...ABSTRACT This minor research report is about the computer worm which is a self-navigating malicious program that is being utilized by many attackers to damage the target machine substantially. This report begins by giving an idea of what exactly is computer worm, then we discuss about the mechanism which this malicious code uses to attack the target machine, then we discuss about the various worms which have been discover and design till now, an overview is given about this worm infects the system and the exten to which these worms have cause damage. After that we discuss various prevention tools which are design to detect and eliminate such worms. In the end we discuss about the future potential worms and predicted what kind code will be written and how much damage it can cause to system or network. INTRODUCTION Everyone, almost everyone and every big organization like bank, pharmaceutical companies, and retail chain companies uses computer these days to do most of the important work so it is understood that their computer will contain certain sensitive information which they do not want to disclose, and as result such kind of information need security, and the term information security was introduced. In this minor research paper we discuss about one malicious code which is a serious threat to such information called WORM. A computer worm is a kind of malicious program which has the capability of reproducing itself and uses computer network to distribute throughout...
Words: 2891 - Pages: 12
...Running head: Malicious Code MyDoom Worm Daniel Stevenson 11/22/2013 ITT-Tech North Las Vegas Abstract In this paper I will be detailing the Mydoom worm and what this has done to computer systems as well as what was the steps in how to prevent or remove this hazard from your computer. MyDoom Worm No one wants a virus on their computer, especially when it means that you may be spending money to remove these nasty pests from your system. There are all sorts of things that can infect your computer from viruses, worms, rootkits that make your computer into a puppet and also malicious spam ware and malware. All of these things can wreak havoc on your network. In this paper I will tell you about a worm that still has the record for being the fastest spreading virus. This virus is known as W32.MyDoom@mm. This worm has other names but this is the one that it is most known by. The Beginning MyDoom was a worm that came to the public eye at the beginning of 2004. Finnish security company F-Secure named is the worst virus to date because of the way it quickly infested users emails and quickly attached itself to any email that was going out that had an attachment. When the worm first came into the spotlight F-Secure stated that the worm was on 20-30% of the worldwide internet traffic. Another company that screens emails for companies, MessageLabs, also stated that it had intercepted the worm more than 3.4 million times at a rate of every 1 in 12 emails at its highest. This...
Words: 809 - Pages: 4
...Bio 54 2002 Filarial Worms I : Structure, Infection, & Disease Andrew G. Campbell, Ph.D. Parasitic Filarial Worms - Background • Thread-like worms transmitted by insect vectors (flies and mosquitoes) • collectively infect AT LEAST 100 million worldwide • considered major obstacles to development in endemic countries • "major players" – Wuchereria bancrofti / Brugia malayi lymphatic filariasis – Onchocerca volvulus - river blindness – Loa loa - loaiasis 1 Today’s Lecture •Taxonomy •Lymphatic Filariae •Nonlymphatic Filariae •Disease •Diagnosis, Treatment, & Control KINGDOM PHYLUM CLASS ORDER FAMILY GENUS/SPECIES Wuchereria bancrofti Brugia malayi ANIMALIA NEMATODA RHABDITAE SPIRURIDA ONCHOCERCIDAE Onchocerca volvulus Loa loa (Dirofilaria immitis) NONLYMPHATIC LYMPHATIC 2 Lymphatic Filariae • Wuchereria bancrofti – Approximately 600 million individuals are exposed with at least 80 million currently infected. – disease caused often referred to as Bancroftian filariasis. – occurs throughout the tropics, especially in Africa, South America, India, and Southeast Asia – has also been found in parts of Europe, Nile Valley and Australia • Brugia malayi – limited mostly to parts of India and Southeast Asia – infects probably less than 10 million The Global Distribution of Lymphatic Filariasis 3 Major Life Cycle Stages • INFECTIOUS LARVAE - transmitted to humans by mosquito bites • ADULT WORM - develop from larvae, reside in the lymphatic...
Words: 917 - Pages: 4
...Bio 54 2002 Filarial Worms I : Structure, Infection, & Disease Andrew G. Campbell, Ph.D. Parasitic Filarial Worms - Background • Thread-like worms transmitted by insect vectors (flies and mosquitoes) • collectively infect AT LEAST 100 million worldwide • considered major obstacles to development in endemic countries • "major players" – Wuchereria bancrofti / Brugia malayi lymphatic filariasis – Onchocerca volvulus - river blindness – Loa loa - loaiasis 1 Today’s Lecture •Taxonomy •Lymphatic Filariae •Nonlymphatic Filariae •Disease •Diagnosis, Treatment, & Control KINGDOM PHYLUM CLASS ORDER FAMILY GENUS/SPECIES Wuchereria bancrofti Brugia malayi ANIMALIA NEMATODA RHABDITAE SPIRURIDA ONCHOCERCIDAE Onchocerca volvulus Loa loa (Dirofilaria immitis) NONLYMPHATIC LYMPHATIC 2 Lymphatic Filariae • Wuchereria bancrofti – Approximately 600 million individuals are exposed with at least 80 million currently infected. – disease caused often referred to as Bancroftian filariasis. – occurs throughout the tropics, especially in Africa, South America, India, and Southeast Asia – has also been found in parts of Europe, Nile Valley and Australia • Brugia malayi – limited mostly to parts of India and Southeast Asia – infects probably less than 10 million The Global Distribution of Lymphatic Filariasis 3 Major Life Cycle Stages • INFECTIOUS LARVAE - transmitted to humans by mosquito bites • ADULT WORM - develop from larvae, reside in the lymphatic...
Words: 917 - Pages: 4
...What attracts immigrants to come this country? The Immigration Reform basically focuses on the number of immigrants both legal and illegal that are living in the United States. Immigrants are attracted to this country, because from the 1980’s to the 1990’s Dominique M. Gross and Nicholas Schmitt says that it is shown that the existence of similar cultural communities attracts new immigrants to come to the United States of America. They say that the pulling effect is shown to fall zero for cultural communities above a certain threshold. Many immigrants come to this country, because it is known to be the land of the free which means having more opportunities than what they had back from where they use to live. Immigrants who come either illegal or legal know he or she can find work faster in the U.S. instead of being home. Gross states that the existence of a community of the same origin contributes to the segmentation of the labor market, thereby generating more attractive labor market options for new immigrants. It was said that illegal immigrants who currently live in the United States will be eligible for legal status in eight years, as long as they learned English, didn’t commit a crime and paid their taxes. What is the Impact on the U.S. Economy? James K. Jackson who is the specialist in International Trade and finance foreign Affairs, Defense, and trade Division states that the United States is in the process of negotiating a number of trade agreements...
Words: 1260 - Pages: 6
...Case 13-5 Chemical Bank Chemical Bank is a classic case on management control in a commercial bank. One of the key issues is: should branches be set up as profit centers? Discussion: Goals. Although the goals for a branch are described in paragraph 3 of the case, these are probably not a good statement of the goals for the bank as a whole. Although I am sure that the bank as a whole wants to earn satisfactory profits, and to grow in deposits and loans, both of these objectives are really a function of another factor which is an explicit goal of many banks; service to their community. The economic rationale of this high-sounding goal is straightforward; banks make a profit by loaning out the funds entrusted to them by depositors. An increase in loans requires a preceding increase in deposits. But in order to get an increase in deposits, the bank must perform a useful service to businessmen and residents of the community. One of the most important differences between a bank and a manufacturing company are the opportunities for product differentiation. Money is about the most homogeneous product imaginable and, in fact, money is not the bank’s product at all. Its product is service to depositors and borrowers, and it must find imaginative and efficient ways to render better services than its competitors. Organizational structure. Nominally at least, Chemical Bank is decentralized in the operation of its branch banks. Branch managers are told that they are responsible...
Words: 2671 - Pages: 11
...Dracunculiasis the disease commonly known as Guinea Worm is caused by the parasitic worm Dracunculus Medinensis . Guinea Worm disease only occurs in 10% of the world’s poorest populations who has no access to safe drinking water or health care (CDC) . This parasitic worm is the largest of parasites affecting the human’s tissues. The risk for Dracunculiasis varies by ones sex, age, profession, and ethnicity. These differences reflect from how people’s drinking water is obtained in these countries (Medscape). Drancunculiasis is commonly found now in Southern Sudan. About the same number of men and women are equally infected. Guinea Worm is common among the ages of 15–45 years old. People in this age group are known to be farmers, herders, and water fetchers for the household. Water fetchers often affected more due to the fact that they are more likely to drink contaminated water while away from home (CDC). People become infected with Guinea worm by drinking stationary water containing copepods tiny "water fleas" that carry Guinea worm. It takes about 2 weeks to mature inside the copepods before they can infect humans. Measuring 2-3 feet in length the adult female can carry about 3 million embryos within one person (World Health Organization). This parasite migrates through the victim's subcutaneous tissues causing severe pain especially when it occurs in the joints. The worm eventually emerges causing an intense pain, blisters and ulcers accompanied by fever, nausea and vomiting...
Words: 646 - Pages: 3
...De Montfort University | ENGD1019 -Computer Aided Engineering – Assignment 3 | | P. J. Prickett 3/27/2014 | Solid models of all the components 1 1 The following dimensions have been put into place to ensure that the depth of the ridges are kept the same. Doing this will reduce all forms of likelihood of any abnormalities occuring when the driver worm is connect to the gear. 3 3 Here are the three stages of the creation of the driver worm. A sketch round the x axis of 360 degrees was drawn followed by a mirror bein created by the datum plane for the seep that was to be made. 2 2 The exact same steps were repeated in this stage, the only differences being a few dimensions and a change in the directions of the sweeps. To be more specific the difference in this case between the plane and the sweep was 6, this was to ensure that the heical sweepes were at an eaqual distance from each other in order for the two distances to stay equal when the overall size is changed. Doing this removes the likelhood of any mechanical issues. 5 5 4 4 3 3 2 2 1 1 Each of the 5 parts shown above are all derived from the centre of circles. Because they are each from the same centre circles they all then contain associativity from the same cross section of planes. 4 4 3 3 2 2 1 1 These are the creation and extrudes on the sides of the casing the bottom one is in a fixed position right at the bottom...
Words: 1097 - Pages: 5
...The worm in the apple John Cheever is an American novelist, who gained his popularity as a short-story writer, for which he was awarded with Pulitzer prize for fiction. His work mostly deal with the duality oh human nature corroborated by cultural and psychological background. And his short story titled “The worm in the apple” is not an exclusion. The story unfolds very smoothly and evenly in spite of of the stirring and at the same time troubling subject of the matter. We get acquainted with the main characters – The Crutchman family “so very very happy and so temperate in all their habits and so pleased with everything that came their way”, due to the anaphoric repetition the author creates intensification, that states the problem – what in beautiful on the outside may be dreadful inside. Obviously, the theme of the work is reflected in the title of the story. The rhetorical questions (who but someone suffering from a guilt complex would want to much light to pour into the rooms?; Why be o intense about digging holes) give a detailed emotional description of the Crutchman's life. The world of things puts emphasis on their way of life and thoughts. The positive form of these questions presuppose negative answers and so it gets obvious from the very beginning that the Crutchman's problems are deep and that the extraordinary rosiness of their family fruit just conceal the gravity of the infection. John Cheever gives a psychological portray of the main characters: Helen and Larry...
Words: 693 - Pages: 3
...The worm in the apple John Cheever is an American novelist, who gained his popularity as a short-story writer, for which he was awarded with Pulitzer prize for fiction. His work mostly deal with the duality oh human nature corroborated by cultural and psychological background. And his short story titled “The worm in the apple” is not an exclusion. The story unfolds very smoothly and evenly in spite of of the stirring and at the same time troubling subject of the matter. We get acquainted with the main characters – The Crutchman family “so very very happy and so temperate in all their habits and so pleased with everything that came their way”, due to the anaphoric repetition the author creates intensification, that states the problem – what in beautiful on the outside may be dreadful inside. Obviously, the theme of the work is reflected in the title of the story. The rhetorical questions (who but someone suffering from a guilt complex would want to much light to pour into the rooms?; Why be o intense about digging holes) give a detailed emotional description of the Crutchman's life. The world of things puts emphasis on their way of life and thoughts. The positive form of these questions presuppose negative answers and so it gets obvious from the very beginning that the Crutchman's problems are deep and that the extraordinary rosiness of their family fruit just conceal the gravity of the infection. John Cheever gives a psychological portray of the main characters: Helen and...
Words: 339 - Pages: 2
...STUXNET Worm Webster University SECR-5080 Information Systems Security Author Note Certificate of Authorship: This paper was prepared by me for this specific course and is not a result of plagiarism or self-plagiarism. I have cited all sources from which I used data, ideas, or words either quoted or paraphrased. Abstract Discovered in June of 2010, a computer worm called Stuxnet was designed to attack programmable-logic controllers or PLCs that are used to control switches and values in industries that operate a specific type of on Siemens PLC device using Step7 software running on a Windows operating system. The worm was successful because it was able to exploit a of four zero-day flaw of Windows operating system. Stuxnet was a targeted attack by intelligence agencies to delay the enrichment of uranium by Iran. The Stuxnet worm was the first clear public evidence of sophisticated computer malware to sabotage control systems. The Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges in 2010. Table of Contents Introduction 5 Stuxnet Worm 5 Stuxnet is a Computer Virus 5 How Stuxnet Works 7 Stuxnet and PLCs 9 Stuxnet: Cyber Warfare? 9 Zero-day flaws and Stuxnet 11 Summary 12 References 14 Table of Figures Figure 1: SIEMINS S7 family of PLC (SIEMINS, n.d) 5 Figure 2: Flash Drive 5 Figure 3: Realtek Semiconductor Corp Logo (RealTek, n.d.). 6 Figure 4: Realtek Certificate (Symantec, 2010). 6 Figure 5: How STUXNET...
Words: 2136 - Pages: 9
...Dracunculiasis the disease commonly known as Guinea Worm is caused by the parasitic worm Dracunculus Medinensis . Guinea Worm disease only occurs in 10% of the world’s poorest populations who has no access to safe drinking water or health care. This parasitic worm is the largest of parasites affecting the human’s tissues. The risk for Dracunculiasis varies by ones sex, age, profession, and ethnicity. These differences reflect from how people’s drinking water is obtained in these countries. Drancunculiasis is commonly found now in Southern Sudan. About the same number of men and women are equally infected. Guinea Worm is common among the ages of 15–45 years old. People in this age group are known to be farmers, herders, and water fetchers for the household. Water fetchers often affected more due to the fact that they are more likely to drink contaminated water while away from home. People become infected with Guinea worm by drinking stationary water containing copepods tiny "water fleas" that carry Guinea worm. It takes about 2 weeks to mature inside the copepods before they can infect humans. Measuring 2-3 feet in length the adult female can carry about 3 million embryos within one person. This parasite migrates through the victim's subcutaneous tissues causing severe pain especially when it occurs in the joints. The worm eventually emerges causing an intense pain, blisters and ulcers accompanied by fever, nausea and vomiting. Studies show that biological factors can increase...
Words: 255 - Pages: 2
...experiments on more than 10,000 tiny laboratory roundworms. The first step involved developing genetic mutants of these transparent roundworms for each one of 654 genes that were suspected to play a role in the regulation of axon regrowth in worms, fruit flies and mice. They then labeled the roundworm neurons with green fluorescent protein and, with a precise surgical laser, damaged a specific axon. Because the worms were transparent they could see the axons expressing a green fluorescent protein. By examining the re-growth, or lack of growth, of the damaged axon 24 hours later, the scientists were then able to determine which of these 654 genes were actually important to axon re-growth. The 76 genes seen are believed to have the same function in humans as in the worms. Research teams are now collaborating with other investigators to conduct experiments on mice to verify this connection and determine which of these genes are the most critically important. This article is relevant to what I am studying because it show that we as humans have so many genes cells and other parts throughout our body that do many different things and when we damage these or harm them there is a way for our body to compensate or try to fix the problem. So in the worms they are finding axons or nerve cells that could potentially cure nerve damage in our bodies. My opinion is that if scientists can find a way to regenerate nerve cells in animals that maybe someday they will be able to find a way...
Words: 367 - Pages: 2
...The ILOVEYOU worm was first reported in Hong Kong on 4 May 2000 and spread westward on that day. The ILOVEYOU worm affected computers at more than half of the companies in the USA and more than 105 mail servers in Europe. Internal e-mail systems at both the U.S. Senate and Britain's House of Commons were shut down. It was estimated that the ILOVEYOU worm did more damage than any other malicious program in the history of computing: approximately US$ 9 × 109. On 4 May 2000, MessageLabs filtered ILOVEYOU from one in every 28 e-mails, the all-time highest daily infection rate seen by MessageLabs. The ILOVEYOU incident was commonly reported as a virus in the news media, but it was actually a worm, because this malicious program did not infect other programs. I call this worm by the subject line of e-mail that propagated this worm. Norton Anti-Virus calls it VBS.Loveletter.A. The ILOVEYOU worm arrived at the victim's computer in the form of e-mail with the ILOVEYOU subject line and an attachment. The e-mail itself was innocuous, but when the user clicked on the attachment to read the alleged love letter, LOVE-LETTER-FOR-YOU.TXT.VBS, the attachment was a Visual Basic program that performed a horrible sequence of bad things: Deletion of files from victim's hard disk. The worm overwrote files from the victims' hard disk drive, specifically targeting files with extensions:*.JPG, *.GIF, and *.WAV, amongst many others (i.e., files containing audio/visual data), *.CSS (i.e., cascading style...
Words: 1046 - Pages: 5
...1. INTRODUCTION 1.1 Overview A mobile ad hoc network or MANET is a kind of wireless ad hoc network, which is the infrastructure wireless networks where each user directly communicates without an access point or base station. It is a self-configuring network of mobile routers connected by wireless links with no access point. Nature of mobile device in a network is autonomous. Due to these mobile devices are free to move. In other words, the mobile ad hoc network is infrastructure less wireless network. The Communication in MANET is take place by using multi-hop paths. Nodes in the MANET share the wireless medium and the network topology changes dynamically. In MANET, breaking of communication link is very frequent because the nodes are free to move to anywhere. The density of nodes and the number of nodes are depends on the applications in which we are using MANET. Fig-1 Ad-Hoc Network In figure a simple ad-hoc network shown with 3 nodes. Node1 and node 3 are not within range of each other; however the node 2 can be used to forward packets between node 1and nodes 2. The node 2 will act as a router and these three nodes together form an ad-hoc network. 1.2 MANET Characteristics Distributed operation: The control of the network is distributed among the nodes; there is no central background for the control of operations. The nodes should cooperate with each other and communicate among themselves...
Words: 3336 - Pages: 14