Topic The Morris Worm changed the world of computer security at a time when it was merely an afterthought. In 1988, when the worm was released, system administrators were confronted with a cyber-attack that they never expected or saw before. Although the level of damage that was caused by the Morris Worm was caused by an out of control college student’s project, the individual responsible, Robert Morris, faced criminal charges. Robert Morris was a first year graduate student at Cornell in his first
mentioned later. The malware does not make ... ... middle of paper ... .../wiki/Computer_virus>. "Computer worm." Wikipedia. Wikimedia Foundation, 15 May 2014. Web. 18 May 2014. . "On This Day: Robert Tappan Morris Becomes First Hacker Prosecuted for Spreading Virus." On This Day: Robert Tappan Morris Becomes First Hacker Prosecuted for Spreading Virus. N.p., n.d. Web. 18 May 2014. . "Trojan horse (computing)." Wikipedia. Wikimedia Foundation, 16 May 2014. Web. 18 May 2014. . "Why is a computer
What is a computer virus? A computer virus is a piece of malicious code that is capable of copying itself and typically has a detrimental effect such as corrupting a system or destroying data. Computer viruses are written with the sole intention of stealing data or crippling a system. The term computer virus is derived from and is in some sense analogous to a biological virus. The word virus itself is Latin for poison. Simplistically, biological viral infections are spread by the virus (a small
Same as any other area in computer science, viruses become a great deal indeed throughout the years. Return to the origin of computer viruses, although there were no viruses or worms developed, Mathematician John Von Neumann had described the theories of self-replicating programs in 1949. In 1971, Bob Thomas has developed “The Creeper Virus”. It was an experimental self-replicating program. It infected DEC PDP-10 Computers to run the TENEX Operating System. The Reaper program was later developed
viruses are’[1] – • Few programmers find it as a sense of thrill and excitement .These people can be compared to despoilers or hooligans but who are acquaint with computer programming skills. • Few programmers’ harm un-intentionally, for example- Robert Tappan Morris had never expected that the worm develope... ... middle of paper ... ...tackers. For an example- the 2003 "Lirva" worm attempted to download "BackOrifice" which was a remote access software package[7]. 4.1 Recent Trends • Data Stealing