Sie sind auf Seite 1von 18

Boyd,Ligon,Tafolla1

Introduction:
OurnamesareSimoneBoyd,ScottLigon,andKarenTafolla,andweareallstudentsin
CST373.Weareallmajoringincomputersciencewithaconcentrationinsoftwareengineering.
AllofourgoalsafterwefinishCSUMBaregoingincareersthatallowustobeinvolvedin
softwareengineeringprojectsthathelpcompaniesofourchoice,suchasNorthropGrumman,
Google,orPinterest.Forthisproject,wearegoingtoexploretheethicsbehindwhether
programmers,especiallythosewhomakemalware,shouldhaveacreativelicensetomakesuch
products.Thepersonalandsocietalvaluesthatarestakearebehindtheintentionsofthosewho
createprogramsthatcanpotentiallyharmusers.Amajorityoftimeswhenapersonhearsabout
hackersorthosewhocreateviruses,theyusuallyassumethattheprogrammersbehindthe
dangeroussoftwarehaveintentionsofstealinginformationorruiningsomeone'soperating
system.WheninrealityindividualsandtheU.S.governmenthaveusedmalwaretocombat
cyberterrorismandkeeptrackofsuspectsofterrorism.
Wethoughtthistopicwouldbeinterestingtoresearchaboutbecausewebelievethat
malwareorhackingcanbeusedtohelpsecureandprotectothers.Wehopetoresearchboth
sidesofwhetherprogrammersshouldhavetherighttohavecreativelicenses.Justasthereare
evidencethatthereareharmfulaffectstowardstheuseofmalware,wearegoingtosearchin
hopestodiscoverthebenefitsofhackingandcreatingvirussoftware.Thisissueisimportantto
thinkaboutbecauseiffuturelawsrequireforallthecreationofmalwaretobeterminatedorto
notallowprogrammerstohavecreativelicenses.Therecouldpotentiallynotbefuture
innovationtohelpnationalsecurityaboutnationalcyberthreatscreatedbyothers.The
innovationofdifferentprogrammingperspectivescanhelpsoftwaredevelopersgetintothe
mindscapeofpotentiallydangeroushackersormalwaredesigners.

History:
Thehistoryofmalwarehasconsequentlycreatedkeyplayersthathelpedshapethe
evolutionandattitudesbehindtheuseofmalware.Theseindividualsvaryfromcompany
employeestomorecommoncomputerusersinhighschoolorathome.Theoriginofthefirst
infamousknownmalwarestemmedfortyyearsago,atthecompanyBulletinBoardNetwork
(BBN).Oneofitsemployees,BobThomas,beganworkingonaprojectthathadtheearly
conceptofmobileapplications.HisprojectworkresultedinasoftwareworkcalledtheCreeper,
anditwasdesignedtohavethecapabilitytomovefrommachinetomachine.By1971,Creeper
infatuatedthroughARPANETinfectingeverythinginitspath(
Williamson,2011
),anditwas
declaredthefirstwormthatspreadthroughtheearlyformsofglobalnetworks(Grimes,2015).
AlthoughCreeperwasthefirstknownmalwarethatbreachedanumberofglobalnetworks,
malicioussoftwarehadactuallybegantosurfaceinthe1960s.Thesewereintheformofonline
gamescalledLifeandCoreWarsinwhichausersprogramminginstructionstriedtoliveaslong
aspossibleinawaragainstanotherpersonsprogramthatcankillit(Grimes,2015).By1982,
thefirstPCviruswaswrittenbyafreshmanhighschoolstudent,RichardSkrenta.Thisviruswas

Boyd,Ligon,Tafolla2
afourhundredlineprogramthatwaswritteninElkCloner,abootingprogrambyApple11
(Grimes,2015).BecauseofSkrenta,manypeoplebegantorelyonApplecomputerstowrite
futureviruses.
Withtheexamplespreviouslymentioned,theindividualswhocreatedvirusesdidsoout
ofcuriosityofwhathowsoftwarecouldbehavewhenabletotravelfromonesystemtoanother.
However,withtheriseofavailableresourcestomakemalware,peoplehavebeguntotamper
withthecapabilityofmalwaretobreachintolargeramountsofsecurity.By1986,thesecurityof
IBMcomputerswerethefirsttobethreatenedbywhatwasreferredasthePakistaniBrainboot
virus(Grimes,2015).Thevirusonlyinfectedthreehundredsixtyfloppydisks,butitmanagedto
thrivebecausethevirustraveledaroundtheworld.Themainsupplythatmalwarethrivesonis
theabilitytospreaditselfthroughmultiplenetworks,sovirusescanemergethroughthe
presenceofanetworkorsomesimilarcommunicationmedia.(
Williamson,2011
).Sowithout
theARPANETnetworkinfrastructure,Creeperwouldnothavethreatenedmanysystemsand
spreadawarenesstowardsbadsoftware.By1988,awormknownastheMorrisWormutilized
smallprogramsthathelpedbreachtheInternet.TheMorrisWormdirectedacollectionofflawed
codesfoundinUNIX,andeventually,thevirusinfestedover60,000computers(
Grimes,2015
).
TheinnovationoftheMorrisWormhelpedtocontributetomorecommonvirusesasyears
progressed.By1989,therewerefiftysixdifferentvirusesthatthrivedonthePC/DOSplatform.
Theseviruses,however,attemptedtocloakthemselvesfromantivirussoftwarebutendup
failing.
Keyindividualshavehelpedshapethenegativeviewsofmalwarebyusingittobreach
securityofmoreusersandtocollectimportantinformationforthemselves.Malwaresoftware
startedtobecomemorepowerfulandendedupmakingheadlinesintheearly1990s.In1992,a
hackerreferredastheDarkAvenger,releasedthefirsteverpolymorphicviruscapableof
creatingdifferentvariationsofitself.Besidesthehackersthemselves,otherkeyplayerswithin
thehistoryofmalwareareantivirusfirms.Thepolymorphicvirusmadeanimpactinthevirus
protectionindustrysincesimpleviruscheckscanningwasnolongercompatiblewiththenewly
evolvedviruses.Asaresult,someantivirusfirmsdecidedtoclosedown.Alsoonthesameyear,
itwasreportedthatWindowshadtheirfirstknownvirus(Grimes,2015).Anothervirusknown
astheMichelangeloviruscausedalotoffeartowardstowardsantivirusspecialists.John
McAfee,thefounderoftheMcAfeevirusprotectioncompany,madeatheorythatthe
Michelangeloviruswouldaffectmillionsofpersonalcomputers.Andasresult,manyusershada
growingdemandfornewerantiyvirussoftware.OnthesameyearastheMichelangeloviruss
release,JohnMcAfeescompanywasfounded(
Cluley,G,2012
).Malwarecontinuedtoinvade
softwareasthe90sprogressed.Forexample,MicrosoftOffice,wastargetedbymacroviruses
from1995to2000.ByMarchof1999,amalwareprogramcalledtheMelissaMacroviruswas
abletooutperformtheMorrisWorm.Malwarealsobegantoevolveintodifferentvariations
aimedfortheInternetsuchasHTML,JavaScript,Java,andActiveX(Grimes,2015).

Boyd,Ligon,Tafolla3
Withintheearly2000s,virusesbegantospreadthroughemails.Duringthisdecade,the
spreadofmalwareknowledgeinfluencedavarietyofpeople.Professionalcriminalsusedtheir
softwareskillstoinfiltrateinformation,andcommonhobbyistsusedhackingasmeansofdaily
living.Within2005,malwareprogrammerswerecapableofusingvirusestodirectlycontroltheir
targetspersonalcomputer.Today,virusprogrammersandvirusprotectioncompaniesarestill
keyplayersformalware.Malwareprogrammersarecurrentlytryingtobypasssmartphonesand
increasedBYODadoptionamongtheorganizations,andthecompaniesthataretryingto
combatthisgrowingthreatareSymantec,Sophos,Malwarebytes,McAfee,AVGTechnologies,
AvastSoftware,Bitdefender(
Reportlinker,2016
).
Despitethenumberofmalwarebeingcreatedforbadintentions,therelevanceofhacking
iscurrentlybecomingintertwinedwiththeactionsofthegovernment.AccordingtoaStanford
LawgraduateandcomputersciencePh.D,JonathanMayer,datahasshownthatboththeFBI
andtheDrugEnforcementAdministrationareincreasinglyresortingtocomputerintrusionsasan
investigativetechnique(
Weiss,2015
).Mayergivesanexampleofhowthegovernmenthas
usedmalwaretohackafifteenyearoldsuspectwhothreatenedtobombhishighschoolnine
times.Theywereabletogetaccesstohispersonalinformationbyplacingafalsearticleofthe
threatsonthesuspectsMySpaceprofilepage.Wheneverheclickedonit,theFBIsentmalware
tohiscomputerinordertoseehisinformation.
Malwarehasopenednewgatewaysfordifferentcontroversiestobecreatedsinceitis
interferingwithlawsandrightsthatwerepasseddecadesbeforetheriseofsoftware.Theactions
oftheFBIandDrugEnforcementdemonstratethis.Althoughthegovernmentwasabletocatcha
previouslyunidentifiedthreatwhocauseddanger,theyfacedscrutinyforviolatingtheFourth
Amendment.TheFourthAmendmentsupportstherightofthepeopletobesecureintheir
persons,houses,papers...againstunreasonablesearchesandseizures,shallnotbeviolated,and
noWarrantsshallissue,butuponprobablecause,supportedbyOathoraffirmation(
Fourth
Amendment
,n.d.).Thegovernmentinthiscasedidnotissueasearchwarrantwheninvestigating
thebombsuspectscomputerwithouthisknowledge.Thispresentsacontroversybetweenthe
newlyformedawarenessofhackingsoftwareversustheConstitution'sAmendmentsthatwere
formedwhenAmericawasformed.

MediaViews:
Themediahasoverallpresentedmalwareinsuchawaythatisscaryandsomethingthat
shouldeitherbeavoidedorremovedatallcosts.Thisoverallpresentationstemsfromthehistory
ofmalwareandhowthisformofsoftwarehasgainednewsattention.Oneofthemostfamous
examplesthatisarchivedisthewidespreadnewsoftheMichelangelovirus.Althoughthevirus
waslaterrevealedthatitwasnotharmful,themediahasusedthisvirusasexampleofthe
reasonswhypeopleshouldfearandchangethewaytheyshouldusecomputers.In1992John
Schneidawind,ajournalistwritesaboutthevirusin
USAToday
,andhisworkdemonstratesthe
primeexamplegrowthoffearanddislikeofmalware.Inhisheadline,Schneidawindfocusesnot

Boyd,Ligon,Tafolla4
onthepotentialpossibilitythattheviruswouldnotharmuserscomputers,buthefocusesonthe
potentialofhowmanycomputerswouldbeaffectedfromthevirus.Schneidawindstatesthatin
theUSA,asmanyas400,000IBMcompatiblePCsarebelievedtobeinfected(
Schneidawind,
1992
).Referringtohowmanycomputerswouldbeaffectedinnumbersisastrategyusedtorise
attentionfromreadersandgivethemspecificreasonsfearmalware.Schneidawindalsopackages
howseriousthreateningvirusesarewiththeRedHerringstrategy.Aninstanceofthisishow
SchneidawindstatesthatmostvirusessimplyslowaPC,flashaquickmessageonitsscreen
anddolittleelsewhileMichelangelovirusdestroysinformationstoredonaPC'sharddisk,
includingtheinstructionsthatletaPCdobasicthingssuchasprintletters(
Schneidawind,
1992
).AlthoughSchneidawindmentionshowmostvirusesarenotharmful,heonlyusesthisas
atooltohelpillustratehowbadvirusesareevolvingintowhichcancausereaders,including
futuremediaworkerstobecomemoreconcernedandwaryoffuturemalware.
Thearticlewrittenfor
USAToday
demonstratedhowthestartingpointofhowthemedia
presentsthestoryofmalwaretothepublic.Today,malwarehasevolvedfrombeingcommonly
knownascomputervirusestosoftwarethatcanpenetratedifferentonlineservicesincluding
socialmedia.Oneofthereasonsthathackerstargetsocialmediaisbecauseofcostefficiency.
AccordingtotheCEOofZeroFox,JamesFoster,
It'sveryinexpensivetoattackacorporation
throughsocialmedia(
Kenealy,2014
).Fosterthengivesanexamplecasewherehecould
essentiallygoonlineandpayjustfiftydollarsforautomatedbotsthatcanattackanorganization
throughtheirsocialmediaaccount.Anotherreasonwhyhackersaimtospreadmalwareonsocial
mediaisbecauseoftheperceivedviewofmalware.Withtheoutdatedperceptionthatmalware
mainlyexistsinemails,socialmediahasbecomeaffectedbyvirusesworldwide.Asurveythat
isbasedontheglobalsocialmediarisksrevealedthatsixtythreepercentfrom4,000
respondentsin12countriessaidthatsocialmediaintheworkplacerepresentsaserioussecurity
risk,however,thesurveyalsoshowsthatthereisonlyatwentyninepercentreporthavingthe
necessarysecuritycontrolsinplacetomitigateit(
Internetsoftwareandservicecompanies,
2011
).Despitethis,socialmediahasnotreceivedtheamountofnegativeattentionincomparison
toMichelangelovirusin1992.Ithasnotbeendiscoverednordiscussedrightawaythatsocial
mediacontainsmalwarethroughfakeaccounts,anddespitetheevidencethatsocialmediahasa
flawincontrollingviruses,themediaandconsumersstilldecidetousesocialmediawithout
muchfear.Thiscreatesanimagethemediahasaclearbiastowardsfavoringblogsitesand
socialnetworksandnotfavoritingthebackgroundofmalware.
Besidesthecaseofhowthemediafavorsservicesabovemalware,thereareexamplesof
howtheystillpresentmalwareasathreattoourdevicessecurity.Therearecountlessarticles
andnewssourcesthatspreadawarenessoftheconsequencesofvirusspreadingandhowtoavoid
havingmalwarestoredinapersonaldeviceorcomputer.Examplesofthisinmoderntimes
includesanarticlebytheUnitedKingdomonlinenewspublisher,TheRegister,thatwarnsthe
publicaboutpickingupmalwareinfestedflashdrivesfoundontheground(
Nicholis,2016
)
.
Accordingtothewriter,theUSBstickscontainHTMLfilesthatcantrackthedeviceslocation

Boyd,Ligon,Tafolla5
oncethepersonplugsintheircomputer.LikewithSchneidawindswritingaboutMichelangelo,
theauthorpresentsthisstorywithaRedHerring.Hestatesthatalthoughthevirusmaybesmall,
thesimplestattacksremainrealisticthreats(
Nicholis,2016
).Thisagaincausesmorepeopleto
becomeawareabouthowtheyusetheirdevicesandhowtheyshouldnottrustthosewhocreate
malicioussoftware.
AnotherexampleisfromareportbySeanGallagherfromArsTechnainwhichhetitles
OK,panicnewlyevolvedransomwareisbadnewsforeveryone.(
Gallagher,2016
).Inthis
report,Gallaghergivesdetailsaboutthetransitionofmalwaretargetingindividualsbecauseof
usingtheInternettomalwaretargetinguserswhohaveofflinefilesstoredintheirdevices.He
supportsthisalreadyunsettlingstatementwiththecaseofhowtenhospitalsinMarylandusing
theMedStarnetworkunderWindowsserverswereunderattackfromagroupcalledSamsam
(
Gallagher,2016
).Gallagherfurtherexplainshowtheattackersmanagedtohackintothe
hospitalsnetworksduetopastexploitsthattheyusedasaguide,andbecauseofthismalwarehe
describesMalwareaslowriskwithanincreasinglyhighyield(
Gallagher,2016
).Gallaghers
writingpresentsseveralaspectshowthemediademonstratesmalwareincurrentstandards.The
firstishistitleofhisonlinearticle.Purposelyplacingthewordspanicandbadnewsfor
everyonewillcatchusersattentionandhavetheconnotationthatmalwareisathreattowardsa
lotofpeople.This,alongwiththenewscoverageofmalwarebeforethe2000s,presentstheidea
thatmalwareisinherentlybad.AlsoGallaghertellingthestoryofhowSamsaminfiltrateda
hospitalnetworkhelpshimillustrateapictureabouttheprogrammersbehindmalwareHospitals
areasensitivetopicsinceitinvolvesthelivesandsafetyofpeople,sobyincludingananecdote
ofhowmalwareisusedtoinfiltratehospitalnetworks,Gallagherpresentshowmalware
programmersarenotgoodpeople.
Thereareotherarticlesthathavenegativedictiontowardsmalware.Inanarticle
publishedonInfoWorldthatdiscussesaboutwhyusersdecidetouseadblock,theauthorwrites
thatuserswanttoprotectthemselvesfromannoyingmalware(
Lynch,2016
).Although
wordingmalwareasannoyingdoesnotgivetheconnotationthatisdangerous,suchashow
otherreporterspresentthisissue,theauthorofthisarticlepresentshowthesoftwareisalso
perceivedculturally.Advertisingthroughouthistory,includingdoortodoorsalesmenand
telemarketers,hashadareputationofbeingannoying.Associatingmalwarewithadvertising
wouldthenpresentitinanotherbadform.Anotherinstanceofhowthemediapresentsmalware
isatthewebsite,BGR.BradReed,theauthorofthearticlediscussesthatthereasonthateventhe
FBIplacestapeontheirlaptopcamerasisbecauseofhowhackersareabletousearemote
accesstrojantoinfiltratetheircomputerandrecordconversationsandvideo(
Reed,2016
).Reed
notonlydemonstratesthatmalwarecouldbeusedtospyonusers,heusestheFBIinhisstoryto
helpinfluencepeopletofearvirusesmore.BymentioningofhoweventheFBIplacestapeon
theirlaptopcamerastoprotecttheirprivacy,Reedisconvincingmoreuserstothatmalware
takesawayprivacy.Fromtheexamplesgiven,fromhowmalwareisusedtosocialmediatohow

Boyd,Ligon,Tafolla6
itisusedtohackthroughUSBsticksandcomputernetworks,itisevidenttohowthemedia
presentsnegativeviewstowardsmalware.

OtherViews:
Besidesthemedia,thereareothergroupswhoareconcernedwiththeuseofmalware.
Companiesdirectlyaffectedbymalwarearevirusprotectionprogrammingfirms.Protecting
informationfrombusinesses,corporations,andcommonusersareprioritiesforantivirus
companies.SeungHyunKimandByungChoKimwriteintheirarticle,
DifferentialEffectsof
PriorExperienceontheMalwareResolutionProcess
,thatantivirusfirmstakeintoaccounthow
computervirusesareaseriousconcerntowardsthesecurityoforganizations.Asurvey
conductedbytheComputerScienceInstitute(CSI)showsthat49%ofbusinessesareaffectedby
virusattacksandthat44%ofvirusescontributedtoinsiderabuse.(
Kim,2014
).Thefearofhow
deadlyaviruscouldbeisalsoamainconcernformodernvirusprotectioncompanies.Seungand
ByungKimalsodiscusshowvirusesthemselvesareavitalconcerntowardstheintegrityofvirus
protectionfirmsbecausemalwareisevolvingandbecomingmorecomplicated,unpredictable,
anddestructive(
Kim,2014
).TheNewYorkTimesevenstatesthatmalicioussoftwareisbeing
revisedtobecomemoreresistanttoantivirussoftwareimpactandfrequency(
Kim,2014
).
Before1992,antivirusfirmswerebeginningtocounteractvirusesthatattemptedtohide
fromdetectionthroughencryption.However,whenthefirstpolymorphicvirus1992spread
acrossmanypersonalcomputers,anumberoffirmswerenotabletocounteractthemalware
sinceitwasthefirstpolymorphicvirus(
Grimes,2015
).Thismeantthatthesoftwarewasableto
changeindifferentconditionswhichmadeitmoredifficultforfirmstoeasilydetectthevirus.
Thischangedtheattitudestowardsvirusprotectioncompanies.Anumberoffirmsthatthought
theycouldprotectuserinformationbecameoverwhelmedwiththegrowingevolutionofvirus,
andasaresult,theycloseddown.(
Grimes,2015
).Despiteseveralantiviruscompaniesbeing
negativelyaffectedbymalware,theMichelangelovirusprovidedthesuccessandconcernsfor
futureantiviruscompanies.JohnMcAfee,founderoftheMcAfeeantivirussoftware,gave
insighttowhatthoughtthewidescaleeffectsofthisvirus,andhetoldthemediathatfive
millionPCsaroundtheworldcouldbewipedoutbytheMichelangelovirus(
Cluley,2012
).
Theseriousnessofhowmalwareischangingandbecomingmoreresistanttowardsanti
virussoftwarehasresultedinthepublictrustincompaniesthatpromisetosolvetheproblems
malwarecauses.AccordingtotheCSI,98%ofusershaveanantivirussoftwareinstalledontheir
computer(
Kim,2014
).Workersinsoftwaresecurity,suchasJohnMcAfee,alsousetheir
experienceandknowledgewithvirusestohelpinfluencethepublicthatmalwareisconcerning.
McAfeeswarningabouttheimpactoftheMichelangelovirusmadethepublicbelievehow
seriousviruseswere.Antivirusblogwriter,GrahamCluley,statesthatm
anypeoplestillhadnt
encounteredcomputerviruses,andtherewerestillplentyofpeoplewhoconsideredmalware(as
itwasntthentermed)tobeanurbanmythandnotrunningantivirussoftwareontheir
PCs.(
Cluley,2012
).Sowhenthepublicheardaboutapotentialwidespreadvirusthreatening

Boyd,Ligon,Tafolla7
theircomputers,theyturnedtoantivirussoftwarefirmsforhelp.Sowzithinthesameyearthat
theviruswasreleased,McAfeewasfoundedandraised$42millioninaninitialpublicstock
offering(
Cluley,2012
).Ultimately,theMichelangelovirusdidnotaffecteventhecloseamount
ofcomputersMcAfeepredicted.Thisresultedinadisagreementtowardstheviewsofantivirus
firmsandthepublicandmedia.Thepublicviewedantivirusfirmsofutilizingthemediato
createpanictowardscommonusersandcorporationsinordertogainasignificantamountof
profitandnottohelpoutusersandcompanies.
AntivirusfirmsalsousetheInternetasasourcetopromotetheirproducts,andthereare
blogsthathelpuserstostrayawayfromsuspiciousprograms.Antivirusfirmsareusingthe
internettohelpdistributemoreaffordablewaysofprotectingusersfromvirusesintheformof
onlineplugins.Alsofirms,suchas,Norton,andAvira,allhavesocialmediaaccountstoreach
outtousers.Postsuploadedonthewebsitesdemonstratethecompaniesviewstowardsmalware
andhacking.Forexample,onNortonsFacebookandTwitteraccount,theirhomepageisfilled
withimagesandlinksthatinformuserstherisksofvisitingvulnerablewebsitesandtouninstall
programssuchasQuicktimeonWindows(
Norton
,n.d.).McAfeeandIntelarealsoworking
togethertohelpinformusersabouthowcybercriminalstargetsocialmedia(
How
Cybercriminals
,n.d.).Thesewebsitehelpreinforcethecompaniesviewstowardsvirusesto
commonuses,anditprovestobeeffectivesincethereisalargeuserfollowing.Anexampleof
thisisonFacebookBothNortonandAviriahaveoveronemillionfollowers(
Avira
,n.d.).

EthicalPerspectives:

EgoismorSelfinterest

Fortheuseofmalware,therearedifferentethicalframeworksthatallowtheuseof
hackingtobeviewedfromdifferentperspectives.Oneoftheseframeworksisegoism.Theterm
ethicalhackerreferstosomeonewhohasknowledgeaboutcomputers,internet,system
vulnerabilities,andsoon.Ethicalhackingmayseemlikeanoxymoron,butitisanactual
practiceinmanyorganizations.Hackersarehiredtotesthowsecureasystemisbytryingto
breakintoit.Theymayusesoftwaresuchasmalwaretoachievethisgoal,inordertofool
someonewhichwouldthenprovidethemwithapointofentry.ChuckDavis,aHarrisburg
UniversityofScienceandTechnologycorporatefacultymember,isanadvocateforethical
hackingandeventeachesthissubjectathisuniversity.Inthearticle,Davissaysthatthereisa
demandforethicalhackersasmediumtosmallcompaniesdonothavethepersonneltomake
suretheirsystemissecure,therefore,theyhireethicalhackerswhodoapenetrationtest,which
iswhentheytrytohacktheirwayintothesystem(Burkey,2013).Forbusinessestoallowthese
ethicalhackerstohaveanycontactwiththeirsystemsmustrequireanenormousamountoftrust,
asyoudonotknowiftheymayturnagainstwhattheyarecontractedtodo.Thisallcorrelates
withselfinterestsincecompaniesneedtoknowandactuallyusemalwaretoprotecttheir

Boyd,Ligon,Tafolla8
companyfrompeoplewhodointendtoharmthem.Withoutthis,theircompanycanbe
susceptibletofail.

Deontologicalideas
Anotherideologythatconnectstomalwareisdeontology.Deontologyisanethicaltheory
inwhichthatthevalueofactionsliesmoreinmotivesthaninconsequences
(EthicsTerms,
2005)
.Thedeontologicalstanceofethicscanbeappliedtowardstheuseofmalwaresincethere
areinstancesinwhichpartieshaveusedthesoftware,whichhasahistoryofallowingcriminals
andindividualstostealinformation,toactuallyprotectusers.InanarticleonNewsRepublic,
JackGoldsmithexpandsonthisissuebydiscussingtheargumentsonhowthegovernment
shouldimplement

masswarehousingofeveryonesdata
andtheuseofbackdoorstobreak
encryptedcommunications(TheEditorial,2013).Goldsmithgoesfurtherintothisinwhichhe
explainshowin2013,theNewYorkTimesfacedamaliciousexternalattackonitsdomain
andthattenmonthsprior,thecompanyhadtheiremployeeinformationstolen.TheNewYork
TimeslaterreceivedhelpfromtheFBI,andtheorganizationwasabletopinpointtheoriginsof
thehackattackswerefromChinesemilitants(Goldsmith,2013).DespitehowtheuseofUnited
StatesgovernmentmalwarepotentiallytakesawaytheprivacyofmanyAmericancitizens,the
NSAarguesthattheintentionsofusingmalwareandbackdooraccesstodevicesistohelpusers
informationsafe.Goldsmithwrites,thatthegovernmentwilleventuallyneedtomonitorand
collectintelligencesimilartohowtheyhavehelpedtheNewYorkTimesinordertocounteract
cyberterrorism(Goldsmith,2013).Thisstancecontradictsthebiasesthemediacreatesandthe
generaluseofmalwarethatantiviruscompaniesspread.Althoughthegovernmentisusinga
toolthathashadareputationofwrongdoing,theNSAisarguingthatmonitoringinformationin
ordertohelpaidandprotectpeopleandorganizationsfromthosewhodousemalwareforselfish
intentions.

Confidentialideas
Anotherethicalframeworkthatcorrelateswiththediscussionofhowmalwarecouldbe
usedforthebenefitofusersandcompaniesisconfidentiality.Confidentialitydoesnot
necessarilymeantonotmonitororlookatinformation.AccordingtotheLaSalleUniversity,
confidentialityisprinciplethatoneshouldkeepone'spromisesaboutinformation
(re)disclosureandthatisasubsetofdutiesoffidelity(EthicsTerms,2005).Withthis
reasoning,theviewsofthatusingmalwareisalwaysbadisinquestion.Viewingmalwarefroma
deontologicalstandpointallowsmalwaretobeseenasatooltohelppreventcybercrimefrom
institutionssuchastheNSA.Thedefinitionofconfidentialitywouldhelpargueagainstthe
biasestowardsmalwaresinceitavoidsaskingifusingmalwareisalwaysbad,anditquestions
whoisusingmalware.Throughoutthehistoryofmalware,differentindividualsliketheDark
Avengerorahighschoolfreshman,
RichardSkrenta,haveusedmalwaretohelpsteal
informationand,theyhelpedinfluencehowmalwareiscreated(
Grimes,2015
).These

Boyd,Ligon,Tafolla9
individuals,fromtheperspectiveoftodaystechnologyconsumerswouldnottrustleaving
informationwiththesepeoplesincetheygainedthereputationofcreatingmalwarefordangerous
purposes.WhenitcomeswiththeUnitedStatesgovernmentimplementingbackdoorentrances
totheirinformation,peoplemighthaveinitialfeelingsofdistrust.AccordingtoJackGoldsmith,
peopledonotmistrusttheNSAbecauseofwhattheydo,butbecauseof
itsextraordinary
secrecy(Goldsmith,2013).However,incomparisontowardsterroristsandcybercriminals,
Americansarewillingtotrustthegovernmentintimesofdanger.Primeexamplesincludethe
tragedyofPearlHarborandtheSeptember11terroristattacks.Withtheconfidentialframework,
itcanbepossibleforthepublictotrustthegovernmenttohelpprotectthemselvesdigitally
throughtheuseofmalwareandmonitorization.

Discussions:
Questions:
ITProfessionals
YouareanITProfessionalatAmazon,andyouareapartofthesoftware
developmentteam.Yourdevelopmentteamiscominginyourofficetoooften
sincetheyarereportingmanybugsandglitchesinAmazonssoftware.Isit
ethicallyresponsibleforyoutohiremalwareexpertstoprovideabackdoorand
helpsolvethisproblem?
Citizen
Asacitizenwouldyoudemandtobenotifiedwhenyourinformationmightbeat
riskbecauseofthegovernmentdoingcertainthingsfortherightreasons?Ex:
http://www.cnet.com/au/news/werefightinganinvisiblewarincyberspace/
PolicyMakers
Asapolicymaker,youhavejoinedadomesticintelligencecommittee.Youhave
learnedthatgovernmentcreatedmalwarehasbeenharvestingdatamostlyfrom
innocentcitizens.Doyouhaveanethicalresponsibilitytocreatepolicythatbans
theusage?Evenifitmeansincreasingthepossibilityofnotknowingwhat
terroristgroupsaredoing.
Answers:
AC:
1. Itisnotethicaltohiremalwareexperts.Thesebugsshouldbefixedwithinthecompany
bythedevelopers.
2. YesIwoulddemandtobenotifiedwhensuchthingshappen,especiallyifitisimportant
informationthatpersonallyidentifiesme.
3. Ithinkthatinthiscaseitisokayifandonlyiftheyareonlyusingittotracksuspicious
activity,otherwiseitisnot.
JD:

Boyd,Ligon,Tafolla10
1. Ibelievethatitisnotethicallyresponsibletohiremalwareexpertssothattheycanhelp
withthebugsandglitches.Helpshouldbeseekedfromothersoftwareengineersfrom
withinthecompany.Havingmalwareexpertsanalyzeacompany'scodecanhelpthem
makebettermalwaretoattackthecompany.
2. Asacitizen,Iwoulddemandtobenotifiedwhenmyinformationmightbeatriskinany
situation.Itismypersonalinformationandthereforebenotified.Itisnotacompanysor
government'sdecisiontorisktheinformationofitspeople.Iftheyputitatriskthenthey
shouldnotifytheircitizens.
3. IthinkIhavetheethicalresponsibilitytocreatepoliciesthatpreventtheusageofthe
harvesteddataagainstcriminalsthatarenotterroristsinthisscenario.Ifthemalware
harvestsdatatotrackterroristsandpreventdisasterstosavealotoflivesthenitis
somethingworthkeeping.Although,thedatashouldonlybeusedagainstterroristsifthat
istheoriginalintentionofusingthemalware.
CG:
1.Ithinkitisveryunethicaltohiremalwareexpertstohelpfixbugsinthecompany
codeandspeciallyifitisareallybigcompanythatreliesonsoftwaretomakethem
money.Itshowsthatthedevelopersinthecompanyarenotdoingtheirjobcorrectlyif
theydeployverybuggycode.
2.IbelievethatasacitizenoftheUnitedStatesofAmerica,Ihavetherighttoknow
whenthegovernmentthatismeanttoprotectandserveitscitizensisdoingthesetypeof
things.Itseemsliketheythinktheyarebetterthanthecitizensbuttheyforgetthatitus
whoelectthem.
3.Ithinkthistypeofsurveillanceshouldbeallowedaslongasnodataiskeptbesides
possibleterroristdata.Imeananyonecanpossiblybeaterrorist,butnoteveryoneis.
BH:
1. Itwouldnotbeethicallyresponsibletohiremalwareexpertsbecausetheywouldhelp
identifymorebugsandglitchesintheAmazonprograms.Although,theAmazon
employeedoesanethicalresponsibilitytosharetheissuestheteamhasexpressedwith
theSoftwareDevelopmentManager.Fromthatpoint,themanagerwouldseekout
internalorexternallabortoresolvetheissue.
2. Iwoulddemandtobeinformedifthecompanyhadevidencethatthegovernmentwas
miningthecompanysdatafortherightreasons.Governmentshouldonlybeallowedto
retrievethedatafromusersthatareunderprobablecausewithawarrant.Asapossible
action,thecompanyshouldprovidetheoptiontohaveonesdataanonymizedinsucha
occasion.
3. Yes.ThiswasthesameissuetheFBIranintowhenittriedtocompelAppleIncto
unlocktheiPhoneofthegunmanintheSanBernardinoshootingcase.Thefocalpointof
thisprivacyissueiswhetherthegovernmentshouldrisktheprivacyofthemassesinthe
hopesofpreventingfutureterroristattacks.

Boyd,Ligon,Tafolla11
MH:
1. ItwouldnotbeethicalforAmazontohiremalwareexperts.Ithinkthatiftheyweretodo
that,theywouldonlyallowmalwareexpertstobecomemoreexperiencedwiththeir
software.
2. Yes,acitizen/usershouldbeabletoanddemandtobenotifiedwhentheirinformationis
atriskthisshouldbeoneoftheirrights.However,theusersknowingwillnotdomuch
ofadifference,itsnotliketheuserscangoandfixthesystem.Maybeonlymorechaos
willresult.
3. Ethicallyspeaking,thepolicymakersshouldcreatelawsthatpreventsthisfrom
happening.However,Ithinkthatifpeoplearegoingtobesaferifthisdataiscollected,
thengoaheadandcollectit,butatleastsomeauthorityfigureshouldbeawareofthis.
MR:
1. ItisthedevelopersandtheQAteamsresponsibilitytofixthesebugs.Fixingitwithin
thesamecompanycanpreventpotentialthreatstothecompany.
2. Iwoulddefinitelywanttobenotifiedifmyinformationmightbeatriskevenifitisfor
therightreasons.IwouldwanttobenotifiedsothatatleastIcantakethenecessary
precautionstoprotectmyselfbychangingmypasswords,etc...
3. Thiskindofinformationisalwaysgoingtobeusedbythegovernmentnomatterwhat.If
thisinformationthattheyalreadyhaveandaregoingtokeephavingwellthenthey
shouldatleastuseittohuntdownpotentialterrorists.Idontthinkanyonehastheethical
responsibilitytopreventsuchactsfromthegovernmentsinceweallseemtobe
vulnerabletotheiractsregardless.
MTF:
1. Inmyexperienceinbeingadeveloper,IhavelearnedthatIambothacoderand
debugger.Withthat,Ithinktheyshouldberesponsibletodoitthemselvesratherthan
hireateam.
2. Yes,transparencyisthemostimportantpartofknowingourstandingswithourpersonal
information
3. Idontbelievethatapolicymakerhastheethicalresponsibilitytocreatepoliciestoban
theusage,becausetheproblemthatcanoccurisyouorthepeople.Thecareeryourein
isgoingtohaveproblems,butespeciallywithinagovernmentsystem.Youllenduplike
snowden.
SummaryofAnswers:
Afterreviewingtheresponsesthatourpeerwrote,weconcludedthatthereisasame
patternthatisrepeatedthroughoutalloftheiranswers.Allofourpeersagreedthatcompanies
shouldnothireprofessionalmalwarehackers,thatthecompaniesshouldfixitsownbugswith
qualityassuranceandsoftwareengineerteams,andthatthegovernmentshouldnotusemalware
tomonitortheircitizens.Insteadthegovernmentshouldcreatepoliciesthatbanspyware,andthe
governmentshouldinformitscitizensthatwhateverinformationtheygathercouldpotentiallybe

Boyd,Ligon,Tafolla12
atrisk.Webelievethattheanswersweresimilarbecauseourpeersvalueprivacyand
demonstratethattheyholdthesameopinionssharedbythemediaandpublicinregardsto
malware.

FutureChallenges:
Theworldhasfacedwithproblemsandpotentialsolutionswithmalware.Anddespite
boththepositiveandnegativeaspectsofthisformofsoftware,anumberofsourcesdescribethe
futureofmalwareimplementationwithanonfavorablemanner.Currentlytherearenostatistics
thatdemonstratewhatcouldhappenfiveyears,adecade,orhalfacenturyfromnow.However,
therearepatternsofhowmalwarehascausedmoretroublewithinthespanoftheseyearslisted
thathelpillustrateitsfuturepossibilities.
In2011,DavidHarley,thenationalvirusmanagementtechnicalleadoftheNHS,
discusseshispredictionsofthedifferentformsmalwarecouldbeutilizedunder.Harleydescribes
howtherearecurrentlymalwarethatonlyexistsassoftware,malwarethatisfoundinsocial
engineering,andfinally,ahybridformthatusesbothsoftwareandsocialengineering.Harley
statesthatoutofthethreeformsofmalware,thehybridisexpectedtogrow.Henotably
describesthatwe'llseemoreattemptsatmultiplatformattacks(
Harley,n.d.
).Continuingwith
thisstatement,Harleydescribeshowvirussoftwarewouldnotnecessarilyexisttoworkunder
multipleoperatingsystems,buthebelievesthatbadsoftwarethatisdesignedasWindowsfile
canhavepropertiesthatcanpenetrateLinuxsystems.Harleyexpectsthatmorewormsand
virusesthatusespamtechniqueswouldexistwiththehelpofsocialmedia.
Asmentionedpreviously,therearepatternsthatdemonstratehowmalwarewould
becomemoreproblematicwithinfive,ten,andfiftyyearsfromnow.Basedoffofdate,themost
popularoperatingsystem,bothWindowsandMac,wouldfacemorecommonandevolving
malwarefiveyearsinthefuture.Thistheoryisevidentshownfromacybersecurityreportfrom
Bit9+CarbonBlackThreatResearchteamaboutApplecomputers.TheirdatashowshowOSX
computershavebeenaffected,andthroughresearch,itwasdiscoveredthatin2015alone,the
researchfound,thenumberofOSXmalwaresampleshasbeenfivetimesgreaterthanin2010,
2011,2012,2013,and2014combined"(Vence,2011).Hackersarediscoveringapatterninthe
amountofsalesApplehastowardstheircomputers,andbecauseofApplesgrowingpopularity,
theyaretargetingOSXvulnerabilities.ThisisalsobecauseofhowAppleproductshaveentered
inenterprisebusinesses,sohackershavetheincentivetousemalwareonOSXmachinesin
ordertogainaccesstocompanyinformation.
Fromtheperspectiveofmalwarewithinatenyearspan,malwareisexpectedtogrow
morethreateningnotjustfromthesoftwareitselfbutfromthepeoplebehindit.RogerA.Grimes
ofInfoWorldstudiedtheamountofmalwareattacksduringthestartofhistenyearcareerathis
company.AndaccordingtoGrimes,therearefarmoremaliciousattackstodaythantherewere
10yearsago(
Tweedie,2015
).Thefirstreasonthatcontributestothisfactishowpeoplewho
createmalwarearechanging.Grimesdiscusseshowbefore,almostallthreatsweremalware

Boyd,Ligon,Tafolla13
programs(viruses,worms,andTrojans)writtenbyadolescentmalepranksters,andalthoughthe
virusescausedrealharmtowardsothers,mostofthemalwarebackthensimplyannoyed
people(
Tweedie,2015
).Withintenyears,hackershavebecomeintomoreprofessionalized
groupsthatendupmakinguptomillionsofdollarsthroughmanipulatingcorporationsandhome
userswithoutbeingchargedorcaught.Otherpatternsthatalsodemonstratethisishowaccording
toGrimes,therehavebeenover100millioncreditcardthathavebeencompromisedandhow
advancedpersistentthreatsareworkingwithforeigngovernmentstostealprivateinformation,
suchasemailsanddocuments.
Thefutureofmalwareisalsotargetingmorethanjustpersonalcomputers.Malwareis
nowevolvingtoattackdifferentformsoftechnologysuchasmobiledevices,cloudcomputing,
virtualmachines,autonomouscars,andinternetofthings.DaveMarcus,thedirectorofsecurity
researchatMcAfee,mentionthattheevolutionofmalwareisacceleratingrapidly,andfar
outstrippingtherateofgrowthinthe(much)largerpopulationofPCmalware(
Present,2013
).
Asmentioned,malwareprogrammersareutilizingsocialengineeringtotargetusersbasedon
theirinterests.Creditcardinformationisoneofthemaininformationmalwareengineerstryto
obtain.Examplesofhowtheytrytoaccessapersonscreditcardisbydisguisingthemselvesas
websitesthatrequireuserstosignupandenterinpaymentinformation,suchaspornographic
websitesandonlinecharitableorganizations(
Grimes,2016
).Anotherformofsocialengineering
thatwouldincreaseinthefutureistheuseofmalwareattacksknownaswhaling.Phishingis
knowntoattackrandomuserssecurityandgetinformation,andwhalingisaformofmalware
attackthatrepeatedlytargetsspecificuserswithcontentthatluresthemintogivingtheir
information(
Vance,2011
).Governmentauthoritiesinthefuturearealsoimplementingmalware
totheircitizens.TheGermangovernment,forexample,isplanningonimplementingTrojan
virusesthathavetheabilitytospyoncitizenseventhroughtheircellulardevices.TheUnited
KingdomalsoholdsamalwarecompanycalledFinFisherwhichisutilizedfromthegovernment
tospyonpotentialpoliticalcriticsoftheirvariousregimes(
Marczak,2009
).TheUnited
StatesFBIhasalsobeenapartofthepatternofusingmalwaretohelpbypasstheintegrityof
thecompany,Tor(O'Niell,2016).
ThecommonpatternthatHarleyandGrimesdemonstrateishowhackersaretargeting
largersumsofmoneythroughprofessionalmeans,suchasreceivinginformationthroughsocial
media.Andwhilemalwareissuccessfullybreachingoperatingsystems,likeOSX,whichis
knownforlackofviruses,therearesolutionsthatcanhelpmitigatethethreatsofmalware.One
ofthemostimportantsolutionsthatGrimesandStevenTweediefromBusinessInsiderofferisto
nolongerassumethatanyprogramofsystemcannotbeattackedbyviruses.Beingawarethat
anysystemissusceptibleofmalwareattacksallowsuserstobecomemoreawareofhow
malwareisevolving,anditisthefirststeptotrulyprotectyoursystem.Grimesstatesthatonce
peopleadmitthattheirsystemcanbecompromised,newdefensestrategiescanbeimplemented.
Soitisbeneficialforalluserstoinstallthecorrectantivirussoftwareeveniftheircomputer
alreadycomeswithabackgroundviruscheck.

Boyd,Ligon,Tafolla14
Theothersolutiontothegrowingthreatsofmalwareisforantiviruscompaniesto
improvetheirdetectionandprotocols.Somepeoplebelievethatthesolutionthegrowingthreat
ofmalwareistoimplementnewtechnologyredefinevirusprotection.Onesuggestiondiscusses
theuseofdevicessuchashoneypotsandnetworksniffers,whichwerecalledtheVirus
MonitoringDevices(VMD)tohelpcombatvirusesthatexistonthecloud.Companiesarealso
currentlypracticingthisthroughimprovedbreachdetectiontools(MalwareDefense,2014).
Thesetoolsnotonlymonitorobviousmaliciousactivities,buttheyalsomonitoranyactivitythat
areoutofcharacter.Comparedwith10yearsago,thesebreachdetectiontoolshavethe
capabilitytostillmanagecompanynetworksevenwhenthereisabreach.Overall,computers
andpersonaldeviceswillcontinuetofacecyberattacks(Vence,2011),butifcompaniesand
usersbecomemoreawareofhowvirusesarechangingandhoweverydeviceissusceptiblein
attacks,therewillbesolutionstohelpcounteractmalwareandkeepinformationsafe.

OurReflections:
SimoneBoyd
Althoughmalwarehasbeendepictedassomethingthatcanonlybeusedforbad,anditis
usedforillintentions.Itisnecessaryinthefieldofsecurityinordertotesttheeffectivenessof
variousservices.Ibelievethebestdefenseistoknowabouttheoffense,andinthecaseof
malware,itisevenmoresonecessarytoknowwhattypeofsoftwareisbeingdevelopedandin
whatwayitcanbedeployed.Evengovernmentshavebeenusingmalwaretodoharmtoothers,
butinsomesituationswhenthegovernmentdoesusemalwareitisforknowledgeandnotto
harmanyone.Inordertoprotectagainstanyimpendingattacks,thegovernmentmustbeableto
tracethesourcewhichmayrequiretheuseofmalware.Itisasafewaytosnooponother
countriesinordertodetermineiftherewillbeanyplannedattacks,asinrecentnewstherehave
beenthreatsmadeagainsttheUnitedStatesaboutnuclearattacks.Inthecaseofwar,Ithinkthat
malwareisamuchbetterdefensethansendingpeopletofindinformation,itcansavemany
lives,astheoutcomeofbeingcaughtasaspymightresultindeath.FromtheresearchIhave
doneanddiscussionsIhavehadwithmyteammates,Ibelievethatmalwareisonlyharmfulif
thepersonbehindthemalwarehasillintentions.

ScottLigon
Inourresearch,themediaandmanysourcesdescribedmalwareasadangerousor
threateningsoftware,Ididmanagetofindsomeinstancesinwhichpeoplearguehowmalware
canbeneededandhowitcouldbeusedtohelppreventcrime.Becauseofthis,Istillseethe
dangerousaffectsofhowpeopleusemalicioussoftware.Butatthesametime,Ibelievethatit
shouldnotbeentirelyridof.Ibelievethatsecurityfirmsshouldstillupgradetheirdepartmentin
ordertomeetthestandardsofalreadyevolvingmalware.Therearemanyorganizationswhowill
continuetoutilizemalwareindestructivewaysinordertogetspecialaccesstodifferent
information.

Boyd,Ligon,Tafolla15
However,Ialsorecommendthepublicthatusingmalwareisnotalwaysdangerousor
wrong.Companiesneedtohirehackersinordertoseethepotentialsecurityflawsintheir
software,network,ordatastructure.Withouttheuseofhiredmalwareprogrammers,companies
mightnotbeabletosurviveiftheyareattackedfromdeadlysecuritybreaches.Aradicalchange
thatcouldbeimplementedishavingthegovernmenthavebackdooraccesstoourdevicesin
ordertotrackpeoplewhoplanonusingmalwareforharmfulpurposes.Thismightinterferewith
somepoliticalbeliefsofhowthegovernmentshouldnothavemonitoringcontrolofourpersonal
devices,butatleastdiscussingaboutthisissuewouldhelpbringgreaterawarenessofhow
malwareisevolvingandhowitcouldbeusedinmorewaysotherthanharmingusers.

KarenTafolla
Researchingaboutthehistoryofmalwaremademerealizethatthissoftwarecanbeused
fornationalsecurity.Unfortunately,duetothenegativeconnotationofthenameandthehistory
behindthesoftware,themediaandothersourcesviewmalwareasathreatthatshouldalwaysbe
avoided.Beforeresearchingaboutthistopic,IdidnotknowthatcountriessuchastheUnited
StatesandGermanyhavedevelopeddifferenttypesofmalware,includingspywareandservices
tobreachcompanysecurity,inordertohavesurveillanceoveralltheircitizens.Iwasalso
unawareofthenewformsthatmalwarehastaken.Thehackersthatusemalwaretoharmothers
havebeentransformingthissoftwareintodifferentundetectablesocialmediapages,phoneapps,
emails,advertisements,andcomputerprograms.Imconcernedwiththerapidevolutionof
malwareandnewerformsoftechnologybecausevirusprotectioncompanieswouldbe
susceptibletofallbehindprotectingusers.
Thetransitiontonewertechnology,includingcloudcomputing,InternetofThings,
autonomouscars,andvirtualreality,peopleororganizationcouldbeexposedtoevolved
malware.Forexample,patientswhousevirtualrealityforrehabilitationcouldbeatriskofbeing
intrudedwithadvertizingwhileintreatment.Theeaseofconnectivitythrougheverydevice
wouldmakemalwareeasiertoimplement,possiblyhavingmoreattacks.Iunderstandthatthe
governmentcouldusethistostopterrorismanduseittospyontheircitizens,butweshould
thinkofthegreatergoodforthegreatestamountofpeople.Becauseofthis,Ibelievethatthe
governmentshouldhavepoliciesthatstopthistechnologyfromevolvingandgovernment
officialsshouldworkatimplementingbettertechnologyforthemselvestohelpstopcyber
threats.ThisdoesnotmeanthattheyshouldspyonpeopleororganizationsatfreewillThe
governmentshouldinformanyonethattheyseekinformationfromthattheyaregoingsearch
theirdevicessystem.Technologyisevolvingtobecomeapartofourmentalandphysicaldaily
living,soitisimportanttostoporganizationsthatplantopenetratethesetechnologies.

Boyd,Ligon,Tafolla16
References

Avira.(n.d.).InFacebook[Product/Servicepage].Retrievedfrom
http://www.facebook.com/avira

Burkey,B.(2013).Sometimeshackingisnotanegativething,saysethicalhackinginstructor.
CentralPennBusinessJournal,29(18),2122.Retrievedfrom
http://search.proquest.com
/docview/1365989123?accountid=10355

Cluley,G.(2012,March05).MemoriesoftheMichelangelovirus.RetrievedMay15,2016,
from

https://nakedsecurity.sophos.com/2012/03/05/michelangelovirus/

FourthAmendment.(n.d.).RetrievedMay15,2016,from
https://www.law.cornell.edu/wex/fourth_amendment

EthicsTermsandTerminology.(2005).Retrievedfromhttp://www.lasalle.edu/~price/Hon365
ethicsterms.htm

Gallagher,S.(2016,April08).OK,panicnewlyevolvedransomwareisbadnewsfor
everyone.
RetrievedMay15,2016,from

http://arstechnica.com/security/2016/04/okpanicnewly
evolvedransomwareisbadnewsforeveryone/

Goldsmith,J.(n.d.).WeNeedanInvasiveNSA.RetrievedMay01,2016,from
https://newrepublic.com/article/115002/invasivensawillprotectuscyberattacks

Grimes,R.(2005).Maturemalwarewantstotalcontrol.InfoWorld,27(39),29.Retrievedfrom
http://search.proquest.com/docview/194350390?accountid=10355

Grimes,R.A.(2015,August18).10yearson:5bigchangestocomputersecurity.Retrieved
from
http://www.infoworld.com/article/2972020/security/10years5bigchangesto
computersecurity.html

Harley,D.(n.d.).Predictingthefutureofmalwareandtomorrow'smaliciouscode.Retrieved
from
http://searchsecurity.techtarget.com/feature/Predictingthefutureof
malwareandtomorrowsmaliciouscode

HowCybercriminalsTargetSocialMediaAccounts.(n.d.).RetrievedMay15,2016,from

Boyd,Ligon,Tafolla17
http://www.mcafee.com/us/securityawareness/articles/howcybercriminalstargetsocial
m
ediaaccounts.aspx

Internetsoftwareandservicecompaniesglobalsurvey:Malwareattacksupbecauseofsocial
mediaorganizationslaggingonproperprotection.(2011).ChinaBusinessNewsweekly,,
163.Retrievedfrom

http://search.proquest.com/docview/897452138?accountid=10355

Kim,S.H.,&Kim,B.C.(2014,September/October).Retrievedfrom
http://aisel.aisnet.org/cgi/viewcontent.cgi?article=3187&context=misq

Kenealy,B.(2014).Socialmediaprovidesrouteformalwareattacks.BusinessInsurance,48(8),
18.Retrievedfrom

http://search.proquest.com/docview/1517093431?accountid=10355

Lynch,J.(2016,March30).Whyaresomanypeopleusingadblockers?Retrievedfrom
http://www.infoworld.com/article/3049655/android/whyaresomanypeopleusingadbl
ockers.html

MalwareDefenseforTodayandtheFuture.(2014)eqinc[Datafile].Retrievedfrom
http://eqinc.com/images/whitepapers/malwaredefensefortodayandthefuturewhitepp
er.pdf

Marczak,B.,ScottRailton,J.,&Senft,A.(2015,October15).MappingFinFisher'sContinuing
Proliferation.Retrievedfrom

https://citizenlab.org/2015/10/mappingfinfishers
continuingproliferation/

Nicholis,S.(2016,April11).HalfofpeoplepluginUSBdrivestheyfindintheparkinglot.
Retrievedfromhttp://www.theregister.co.uk/2016/04/11/half_plug_in_found_drives/

Norton.(n.d.).InFacebook[Product/Servicepage].Retrievedfrom
http://www.facebook.com/Norton

O'Niell,P.H.(2016,April27).FormerTordevelopercreatedmalwarefortheFBItohackTor
users.Retrievedfrom

http://www.dailydot.com/politics/governmentcontracto
r
tormalware/

Present,P.(2013,February28).MalwaresFutureLooksALotLikeItsPresent.Retrievedfrom
https://securityledger.com/2013/02/whatwillmalwarelooklikeinafewyears/

Boyd,Ligon,Tafolla18
Reed,B.(2016,April12).So,whoelseputstapeovertheirlaptopswebcam?RetrievedMay15,
2016,fromhttp://bgr.com/2016/04/12/shouldiputtapeonmylaptopcamera/

Reportlinker.(2016,February10).MobileAntiMalwareMarketbyOperatingSystem,by
OrganizationSize,byVerticalandbyRegionGlobalForecastto2020.RetrievedMay
15,2016,from
http://www.prnewswire.com/newsreleases/mobileantimalwaremarket
byoperatingsystembyorganizationsizebyverticalandbyregionglobalforecastto

2020300218323.html

Schneidawind,J.(1992,Mar04).Themichelangelovirus//thousandsofPCscouldcrashfriday.
USATODAY(Pre1997Fulltext)Retrievedfrom
http://search.proquest.com/docview/306495570?accountid=10355

TheEditorialBoard.(2013,October10).CongressCanStopPrivacyAbuse.Retrievedfrom
http://www.nytimes.com/2013/06/08/opinion/congresscanstopprivacyabuse.html?_r=0

Tweedie,S.(2015,November01).TherehavebeenmoremalwareattacksonMacsthisyear
thanthelastfiveyearscombined.Retrievedfrom
http://www.businessinsider.com/therearemoremacmalwareattacksin2015thanlastf
iveyearscombined201511

Vance,J.(2011,October03).Thefutureofmalware.Retrievedfrom
http://www.networkworld.com/article/2181632/networksecurity/thefutureofmalware.h
tml

Weiss,D.C.(2015,July30).USincreasinglyusesmalwareinlawenforcement,expertsays
shouldawarrantberequired?Retrievedfrom
http://www.abajournal.com/news/article/us_increasingly_uses_malware_in_law_enforce
ment_expert_says_should_a_warran

Williamson,W.(2011,September19).TheEvolutionofMalware.Retrievedfrom
http://www.securityweek.com/evolutionmalware

Das könnte Ihnen auch gefallen