Abstract
In a mere 16 months, from March 1918 to June 1919, the Influenza Pandemic infected and killed between 20 and 70 million people, worldwide [1]. While the virus infected nearly one-fifth of the world’s population, the fatality rate was a startling 2.5% of the infected victims, implying one new death every 2 s [2]. One might ask, why this digression into epidemiological history? The answer is simply, this is the closest analogy to what we are up against. Our modern computing infrastructure, comprised of personal computers, servers, Internet routers, cell phones, personal digital assistants (PDAs) and a myriad of other devices, are all viable “hosts” for an equivalent “digital” pandemic.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Retrieved from http://www.cdc.gov/od/nvpo/intro8.htm
Retrieved from http://www.fsbassociates.com/fsg/flu.htm
Retrieved from http://www.icir.org/vern/papers/cdc-usenix-sec02/
Retrieved from http://www.caida.org/outreach/papers/2002/codered/codered.pdf
Retrieved from http://enterprisesecurity.symantec.com/article.cfm?articleid=967\&EID=0
Retrieved from http://www.cs.berkeley.edu/nweaver/sapphire/
Retrieved from http://itmanagement.earthweb.com/secu/article.php/1577611
Keizer, G. (2010, February 23). Intel confirms ‘sophisticated’ attacks in January: Denies link to Google-China hacks, which used IE6 zero-day to breach networks and steal information. Computerworld
Retrieved from http://home.apu.edu/jcox/projects/individual/Testing/
Retrieved from http://www.cnn.com/2000/TECH/computing/05/02/new.ddos.tool/
Retrieved from http://www.caida.org/analysis/security/code-red/#crv1
Retrieved from http://www.sans.org/rr/paper.php?id=96
Retrieved from http://www.itsecurity.com/papers/iss4.htm
Retrieved from http://www.cert.org/advisories/CA-2001-26.html
Retrieved from http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html
Retrieved from http://project.honeynet.org/papers/honeynet/
Weaver, N. C. (2001, August 15). Warhol worms: The potential for very fast Internet plagues.
Staniford, S., Paxson, V., & Weaver, N. (2002). How to own the Internet in your spare time. Proceedings of the 11th USENIX Security Symposium
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Boulanger, A., Ghosh, S. (2011). Malicious Code. In: Ghosh, S., Turrini, E. (eds) Cybercrimes: A Multidisciplinary Analysis. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13547-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-13547-7_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13546-0
Online ISBN: 978-3-642-13547-7
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)