Midterm Question #3
Internet if properly maximized can be used as a medium to the advantage of the company. However, risks and threats are there. Thus, research the following:1. Identify the possible risks and threats (eg. virus) that can potentially attack a company with internet connection.
2. Case research and analysis:
Vigilante virus attacks MP3 music files |
by Stan Beer | |
Tuesday, 26 April 2005 | |
Experts at security vendor Sophos, have discovered a worm which has taken the law into its own hands against internet music pirates. However, legal downloaders are also at risk. The W32/Nopir-B worm, which appears to have originated in France, spreads via peer-to-peer file-sharing systems posing as a hacked utility to make copies of commercial DVDs. However, in reality it displays an anti-piracy graphic, and attempts to delete all MP3 music files, disable various system utilities, and wipe .COM programs on the infected PC. "The internet is swamped with people pirating movies and music, costing Internet pirates who have illegally distributed music files, movies and Although there have only been a small reports of the worm, Sophos |
2.a Identify one company that had experienced an attacked from the internet.
Elk Cloner is one of the first known microcomputer viruses that spread "in the wild," i.e., outside the computer system or lab in which it was written.Elk Cloner spread by infecting the Apple II operating system using a technique now known as a "boot sector" virus.
2.b Describe the attack.
Elk Cloner spread by infecting the Apple II operating system using a technique now known as a "boot sector" virus. If a computer booted from an infected floopy disk, a copy of the virus was placed in the computer's memory. When an uninfected disk was inserted into the computer, Elk Cloner would be copied to the disk, thus allowing it to spread from disk to disk.
An infected computer would display a short poem on every 50th boot. Elk Cloner did not cause deliberate harm, but Apple DOS disks without a standard image had their reserved tracks overwritten. The aforementioned poem follows:
Elk Cloner: The program with a personalityIt will get on all your disks
It will infiltrate your chips
Yes, it's Cloner!It will stick to you like glue
Send in the Cloner!
It will modify RAM too
2.c Identify the damages done and the solutions adopted to reverse the damages and to protect the company from future threats.
According to contemporary reports, the virus was rather contagious, successfully infecting the floppies of most people Skrenta knew, and upsetting many of them. Part of the "success," of course, was that people were not at all wary of the potential problem (virus infection could have been avoided by not inserting floppies into computers without hard-booting them first), nor were virus scanners or cleaners available. The virus could still be removed, but it required an elaborate manual effort.
Debbie Ann T. Templonuevo
http://www.pcauthority.com.au/News/143993,top-ten-worst-viruses.asp
No comments:
Post a Comment