Worm analysis through computer simulation (WAtCoS)
Computer viruses have received a lot of attention. In fact, the best-known viruses have not been viruses at all, but worms, programs that spread through networks instead of modifying programs. Both viruses and worms reproduce themselves and defensive measures have focused on stopping or slowing thei...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Paper |
Language: | en_US |
Published: |
Int Assoc Engineers-Iaeng
2015
|
Subjects: | |
Online Access: | http://ddms.usim.edu.my/handle/123456789/9008 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Computer viruses have received a lot of attention. In fact, the best-known viruses have not been viruses at all, but worms, programs that spread through networks instead of modifying programs. Both viruses and worms reproduce themselves and defensive measures have focused on stopping or slowing their spread. Ultimately, though, there is no defense better than a comprehensive security strategy that embraces user education, crisis-response teams, and technologically sound security measures including, but not limited to, those that relate specifically to the threats posed by viruses and worms. Defense against harm can consist of preventing the harm from occurring, limiting the extent of the harm, or recovering from the harm after it has occurred. This research aims to resolve the confusion in identifying visualization, simulation and games in teaching malware analysis. Computer simulation has greater impact and based on research that had been carried out it is identified as one of the best approach in teaching worm analysis. |
---|