- 1 These review materials were prepared for students in the undergraduate and graduate programs in information assurance at Norwich University. I hope that they will be helpful to other instructors and to the general reader. For free access to additional teaching materials see my Web site at http://www2.norwich.edu/mkabayGoogle Scholar
- 2 Associate Professor, Information Assurance & Program Director, Master of Science in Information Assurance, Division of Business & Management, Norwich University, Northfield, VT 05663-1035 USA. mailto: mkabay "at" norwich "dot" eduGoogle Scholar
- 3 Gerrold, D. (1972). When HARLIE was One. Republished 1988 by Spectra Books (ISBN 0-553-26465-6). AMAZON link http://tinyurl.com/dxztw.Google Scholar
- 4 See "A taste of computer security: Viruses" http://kernelthread.com/publications/security/viruses.htmlGoogle Scholar
- 5 Brunner, J. (1975). Shockwave Rider. Republished 1995 by Del Rey (ISBN 0-345-46717-5). AMAZON link http://tinyurl.com/9s5jv Google ScholarDigital Library
- 6 Smith, G. Crypt Newsletter. Review of James Adam's 1998 book The Next World War. http://www.soci.niu.edu/~crypt/other/adams.htmGoogle Scholar
- 7 The number on the WildList for May 2005 was 569 on the main list and 3255 for all sightings. See http://www.wildlist.org/Google Scholar
- 8 For a good list of reputable vendors, see the Anti-Virus Product Developer's Consortium run by ICSA Labs (for which I was Director of Education from 1991 to 2000) at http://www.icsa.net/html/communities/antivirus/avpdmembers.shtml.Google Scholar
- 9 Bullfinch, T. (1855). The Age of Fable. Now part of Bullfinch's Mythology. Modern Library Edition, Random House (c. 1940, no ISBN). P. 185. Currently available edition as Modern Library Paperback; AMAZON link http://tinyurl.com/7c46v.Google Scholar
- 10 Kabay, M. E. (2005). INFOSEC Year in Review. See http://www2.norwich.edu/mkabay/iyir for details and instructions on downloading this free database. PDF reports are also available for download.Google Scholar
- 11 Tate, C. (1994). Hardware-borne Trojan Horse programs. RISKS 16.55 "http://catless.newcastle.ac.uk/Risks/16.55.html#subj3Google Scholar
- 12 Internet Movie Database entry at http://www.imdb.com/title/tt0083866/Google Scholar
- 13 http://grc.com/optout.htmGoogle Scholar
- 14 Gibson, S. (2005). The ethics of anonymous surveillance for profit. http://grc.com/oo/ethics.htmGoogle Scholar
- 15 Center for Democracy and Technology: Spyware. http://www.cdt.org/privacy/spyware/Google Scholar
- 16 http://www.simplythebest.net/info/spyware.htmlGoogle Scholar
- 17 Livingston, B. (2005). Anti-adware misses most malware. WindowsSecrets. http://windowssecrets.com/050127/Google Scholar
- 18 AOL/NCSA Online Safety Study http://www.staysafeonline.info/news/safety_study_v04.pdfGoogle Scholar
- 19 NCSA (Security) http://www.staysafeonline.info/Google Scholar
- 20 http://www.didtheyreadit.comGoogle Scholar
- 21 Glassman, M. (2004). Who got the message? There's a way to know. New York Times. http://www.nytimes.com/2004/06/03/technology/circuits/03spyy.htmlGoogle Scholar
- 22 http://www.msgtag.comGoogle Scholar
- 23 http://www.readnotify.com/Google Scholar
- 24 Kabay, M. E. (20004). HTML e-mail not worth the risk. Network World Fusion. http://www.nwfusion.com/newsletters/sec/2004/0517sec1.htmlGoogle Scholar
- 25 http://www.wizard-industries.com/trackingblocker.htmlGoogle Scholar
- 26 http://www.emailaddressmanager.com/email_sentinel.htmlGoogle Scholar
- 27 For overviews of the scumware problem, see http://www.thiefware.com/http://office.microsoft.com/assistance/2002/articles/oQuickSmartTags.aspxhttp://news.cnet.com/news/0-1003-200-6210768.html?tag=mn_hdhttp://www.alistapart.com/stories/smarttags/http://scumware.com/press.htmlGoogle Scholar
- 28 Administrator (2003). How Surf+ works. http://tinyurl.com/4mf25Google Scholar
- 29 See eZula's description at http://www.ezula.com/TopText/TopText.asp and compare the critical analysis at http://www.doxdesk.com/parasite/TopText.htmlGoogle Scholar
- 30 Searle, G. (2001). New technology for sneaky advertising. RISKS 21.47 http://catless.ncl.ac.uk/Risks/21.47.html#subj8Google Scholar
- 31 Martin, M. (2003). Gater eWallet. http://tinyurl.com/5cy3rGoogle Scholar
- 32 "jcokos" (2003). Scumbag: Gator / Claria http://tinyurl.com/79vycGoogle Scholar
- 33 Spector, L. (2002). Invasion of the browswer snatchers. http://www.pcworld.com/news/article/0,aid,84464,tk,dnWknd,00.aspGoogle Scholar
- 34 Arnold, J. (2001). Office XP modified what you type. http://catless.ncl.ac.uk/Risks/21.42.html#subj12Google Scholar
- 35 http://www.newsscan.comGoogle Scholar
- 36 Brent, G. (2002). Excel cut-and-pasting behavior. RISKS 21.88 http://catless.ncl.ac.uk/Risks/21.88#subj10Google Scholar
- 37 The behavior described was still true for Excel 2002 (Excel "XP") version 10.6501.6735 SP3 running in July 2005.Google Scholar
- 38 Olsen, S. (2001). Nobody's going to skin this Gator. Cnet http://news.com.com/2008-1082-272563.html?legacy=cnetGoogle Scholar
- 39 Featherly, K. (2001). Gator chomps first, sues Internet Advertising Bureau. BizReport http://www.bizreport.com/news/1990/Google Scholar
- 40 The IAB press release was originally at http://www.iab.net/news/content/08_28_01.html but is no longer on the Web at that URL. I checked GOOGLE again in July 2005 but could not locate the original statementGoogle Scholar
- 41 See also the dated but still useful and interesting course Cyberspace Law for Non-Lawyers by law professors Larry Lessig, David Post and Eugene Volokh from the mid-1990s; archived at http://www.eff.org/legal/CyberLaw_Course/Google Scholar
- 42 Al Fasoldt has an excellent set of commentaries along these lines: Scumware, Part 1: Sneaky software hits a new low. http://twcny.rr.com/technofile/texts/bit100301.html Scumware, Part 2: Typical scumware programs and what they do. http://twcny.rr.com/technofile/texts/bit101001.html Scumware, Part 3: How to hunt it down and get rid of it. http://twcny.rr.com/technofile/texts/bit101701.htmlGoogle Scholar
- 43 See http://www.politechbot.com/p-03439.html for details.Google Scholar
- 44 See http://store.ca.com/v2.0-img/operations/safer/site/0605/1.htm for current information.Google Scholar
Index Terms
- Some notes on malware
Recommendations
The Next Malware Battleground: Recovery After Unknown Infection
Malware has become a natural aspect of Internet computing due to the imperfectness of systems that identify malware and prevent their installation. Our ability to control the volume of unwanted and malicious traffic on the Internet—the spam messages, ...
Enhancing malware detection: clients deserve more protection
Sophisticated malware is designed to spread over the network and infect as many connected client machines as possible before being detected. Network security engineers have always been challenged to detect and track down such malware before infecting ...
Comments