The Presentation
Download
Report
Transcript The Presentation
Alex Heinricher
Kun H. Lee
Adrian Trejo
Angela DiTaranto
What Are Malicious Attacks
Any attempt to gain information through
social or software engineering
Phishing
Malware
○ Viruses
○ Trojan Horses
○ Worms
Background: Then
First Virus: Creeper, 1971
Infected specific computers with specific
operating systems connected to the
ARPANET
First Record of “Phishing”: 1987
First Detected on AOL
Infiltrated groups already involved in pirated
software/other illicit information transfers
Background: Now
Advanced Viruses
Polymorphic
Metamorphic
Self-encrypting, self-concealing
Advanced Phishing
Copy reputable agencies
Use advanced social engineering
Criticism
Malicious attacks over a computer network or
through removable media aim at destroying
data or damaging infrastructure or worse,
stealing data that can be used in any number
of ways that are also harmful
Those who carry out these acts are not
prosecuted as much as those criminals who
commit less harmful crimes
Laws against attacks of these types should be
implemented much more often and carry
harsher punishments in order to discourage
people trying to attack other computers
Criticism
Every year, the United States and many
other countries spend millions of dollars a
year trying to combat these electronic
attacks but there seems to be no solution
on the horizon
Malicious attacks also take advantage of
the inexperienced because they have not
yet learned how to discern a threat from
something benign and this leads to
thousands of people falling victim and
having their identities or money stolen