Computer Viruses and Younger Users – who are the script kiddies?

نویسندگان

  • John Sheenan
  • Lynne Dunckley
چکیده

Advances in technology are making the propagation of viruses easier. Script Kiddies are represented in the media as young persons who exploit other virus writers’ work without realising the damage caused. This paper describes a survey of younger users to investigate their involvement and experience with computer viruses and their attitudes towards virus attacks in order to caste light on the ‘script kiddie’ phenomenon. The survey involved a sample of school children in the 12-15 age group, in the UK Author

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors

Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...

متن کامل

So long, and thanks for only using readily available scripts

There is a general belief that it has become easier to conduct cyber attacks and that little skill or knowledge is required to compromise systems. In particular, it is often argued that the technical expertise required to mount successful cyber attacks is declining as a consequence of new offensive resources, such as attack scripts and userfriendly attack execution tools, becoming available in ...

متن کامل

Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software

With the emergence of widely available hardware and software tools for GSM hacking, the security of cellular networks is threatened even by script kiddies. In this paper we present four different attacks in GSM networks, using commodity hardware as well as open source and freely available software tools. All attacks are performed using a common DVB-T TV tuner, which is used as a sniffer for the...

متن کامل

Decoy Systems: A New Player in Network Security and Computer Incident Response

Interconnectivity on the Internet is growing, as more and more organizations, private companies and governmental institutions connect for critical information processing. This interconnectivity allows for better productivity, faster communication capabilities and immeasurable personal conveniences. It also opens the door to many unforeseeable risks, such as individuals gaining unauthorized acce...

متن کامل

Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces

For several years, various projects have collected traces of malicious activities thanks to honeypots, darknets and other Internet Telescopes. In this paper, we use the accumulated four years of data of one such system, the Leurré.com project, to assess quantitatively the influence, in these traces, of a very popular attack tool, the Metasploit Framework. We identify activities clearly related ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006