Next:
Introduction
Up:
Threat Assesment of Malicious
Previous:
Threat Assesment of Malicious
Contents
Contents
Introduction
Malicious Code
Viruses
History of Viruses
Current Protection Against Viruses
Worms
History of Worms
Current Protection Against Worms
Trends for the Future
Human Threats
Insider Attacks
Hackers
Phone Phreaks
Trends for the Future
Configuration Errors and Passwords
Internal Threats
Connectivity
Information Dissemination
Summary
References
About this document ...