CSC 379 SUM2008:Week 3, Group 2: Difference between revisions

From Expertiza_Wiki
Jump to navigation Jump to search
Line 5: Line 5:
* [http://www.symantec.com/business/theme.jsp?themeid=threatreport http://www.symantec.com/business/theme.jsp?themeid=threatreport]
* [http://www.symantec.com/business/theme.jsp?themeid=threatreport http://www.symantec.com/business/theme.jsp?themeid=threatreport]
* [http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc]
* [http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc]
* [http://news.zdnet.co.uk/security/0,1000000189,39280540,00.htm]
* [http://news.zdnet.co.uk/security/0,1000000189,39280540,00.htm http://news.zdnet.co.uk/security/0,1000000189,39280540,00.htm]

Revision as of 20:04, 23 July 2008

Costs and Benefits of Malware Countermeasures

Examine the changing nature of malware distribution and forms. What ethical concerns are raised by this new set range of threats? Examine the effects (costs and benefits) of countermeasures designed to address these new threats.