This is a presentation about malwares, and how this are reconized the different types of malwares, who creates them, what's wrong and right about them, and the growth of these Malwares. I have also introduced a little chapter about the ethics of the internet/technology.
2. A Malware are forms of disturbing and intrusive software. This usually
includes viruses, spyware, and scareware, but this are just a small part of the many
hostile software. This Malwares can show their self in different ways; usually as codes,
scripts, or an active content (Weather maps, animated images, streaming video and
audio…) that might look innocent but might damage your electronic devices.
Technology is completely evolved and changed that is now possible to create
your own malware by using specific, but illegal, applications.
Vocabulary
Application: a self-contained
program or piece of software
designed to fulfill a particular
purpose(Wikipedia)
3. Many nations have agreed to find a solution for these malwares, the problem
is that no country, excluded for the U.S, has precise laws about this hostile systems.
“…Many nations would not much like the idea of several centuries of imprisonment for a
precocious sixteen year old who wrote a little bit of code in his free time. Even worse is the idea
of corporal or capital punishment. Many nations that have extradition treaties with the United
States refuse to turn over criminals to US law enforcement when their crimes are punishable by
death under US law…” (TechRepublic)
Most of the time this systems are created to steal, use, publish other’s information,
data, this can be consider illegal, unless if given consent by a legal.
7. Anyone can be able to create malwares, commonly are high school students
that for fun get to systems and modify them.
A common name to describe them is ‘Hacker’, but it’s not correct to use this
terminology without knowing the meaning.
“In computing, a hacker is any highly skilled computer expert capable of
breaking into computer systems and networks using bugs and exploits.
Depending on the field of computing it has slightly different meanings, and in
some contexts has controversial moral and ethical connotations.”(Wikipedia)
8. "Malicious, in criminal proceedings and in the legal world, has very direct implications,
and a reasonable person or society would not interpret the actions taken by a law
enforcement officers pursuant to a court order to be malicious.“(FBI)
There are several events where malwares were used in an ethical way.
9.
10. There are several anti-malwares on the internet, but only a small part of them is reliable,
the most known are BitDefender, Panda Antivirus, and Malware bytes. This anti malware
shave a precise method to do their job. Many programs scan for malware using a database
of known malware definitions (also called signatures). These definitions tell what the
malware does and how to recognize it. If the anti-malware program detects a file that
matches the definition, it’ll flag it as potential malware. This is a good way to remove
known threats, but it does require regular updates to make sure the program doesn’t miss
out on newly developed malware.(from Malwarebytes)
11. Technologically speaking malwares are hidden in sequences of codes and most
of the time signaled as ‘virus’, but with the help of anti-malwares it’s easier to
extract and find a malware.
12. Hacker have already breached Internet-connected camera
systems, smart TVs, and even baby monitors.
Molly Wood, The New York Times
13. It is easy to find news about hackers that have been circulating on the internet for
years, but we never know what this individuals have done.
Gary McKinnon, is a Scottish Hacker that has been accused of “the biggest
military computer hack of all time.”
Anonymous is a group of different avatar hackers accused of Homophobia and
decriminalization.
LulzSecurity is a group of hackers accused of high profile attacks.
Kevin Mitnick is an American Hacker that was accused in 1995 of high level
hacking, and later of communications-related crimes.
Gary McKinnon Anonymous LuzlSecurity Kevin Mitnick
14. A thief is a thief , whether he steals a diamond or
cucumber.
Indian Proverb
15. The first Malwares were trading systems between armies and secret agencies, but now
days Malwares are programmer’s experiments, or annoying prank that most of the time end up by
acting illegal, or morally unacceptable.
It is right to know what are the morals of the internet and how we can correctly use it
without interfering with other's life.
This Malwares might ruin or destroy valuable resources that give us technical support, that
is costly and take time. We can describe this actions as vandalism or carelessness for other
people’s work and material.
This systems violate the two main ‘laws’ of the internet; Copyright and Privacy.
They copy or steal all your data, which can be a paper work, a contract, or pictures of
yourself, and might sell them in exchange of passwords, money, or codes for future acts.
People suffers everyday from this kind of vandalism, looses job, family, and sometimes all
their money this was severely discussed by politicians who are looking for a solution.
16. “We worried for decades about WMDs – Weapons of Mass Destruction. Now it is time
to worry about a new kind of WMDs – Weapons of Mass Disruption; Malwares.”
John Mariotti
“Our privacy is being attacked on multiple fronts.”
Tim Cook
“People’s computers are not getting more secure. They’re getting more infected with
viruses. They’re getting more under the control of Malwares.”
Avi Rubin
“I always tell people that if you haven’t had your identity stolen already, you will.”
Mike Sullivan, Take Charge America