Paper
18 April 2006 Personal privacy, information assurance, and the threat posed by malware techology
Martin R. Stytz, Sheila B. Banks
Author Affiliations +
Abstract
In spite of our best efforts to secure the cyber world, the threats posed to personal privacy by attacks upon networks and software continue unabated. While there are many reasons for this state of affairs, clearly one of the reasons for continued vulnerabilities in software is the inability to assess their security properties and test their security systems while they are in development. A second reason for this growing threat to personal privacy is the growing sophistication and maliciousness of malware coupled with the increasing difficulty of detecting malware. The pervasive threat posed by malware coupled with the difficulties faced when trying to detect its presence or an attempted intrusion make addressing the malware threat one of the most pressing issues that must be solved in order to insure personal privacy to users of the internet. In this paper, we will discuss the threat posed by malware, the types of malware found in the wild (outside of computer laboratories), and current techniques that are available for from a successful malware penetration. The paper includes a discussion of anti-malware tools and suggestions for future anti-malware efforts.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Martin R. Stytz and Sheila B. Banks "Personal privacy, information assurance, and the threat posed by malware techology", Proc. SPIE 6241, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, 624107 (18 April 2006); https://doi.org/10.1117/12.665344
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Defense and security

Computer security

Computing systems

Internet

Information security

Network security

Viruses

RELATED CONTENT

Cyber defense through hardware security
Proceedings of SPIE (May 09 2018)
Considerations and foundations for Botnet simulation
Proceedings of SPIE (April 13 2009)
Computer loss experience and predictions
Proceedings of SPIE (March 12 1996)
Bot armies as threats to network security
Proceedings of SPIE (April 09 2007)
Internet firewalls: questions and answers
Proceedings of SPIE (March 12 1996)

Back to Top