The first line of technical defense against any computer intrusion is the architecture of the networkÂ infrastructureÂ that the computer is connected to. The fact that worms like Conficker are so successful in their metastasis is “in your face” proof of just how insecure today’s IT Infrastructures are. Â If they weren’t so insecure then these worms would have a minimal impact. Â What’s even more interesting is that worms are “dumb” and people can’t seem to keep them out of their networks, so what are people going to do when hackers come knocking?
In simple terms a worm is little more than a dumb, self replicating, repeating computer program that uses some mechanismÂ (network, usb sticks, etc)Â to send copies of its self to other computer systems . A worms survival hinges on its ability to communicate with other computer systems and on its ability to gain entry into new uninfected computer systems. Â If it can’t do one or the other then it can’t spread and it will eventually die. Â If it can do both with relative success then it will likely survive for some time. The more hosts that a worm infects, the more potential […]