18 April 2006 Personal privacy, information assurance, and the threat posed by malware techology
Author Affiliations +
Abstract
In spite of our best efforts to secure the cyber world, the threats posed to personal privacy by attacks upon networks and software continue unabated. While there are many reasons for this state of affairs, clearly one of the reasons for continued vulnerabilities in software is the inability to assess their security properties and test their security systems while they are in development. A second reason for this growing threat to personal privacy is the growing sophistication and maliciousness of malware coupled with the increasing difficulty of detecting malware. The pervasive threat posed by malware coupled with the difficulties faced when trying to detect its presence or an attempted intrusion make addressing the malware threat one of the most pressing issues that must be solved in order to insure personal privacy to users of the internet. In this paper, we will discuss the threat posed by malware, the types of malware found in the wild (outside of computer laboratories), and current techniques that are available for from a successful malware penetration. The paper includes a discussion of anti-malware tools and suggestions for future anti-malware efforts.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Martin R. Stytz and Sheila B. Banks "Personal privacy, information assurance, and the threat posed by malware techology", Proc. SPIE 6241, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, 624107 (18 April 2006); doi: 10.1117/12.665344; https://doi.org/10.1117/12.665344
PROCEEDINGS
9 PAGES


SHARE
Advertisement
Advertisement
RELATED CONTENT

Considerations and foundations for Botnet simulation
Proceedings of SPIE (April 13 2009)
Honeynets
Proceedings of SPIE (February 20 2001)
Security issues of GIServices
Proceedings of SPIE (October 27 2006)
Bot armies as threats to network security
Proceedings of SPIE (April 08 2007)
Internet firewalls: questions and answers
Proceedings of SPIE (March 11 1996)

Back to Top