CSC 379 SUM2008:Week 3, Group 2: Difference between revisions

From Expertiza_Wiki
Jump to navigation Jump to search
No edit summary
Line 6: Line 6:
* [http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc]
* [http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc]
* [http://news.zdnet.co.uk/security/0,1000000189,39280540,00.htm http://news.zdnet.co.uk/security/0,1000000189,39280540,00.htm]
* [http://news.zdnet.co.uk/security/0,1000000189,39280540,00.htm http://news.zdnet.co.uk/security/0,1000000189,39280540,00.htm]
==Evolution of malware distribution==
==Evolution of malware forms==
==Ethical Concerns of New Malware==
==Costs and Benefits of Countermeasures==

Revision as of 17:32, 25 July 2008

Costs and Benefits of Malware Countermeasures

Examine the changing nature of malware distribution and forms. What ethical concerns are raised by this new set range of threats? Examine the effects (costs and benefits) of countermeasures designed to address these new threats.

Evolution of malware distribution

Evolution of malware forms

Ethical Concerns of New Malware

Costs and Benefits of Countermeasures