojan horses. In order to prevent them from infiltrating the network, several steps and solutions can be considered. One is never browse or open links to unfamiliar and dangerous parts of the Web. Another step to take is installing a firewall which can be either be implemented as a software application on the personal computer or within a dedicated hardware security appliance.
- Published
- 2009
30. Protecting the Internet Without Wrecking It: How to meet the security threat.
- Author
-
Zittrain, Jonathan
- Subjects
INTERNET security ,WORLD Wide Web ,COMPUTER hackers ,COMPUTER worms ,COMPUTER virus prevention ,MALWARE ,CYBERTERRORISM ,ORGANIZED crime ,HISTORY ,ECONOMICS - Abstract
This article discusses the security of the Internet. The author chronicles the history of Internet security and states that the Internet is at its greatest security risk in its history. The author highlights three Internet security controls that have been adequate, including a hacker ethos that shuns destructive hacking and the professionalization of information technology (IT) departments at companies and academic institutions. The author also discusses the emerging profitability of Internet worms and viruses as a form of organized crime that greatly increases Internet security risks. The author also offers potential solutions to the problems discussed that include a more social approach to security.
- Published
- 2008
31. STUXNET REPORTS DISMAY LAWMAKERS; INVESTIGATION, LEGISLATION SOUGHT.
- Author
-
Curran, John
- Subjects
COMPUTER worms ,CYBERTERRORISM ,NUCLEAR weapons - Abstract
The article focuses on a report which revealed that the U.S. was involved in the Stuxnet computer worm cyber attack on Iranian nuclear facilities. It mentions that Capitol Hill, Washington expressed dismay on the findings of the report. It refers to an article published in the "The New York Times" which reported that Stuxnet was deployed for U.S.-Israeli intelligence operation on disrupting Iranian efforts for the development of nuclear weapons.
- Published
- 2012
32. Are we losing the virus wars?
- Author
-
Zittrain, Jonathan
- Subjects
COMPUTER viruses ,MALWARE ,COMPUTER worms ,SPAM email ,OPEN source software ,COMPUTER hackers ,PSYCHOLOGY - Abstract
The article discusses how computer viruses and malware have been affected by the use of Internet technology. He notes software that can convert computers into botnets and how increased Internet access, broadband technology and the use of open source Internet software have increased the spread of computer viruses and worms. He comments on how the profits possible through spam e-mail messages and computer attacks have changed the motivations of computer hackers.
- Published
- 2008
33. MALWARE: AN OVERVIEW.
- Author
-
Colaner, Seth
- Subjects
MALWARE ,COMPUTER software ,COMPUTER viruses ,COMPUTER worms ,SPYWARE (Computer software) ,COMPUTER networks ,COMPUTER users - Abstract
The article presents information about malware. It is mentioned that creators of malware have different intentions, one of which is leveraging information on computers or networks for their benefit. Types of malware include viruses, worms, Trojan horses, spyware and adware. A virus is a software that can multiply itself without a computer user knowing it. It has various functions such as destroying a data and preventing a computer from functioning properly. On the other hand, worms infect computers through networks which make it faster than viruses.
- Published
- 2008
34. Influential spreaders identification in complex networks with potential edge weight based k-shell degree neighborhood method.
- Author
-
Maji, Giridhar
- Subjects
SOCIAL network analysis ,DIFFUSION processes ,COMPUTER networks ,VIRAL marketing ,COMPUTER worms - Abstract
• Node ranking heuristics with tunable free parameters suffers from large computation overhead to find optimal parameter settings. • Proposed heuristic uses a parameter that is derived from standard network metrics in one go. All other constituent parts of the heuristics could be derived in linear time. • Performance of the proposed heuristic is demonstrated in comparison to other state-of-the-art. • Negligible pre-processing computation overhead allows it to be applied in dynamic evolving network analysis. In social network analysis, one of the important aspects is to identify the nodes that are vital to the information diffusion process such as viral marketing, worm propagation in a computer network, disease spreading, etc. The degree centrality measures only the local influence of a node whereas, others like closeness and betweenness capture the global impact. K-shell centrality uses the position/location of a node in the network to estimate its spreading ability. Most of the above techniques except degree perform well when the network is complete. The degree centrality does not require complete network information but fails to identify many important nodes due to limited use of only local information. In this paper, we propose a new measure namely "potential edge weight based k-shell degree neighborhood" centrality to rank the node's spreading ability without depending on the degree of completeness of the network. The proposed method uses node degree and k-shell index along with a derived network parameter to assign potential edge weights to the connecting links between two nodes. Information propagation is simulated using Susceptible-Infected-Recovered (SIR) epidemic model and performance comparison of the proposed method is done using Kendall's rank correlation with other ranking techniques. Experiments on real network establish the superiority of the proposed method in identifying influential spreaders in comparison to a degree, k-shell and other standard ranking techniques. Computationally the proposed method is cost-effective even with large complex networks. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
35. CYBER SECURITY: THREATS MULTIPLY, BUT AWARENESS AND DEFENCES ARE STRENGTHENED.
- Author
-
SLOCOMBE, GEOFF
- Subjects
INTERNET security ,INTERNET safety ,DEFENSE industries ,RANSOMWARE ,COMPUTER viruses ,COMPUTER worms - Abstract
The article discusses Australia's increased focus on cyber security, based on the 2016 Defence White Paper (DWP). Topics discussed include the impact to the defense industry of cyber threats, major cyber threats in the country which include ransomware, malicious electronic mails (e-mails) and virus or worm infection, and the role of the Australian Signals Directorate (ASD) and the Australian Cyber Security Centre (ACSC) in enhancing the country's cyber defenses.
- Published
- 2016
36. Technology Roundup.
- Subjects
COMPUTER viruses ,COMPUTER worms ,COMPUTER software ,COMPUTER crimes - Abstract
The article discusses the Melissa computer virus. It mentions that the virus was infected into a World document and was posted to the alt.sex usenet newsgroup, which triggered its widespread around the world. Authored by David L. Smith, Melissa virus was one of the first email-aware viruses which had forced some companies to close their email gateways.
- Published
- 2009
37. Worm.
- Subjects
COMPUTER worms ,MALWARE ,COMPUTER networks ,EMAIL ,COMPUTER security - Abstract
A definition of the term "worm" is presented. A form of malware, it refers to the malicious software applications that are designed to spread via computer networks. Worms, once installed on a computer, spontaneously generate additional electronic mail messages containing copies of the worm. In addition, they may open TCP ports to create network security holes or other applications.
- Published
- 2007
38. IRAN Cyber Operations.
- Subjects
STUXNET (Computer worm) ,COMPUTER worms - Published
- 2017
39. Zoo.
- Subjects
DEFINITIONS ,COMPUTER security ,COMPUTER viruses ,COMPUTER worms ,MALWARE - Abstract
A definition of the computer security term "zoo" is presented. It refers to a collection of viruses and worms that exist only in virus and anti-virus laboratories. These are used to proactively study how malware programs are written and distributed.
- Published
- 2007
40. VBS.SST.
- Subjects
DEFINITIONS ,COMPUTER viruses ,COMPUTER worms ,COMPUTER security ,DATA security - Abstract
A reference entry for "VBS.SST" is presented. In network security, the Anna Kournikova VBS.SST computer virus uses Visual Basic to infect Windows systems when a user opens an e-mail with an attachment that appears to be a graphic image of Russian tennis star Anna Kournikova. The worm is able to copy itself through a clandestine code extension.
- Published
- 2007
41. SST Virus.
- Subjects
DEFINITIONS ,COMPUTER worms ,COMPUTER viruses ,EMAIL systems - Abstract
A definition of the term "SST Virus" is presented. This refers to the Anna Kournikova VBS.SST computer virus, informally known as "Anna." This viral worm uses Visual Basic to infect Windows systems when a user unwittingly opens an e-mail note with an attachment that appears to be a graphic image of Russian tennis star Anna Kournikova.
- Published
- 2007
42. Slammer.
- Subjects
COMPUTER worms ,SQL ,CLIENT/SERVER computing ,COMPUTER viruses ,COMPUTER security - Abstract
A definition of the term "Slammer" is presented. It refers to a computer worm that affected Microsoft SQL Servers.
- Published
- 2007
43. Script Vulnerability.
- Subjects
COMPUTER security ,MALWARE ,COMPUTER viruses ,COMPUTER worms ,DATA corruption - Abstract
An encyclopedia entry for "Script Vulnerability" is presented. Script vulnerabilities refer to problems associated with malicious codes like Trojans, backdoors and logical bombs. Scripts downloaded from the Internet are susceptible to such problems.
- Published
- 2007
44. Sadmind.
- Subjects
DEFINITIONS ,COMPUTER worms ,COMPUTER viruses ,COMPUTER software ,COMPUTER security - Abstract
A definition of the term "Sadmind" in computer security is presented. The term refers to a worm that compromises one platform to attack another.
- Published
- 2007
45. QAZ.
- Subjects
COMPUTER worms ,COMPUTER software ,COMPUTER security ,COMPUTER networks ,INTERNET protocols - Abstract
An encyclopedia entry for "QAZ" is presented. QAZ refers to a network worm which disguises itself as Notepad.exe and spreads by scanning for shared drives on the network which increases network traffic. It also reportedly sends the Internet protocol (IP) address of the infected machine back to the creator of the worm, who can gain access to the computer through the worm.
- Published
- 2007
46. Polymorphic Virus.
- Subjects
COMPUTER viruses ,DATA protection ,SCANNING systems ,OPTOELECTRONIC devices ,COMPUTER worms ,COMPUTER security - Abstract
An encyclopedia entry for "Polymorphic Virus," in relation to computer security, is presented. This virus attempts to evade all but the most advanced scanners by changing itself each time it creates a new copy. It changes by using different machine code commands which accomplish the same thing, or by rearranging the order of the commands.
- Published
- 2007
47. Morris Worm.
- Subjects
DEFINITIONS ,COMPUTER worms ,COMPUTER viruses ,ARPANET (Computer network) - Abstract
A definition of the term "Morris Worm" is presented. This pertains to a worm program written by Robert T. Morris Jr. that flooded the ARPANET in November 1988 causing problems for thousands of hosts.
- Published
- 2007
48. Melissa Virus.
- Subjects
DEFINITIONS ,COMPUTER viruses ,COMPUTER security ,COMPUTER worms ,EMAIL systems - Abstract
A definition of the term "Melissa Virus" is presented. It refers to a fast-spreading macro virus that is distributed as an e-mail attachment that, when opened, disables a number of safeguards in Word 97 or Word 2000. The computer virus has the potential to disable corporate and other mail servers, although it does not destroy files or other resources.
- Published
- 2007
49. Infection.
- Subjects
DEFINITIONS ,COMPUTER security ,COMPUTER systems ,COMPUTER viruses ,COMPUTER worms - Abstract
A definition of the term "infection," which, in relation to information security, refers to the act of a virus or worm establishing itself in a computer system, is presented.
- Published
- 2007
50. IM Worm.
- Subjects
COMPUTER worms ,COMPUTER viruses ,INSTANT messaging ,COMPUTER networks ,COMPUTER systems - Abstract
An encyclopedia entry for "IM Worm" is presented. It refers to self-replicating malicious code which spreads in instant messaging networks. The worm locates the address book for the instant messenger client and tries to send itself to all the contacts of the infected person. The address book is called a buddy list or contact list.
- Published
- 2007
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.