CSC 379 SUM2008:Week 3, Group 2: Difference between revisions
Jump to navigation
Jump to search
(→Costs and Benefits of Malware Countermeasures: add of links) |
|||
Line 5: | Line 5: | ||
* [http://www.symantec.com/business/theme.jsp?themeid=threatreport http://www.symantec.com/business/theme.jsp?themeid=threatreport] | * [http://www.symantec.com/business/theme.jsp?themeid=threatreport http://www.symantec.com/business/theme.jsp?themeid=threatreport] | ||
* [http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc] | * [http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc] | ||
* [http://news.zdnet.co.uk/security/0,1000000189,39280540,00.htm] | * [http://news.zdnet.co.uk/security/0,1000000189,39280540,00.htm http://news.zdnet.co.uk/security/0,1000000189,39280540,00.htm] |
Revision as of 20:04, 23 July 2008
Costs and Benefits of Malware Countermeasures
Examine the changing nature of malware distribution and forms. What ethical concerns are raised by this new set range of threats? Examine the effects (costs and benefits) of countermeasures designed to address these new threats.