Ending the book leaves the reader
with a feeling of relief. The whole book towards the end builds up to the Conficker
worm. At the end the Conficker worm ends up just to be a hoax, an April fools
joke. There were three strains to the virus, A, B, and C. The strains of A, and
B were predicted to be steps to take in order to unleash strain C, the heart of
the worm. The public commotion that was caused because of this worm is
something that should not be overlooked. What the worm still did caused panic
and commotion between consumers, companies, and the government. A person
suspected to be involved was Russian, but there are no leads on who it could
be. The government should still be looking for the people responsible because
of the public commotion these people caused and the amount of money the
government spent on trying to protect the Internet and finding the people
responsible. Microsoft is blamed for being the major problem on why the
Conficker worm was such a threat. Microsoft is considered a monopoly for all
the smaller companies they have bought. Microsoft took away the majority of the
competition and have sold ten million computers with Windows operating system
on them. Should companies be punished for wanting to make more of a profit?
Without buying other companies, Microsoft would not have sold as many windows
operating system computers. Another point that could be bought up is, with the
mass making of windows computers the cost of the computer has been able to
decrease, allowing more people to purchase a computer or have multiple
computers. Corporations should not be blamed for wanting to sell as many
products as possible. One thing to note when purchasing a product is the
security. Apple computers are generally more expensive than windows computers
but they are advertised to be more secure against viruses. By creating a common
language among the larger computer companies more people have been able to
create more programs for consumers to use. The drawback that is commonly
overlooked is how it allows for more viruses to be made, and spread easily from
computer to computer.
Sunday
Worm Book Post #4
The fourth part of the book, Worm, starts out with talking about the
Conficker worm. This was a virus no one knew the potential of. Not many people
new the source of where the virus was even coming from. Mark writes about Rick,
an online security expert, “Markoff quoted Rick: ‘If you’re looking for a
digital Pearl Harbor, we now have the Japanese ships steering toward the
horizon’” (Bowen, 129). The reason I choose this quote is to show how big of a
deal Rick made of this event. I do not believe the public knew the threat level
of the attack as Rick did. The Conficker worm spread fear through the online
community of people who were following it for what the virus could do, the
potential the worm had to destroy and steal information on so many computers. Businesses,
like Microsoft, were also becoming worried of the Conficker worm affecting
their computers, and offered a 250,000-dollar reward for whomever could
identify the person or persons who created the worm. My question when I read
how Microsoft was paying to have someone identify the person or persons who
created the worm is, why is a company paying for the person identifying the
worm, rather then the government taking more of an action to find the people
responsible? The government was probably working very hard in order to find out
who was behind the attack. This is especially after receiving advice on how bad
the Conficker worm was going to be by online security experts. It does not seem
right to have a company pay to help find the person or persons the government
is looking for. Microsoft is paying in order to help keep their reputation of
their operating system safe, but I still do not believe they should have to pay
that much money to catch the people responsible.
Worm Book Post #3
In the third part of the book, Mark
talks much more about the smaller viruses. Mark comes up with a creative
tittle, “An Oceans of Suckers.” By smaller viruses what I really mean are
viruses that target a lot of computers but do not cause physical harm. One
virus, named Melissa virus, clogged networks by sending out pornographic
images. The virus was able to spread itself by looking through peoples email
addresses and then sending out emails to those people. This caused a lot of
computers to receive this virus. The debate of this issue comes to play when
you hear of the punishment. David Smith, the creator of this virus, was fined
5,000 dollars, and received twenty months in prison. Do you think this is a
fair punishment? Is twenty months in prison enough, for someone who was able to
access someone’s personal information? I personally do not think twenty months
is enough for the crime that was committed. The virus this man made not only
put a virus onto the computer, but it went through that person’s personal email
and stole their email addresses. These types of email viruses continued and in
2000, a virus called I Love You was created. Two programming students in the
Philippines created it. The virus was
designed to steal passwords from the victim’s personal files. While the virus
failed it still managed to cause 5.5 billion dollars in damage. These email
viruses were only just the beginning. Viruses were becoming more deadly towards
computers some even targeting the main operating system and just shutting the
computer down. What the significance of I Love You did was encouraged the
bigger named companies to hire people to help find these security flaws in the
operating system. Consumer confidence was going down, as consumers were unsure
to open attached files in their emails. These email attacks and worm attacks
were brought to an end in 2004 when Microsoft released Service Pack 2.
Worm Book Post #2
The second part of the book focuses
much more on what the threats are of these viral security attacks. People
underestimate the threats of these viral attacks, just because they are viral.
In today’s society, everything is online. Someone who can break through the
firewall of a business or country, “could compromise nuclear reactors,
electrical grids, transportation networks, pipelines – you name it” (Bowden,
49). The threats are just as real as an
actual war. Even though the hacker is not holding a gun, he could be holding
transportation codes allowing a tram to derail. I believe people do not understand
how complex these security hacks can be. While some are as simple as a key
tracker, meaning the virus tracks the key inputs in order to gain information
like usernames and passwords, they can be as complex as causing physical harm
to people. When talking about causing physical harm to people because of a
computer, is the part of a computer virus I believe is overlooked. Once the
virus enters into the computer, the virus is able to spread easily from one
computer to another. For example, inside the windows operating system there is
a feature called the Dynamic – Link Library. What this is designed to do is
easily allow people to exchange data from one computer to another. What can
also be sent through the computers is the virus. While the feature is designed
to help the consumer, it can also hurt the consumer by spreading the virus through
their other computers. This brought up another question to my mind. Should we
be having these technologies being put into our computers? While this
technology makes it very easy to send files, clearly it is not secure. Email
has viruses attached but at least they know where the email is coming from when
they open the attachment. Apple took a very interesting approach to help keep
the computer safe from viruses. What apple requires is when sending a file from
one computer to another is a passcode to send the file. While hackers are able
to get around this, it takes much more effort and time to program, creating
many less viruses able to attack the computer.
Worm Book Post #1
In my class, we have started reading an outside
reading book to help expand on an issue in America. When choosing the book I
wanted to read, I decided to choose an issue that has not been given much focus
recently. The book I decided to read was Worm
by Mark Bowden. The premise of the story is to talk about various viruses
and how they came to fame. The most recent and one of the largest computer
virus is the Conficker worm. This is what computer security experts considered
the First Digital World War. In the first part of the story, the book
immediately pulls you in, posing questions and ideas of how a virus could come into
play. Just on page 11 an interesting point was brought up. Mark talks about how
computers used to be, where when large corporations would want a computer. The computers
needed to be brought in to homes and businesses by removing the roof and
dropping the computer in or by bringing the computer through a loading dock.
What I found interesting about these older computers is how every computer was
different. “Each machine had its own design and its own language and, once it
had been put to work in a particular lab, its own culture, because each was
programmed and managed to perform certain functions peculiar to the
organization that bought it” (Bowden, 11). From reading this I thought to
myself, has the modern day computer caused viruses to be spread throughout the
world? Go back to when these computers had their own language, their own
“personality,” the viruses would not be able to target millions of computers. Instead,
these older computers would be the only ones with the virus leaving the virus
stuck on one computer and not spreading to other computers. Now computers are
massed produced with a similar operating system or language. The most popular,
for example, is windows operating system. Computers are sent out with these
operating systems so creating a virus for a particular operating system, now
can affect millions of computers with that operating system. So basically to
sum it up, rather then having one virus affect one computer, due to computers
running the same language, one virus can affect millions of computers. Microsoft
saw this flaw, and now has regular patches the first Tuesday of every month in
order to help fix some of the flaws within the operating system. A group of
Chinese hackers took advantage of a flaw within the windows operating system
and started to make a business of selling an exploit. The exploit went to the
heart of the windows operating system through a port known as port 445. Selling
this product was not against the law since they were not performing any criminal
acts. They were simply just selling the exploit. If they had added a virus to
the exploit, then the result, on if it were a crime, would have been different.
Another point could be brought up, should it be illegal to provide the tools to
create these viruses? While the Chinese hacker group did not create the virus,
only the exploit, they still helped aid in the assistance of the virus. Without
the exploit the virus might not have been able to attack the computer. I
personally believe there should be restrictions on who these exploits should be
given to. If the exploit is put into the wrong hands, your personal information
could be released to the public.
Picture Source: http://ecx.images-amazon.com/images/I/51vd0w-viWL._SL160_.jpg
Picture Source: http://ecx.images-amazon.com/images/I/51vd0w-viWL._SL160_.jpg
Subscribe to:
Posts (Atom)