CSC 379 SUM2008:Week 3, Group 2: Difference between revisions
Jump to navigation
Jump to search
Line 6: | Line 6: | ||
* [http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc] | * [http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc] | ||
* [http://news.zdnet.co.uk/security/0,1000000189,39280540,00.htm http://news.zdnet.co.uk/security/0,1000000189,39280540,00.htm] | * [http://news.zdnet.co.uk/security/0,1000000189,39280540,00.htm http://news.zdnet.co.uk/security/0,1000000189,39280540,00.htm] | ||
===Evolution of Malware=== | |||
===Evolution of Malware Distribution and Forms=== | ===Evolution of Malware Distribution and Forms=== |
Revision as of 22:33, 25 July 2008
Costs and Benefits of Malware Countermeasures
Examine the changing nature of malware distribution and forms. What ethical concerns are raised by this new set range of threats? Examine the effects (costs and benefits) of countermeasures designed to address these new threats.
- http://www.caci.com/business/ia/threats.html
- http://www.symantec.com/business/theme.jsp?themeid=threatreport
- http://www.gtisc.gatech.edu/pdf/Real%20Message_WSJ_061808.pdf?mod=technology_columns_featured_lsc
- http://news.zdnet.co.uk/security/0,1000000189,39280540,00.htm
Evolution of Malware
Evolution of Malware Distribution and Forms
Ethical Concerns of New Malware
As malware has evolved over the years, so have the ethical concerns associated with them.