introduction
|
worms and viruses
|
costs
|
|
who's responsible?
|
solutions
|
references
|
|
CS201 Final Project
Neil Chou
Jiayi Chong
Chee Hau Tan
|
|
References
-
Krzywinski, M. 2003. Port Knocking: Network Authentication Across Closed
Ports. SysAdmin Magazine 12: 12-17.
-
Ellen Messmer. Can software patching be automated?, Network
World Fusion. May 24, 2004.
-
Larry Seltzer. Multiple Vulnerabilities Found in Symantec
Client Products. http://www.eweek.com/article2/0,1759,1591504,00.asp. May 12, 2004.
-
Arno Wagner, Thomas D. Attack Analysis: Observation of the W32.Blaster
Worm. http://www.tik.ee.ethz.ch/~ddosvax/attacks/blaster/
-
Stanford University Information Technology Security Services. Year
end/Year beginning
report. http://www.stanford.edu/group/itss-ccs/security/FY02Security-status.pdf
-
Ricketts, Camille. Hackers unleash new virus.
http://daily.stanford.edu/daily/servlet/tempo?
page=content&id=11670&repository=0001_article#.
The Stanford Daily. August 21 2003.
-
Sado, Whitney. Blaster worm strikes campus.
http://daily.stanford.edu/daily/servlet/tempo?
page=content&id=11884&repository=0001_article.
The Stanford Daily. September 22 2003.
- Smith, Matt. Virus hits campus.
http://daily.stanford.edu/daily/servlet/tempo?
page=content&id=13965&repository=0001_article
The Stanford Daily. April 26 2004.
-
Shen, John. Gaobot virus continues to infect thousands of campus computers.
http://daily.stanford.edu/daily/servlet/tempo?
page=content&id=14040&repository=0001_article. May 3 2004.
-
Wagner, Jim; Maraine, Ryan. Stanford's Linux supercomputers compromised.
http://www.securesynergy.com/securitynews/newsitems/
2004/apr-04/160404-05.htm.
April 16 2004
|