SlideShare une entreprise Scribd logo
1  sur  16
Historical IT A Quick Overview of Situations we have addressed Stacey L. Vernooy 8-Feb-11
Complicated Systems … What are viruses ? How have we reacted ? How do we protect  ourselves going forward ? 2/5/2011 S. VERNOOY 2
Types of Viruses	 Viruses by nature are attacks on a computers system files or a users personal files by causing hardware and function failure, inconvenience and potential sharing of secured information. i.e. ‘Nuisance’ – actions that impact the performance and limit a users ability to perform common tasks.  I.e.. pop up message boxes ‘Trojan’ – sneak attack through attachment to a system file ‘Worm’ – resides on the computer memory in a hidden file and executes randomly playing ‘hide and seek’ throughout system files  2/5/2011 3 S. VERNOOY
Samples from the past…		 Michael Angelo N a t a s Y2K crisis Cobol crisis Melissa 2/5/2011 4 S. VERNOOY
Michael Angelo			March 4th 1991 In the early nineties, as home computers were beginning to be more common, a generic date triggered virus threatened the ‘system startup’ of pc’s 2/5/2011 5 S. VERNOOY
‘N a t a s’  SATAN		London 1995 A virus of local impact was launched through ‘on-campus’ computer labs. Passed by the transfer of boot disks between workstations, the virus attacked by ‘fragmenting’ programs and documents, re-attached and re-executed itself on each login. When the virus met a home pc, a complete reformat was required by professionals as attempts to use system user disks failed on multiple attempts. At UWO, a complete network reinstallation was required in the junior first year labs. 2/5/2011 6 S. VERNOOY
Y2K crisis …	December 31st 1999 – January 1st 2000 Triggered by the turn of midnight on New Years Eve, the Y2K virus was the result of legacy systems that used a shortened date format in calculations that did not account for the year 2000. During development of systems in the early 1970’s the anticipation that the same systems would still be full production and usage by the turn of the century was not correct. Impact – Government systems, including nuclear regulatory systems, aviation and navigation systems in use by military, financial calculations of markets and billing, medical and surgical instruments and several stand alone systems that automated routines by date function were impacted 2/5/2011 7 S. VERNOOY
Cobol Crisis …			September 9th 1999 Legacy systems, including several factory and banking automated routines used the COBOL language which leveraged a date format of ‘nines’ I.e..  99-99-99 as interpreted DD-MM-YYYY As September 9th 1999, was a sensitive trigger date, many reported that it would be a pre-cursor to the issues to be experienced during the Y2K crisis of the same year. 2/5/2011 8 S. VERNOOY
‘Melissa’					Toronto 2002 An ‘address book’ virus, attached itself through individual users email contact books and would send random messages that would execute the attachment to the next address book. In corporate culture, where all address books contain the entire company roster of employees, the virus would continue to re-circle users and the dramatic effect shutdown networks of internal communication. One of several similar type of viruses that attacked a new generation of users that kept custom address books Untraceable in origin, could be attached to an email without detection, intended or not. 2/5/2011 9 S. VERNOOY
Results … Many causes of concern that brought attention to the maintenance required to keep systems reliable, the requirement that accuracy and foresight would create longer lasting applications and the awareness of the intricate nature of the systems themselves. Documentation was required Analysis of all individual components was required Streamlining for easier, ongoing maintenance 2/5/2011 S. VERNOOY 10
The ‘Task force’ Knowledge/Experience - programmers with a complex collection of skills within multiple languages to cross-leverage workable solutions. Time – dedicated individuals that spent considerable time to identify the changes required and implemented new routines to parallel existing systems until a smooth transition could be completed seamlessly Effort – learning new languages, applying revisions and testing. 2/5/2011 S. VERNOOY 11
Minor fixes …	 Changes in policy to limit the exposure of larger corporations to public access.  Restrictions to employees about personal email that could be sourced from less reliable or less protected outsiders and intruders. Installations of additional safeguards, firewalls and anti-virus programs that were created and regularly updated into systems to be proactive in attacking and resolving potential threats. Additional hardware, user restrictions and accountability. 2/5/2011 S. VERNOOY 12
Government support … It wasn’t enough to alert the public of the ‘cause for concern’.  The nature of the Y2K instance was global, a wide spread impact and influence that brought together nations of knowledge to offset potential global threat. Incentives were created for new IT graduates to be hired to perform either day-to-day operations, to free the time of more experienced programmers or to hire the fresh programmers for analysis of millions of lines of code and to respond appropriately. 2/5/2011 S. VERNOOY 13
Technology is evolving … Complex and with constant changes, new languages and skill sets are required all the time. Where COBOL, Fortran and earlier versions of C remain staples in the learning discipline of the study of computer languages, the ‘fourth generation’ of visual availability and implementation serves a quicker resolution to problems. A ‘web generation’ has faster turnarounds to release online solutions, systems in most cases ‘have already been built once’ and the learning’s are quick to share. 2/5/2011 S. VERNOOY 14
Now we know… It has been years since an ‘outbreak’ has occurred and with a wireless generation that builds more resilient and bullet proof coding, many public exposures are reduced. The ‘new threat’ is the availability of the content contained in the systems as a generation has become dependent on sharing, often personal and private details that can be leveraged to obtain even further information.   It’s the silent attack from ‘behind the scenes’. 2/5/2011 S. VERNOOY 15
Thank you Questions, Comments and or Concerns 2/5/2011 S. VERNOOY 16

Contenu connexe

Tendances

Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.Yury Chemerkin
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hDave Arvin
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenCapitolTechU
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFrederik Questier
 
Digital Lifestyle Trends and Threats
Digital Lifestyle Trends and ThreatsDigital Lifestyle Trends and Threats
Digital Lifestyle Trends and ThreatsAndrew Wong
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacymalik1972
 
How Web 2.0 Tools can be Integrated into the Business Classroom
How Web 2.0 Tools can be Integrated into the Business ClassroomHow Web 2.0 Tools can be Integrated into the Business Classroom
How Web 2.0 Tools can be Integrated into the Business ClassroomLeigh Zeitz
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 

Tendances (14)

Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_h
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aiken
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software Development
 
Digital Lifestyle Trends and Threats
Digital Lifestyle Trends and ThreatsDigital Lifestyle Trends and Threats
Digital Lifestyle Trends and Threats
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
How Web 2.0 Tools can be Integrated into the Business Classroom
How Web 2.0 Tools can be Integrated into the Business ClassroomHow Web 2.0 Tools can be Integrated into the Business Classroom
How Web 2.0 Tools can be Integrated into the Business Classroom
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 

Similaire à Historical It

cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docxssuser719d6b
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesSTO STRATEGY
 
Reference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docxReference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docxlorent8
 
Absolutely no plagiarism  Topic Mobile users and d.docx
Absolutely no plagiarism  Topic  Mobile users and d.docxAbsolutely no plagiarism  Topic  Mobile users and d.docx
Absolutely no plagiarism  Topic Mobile users and d.docxadkinspaige22
 
1Running head SHORTENED VERSION OF TITLE8SHORTENE.docx
1Running head SHORTENED VERSION OF TITLE8SHORTENE.docx1Running head SHORTENED VERSION OF TITLE8SHORTENE.docx
1Running head SHORTENED VERSION OF TITLE8SHORTENE.docxjesusamckone
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011 Trend Micro
 
Track f evolving trusted platforms - arm
Track f   evolving trusted platforms - armTrack f   evolving trusted platforms - arm
Track f evolving trusted platforms - armchiportal
 
Course Final Project on OceanLotus by Lino Lazarous Marino Ija
Course Final Project on OceanLotus by Lino Lazarous Marino IjaCourse Final Project on OceanLotus by Lino Lazarous Marino Ija
Course Final Project on OceanLotus by Lino Lazarous Marino IjaRight Tech Centre
 
Attact evolution
Attact evolutionAttact evolution
Attact evolutionRoshAan4
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis MPhil/MRes/BSc
 
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaLuca Moroni ✔✔
 
ICSM 2011 CFP - A4
ICSM 2011 CFP - A4ICSM 2011 CFP - A4
ICSM 2011 CFP - A4ICSM 2011
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 

Similaire à Historical It (20)

20111214 iisf shinoda_
20111214 iisf shinoda_20111214 iisf shinoda_
20111214 iisf shinoda_
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
 
The red book
The red book  The red book
The red book
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
Reference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docxReference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docx
 
Absolutely no plagiarism  Topic Mobile users and d.docx
Absolutely no plagiarism  Topic  Mobile users and d.docxAbsolutely no plagiarism  Topic  Mobile users and d.docx
Absolutely no plagiarism  Topic Mobile users and d.docx
 
1Running head SHORTENED VERSION OF TITLE8SHORTENE.docx
1Running head SHORTENED VERSION OF TITLE8SHORTENE.docx1Running head SHORTENED VERSION OF TITLE8SHORTENE.docx
1Running head SHORTENED VERSION OF TITLE8SHORTENE.docx
 
Threat Report H2 2012
Threat Report H2 2012Threat Report H2 2012
Threat Report H2 2012
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 
Track f evolving trusted platforms - arm
Track f   evolving trusted platforms - armTrack f   evolving trusted platforms - arm
Track f evolving trusted platforms - arm
 
Course Final Project on OceanLotus by Lino Lazarous Marino Ija
Course Final Project on OceanLotus by Lino Lazarous Marino IjaCourse Final Project on OceanLotus by Lino Lazarous Marino Ija
Course Final Project on OceanLotus by Lino Lazarous Marino Ija
 
Attact evolution
Attact evolutionAttact evolution
Attact evolution
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
0857290053.pdf
0857290053.pdf0857290053.pdf
0857290053.pdf
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
 
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
 
ICSM 2011 CFP - A4
ICSM 2011 CFP - A4ICSM 2011 CFP - A4
ICSM 2011 CFP - A4
 
Final essay
Final essayFinal essay
Final essay
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 

Plus de Stacey Vernooy

The never cold call again online playbook
The never cold call again online playbookThe never cold call again online playbook
The never cold call again online playbookStacey Vernooy
 
Searching For Employment And Opportunities
Searching For Employment And OpportunitiesSearching For Employment And Opportunities
Searching For Employment And OpportunitiesStacey Vernooy
 
Brochure Lunch And Learn The Landmark A
Brochure    Lunch And Learn    The Landmark ABrochure    Lunch And Learn    The Landmark A
Brochure Lunch And Learn The Landmark AStacey Vernooy
 
10 Lifesaving Tips From Er Doctors
10 Lifesaving Tips From Er Doctors10 Lifesaving Tips From Er Doctors
10 Lifesaving Tips From Er DoctorsStacey Vernooy
 
Budgetting A Calendar Budget
Budgetting   A Calendar BudgetBudgetting   A Calendar Budget
Budgetting A Calendar BudgetStacey Vernooy
 
Budgetting Annualized Expenses
Budgetting   Annualized ExpensesBudgetting   Annualized Expenses
Budgetting Annualized ExpensesStacey Vernooy
 
Welcome Package Property Mgmt
Welcome Package Property MgmtWelcome Package Property Mgmt
Welcome Package Property MgmtStacey Vernooy
 
Project Management Hospitality
Project Management    HospitalityProject Management    Hospitality
Project Management HospitalityStacey Vernooy
 

Plus de Stacey Vernooy (17)

The never cold call again online playbook
The never cold call again online playbookThe never cold call again online playbook
The never cold call again online playbook
 
Growing up digital
Growing up digitalGrowing up digital
Growing up digital
 
The world wide web
The world wide webThe world wide web
The world wide web
 
Qualifications It
Qualifications ItQualifications It
Qualifications It
 
Quick Events
Quick EventsQuick Events
Quick Events
 
Data Samples
Data SamplesData Samples
Data Samples
 
Searching For Employment And Opportunities
Searching For Employment And OpportunitiesSearching For Employment And Opportunities
Searching For Employment And Opportunities
 
Human Resources
Human ResourcesHuman Resources
Human Resources
 
Brochure Lunch And Learn The Landmark A
Brochure    Lunch And Learn    The Landmark ABrochure    Lunch And Learn    The Landmark A
Brochure Lunch And Learn The Landmark A
 
Movie donations
Movie donationsMovie donations
Movie donations
 
Cogs communication
Cogs communicationCogs communication
Cogs communication
 
The world wide web
The world wide webThe world wide web
The world wide web
 
10 Lifesaving Tips From Er Doctors
10 Lifesaving Tips From Er Doctors10 Lifesaving Tips From Er Doctors
10 Lifesaving Tips From Er Doctors
 
Budgetting A Calendar Budget
Budgetting   A Calendar BudgetBudgetting   A Calendar Budget
Budgetting A Calendar Budget
 
Budgetting Annualized Expenses
Budgetting   Annualized ExpensesBudgetting   Annualized Expenses
Budgetting Annualized Expenses
 
Welcome Package Property Mgmt
Welcome Package Property MgmtWelcome Package Property Mgmt
Welcome Package Property Mgmt
 
Project Management Hospitality
Project Management    HospitalityProject Management    Hospitality
Project Management Hospitality
 

Historical It

  • 1. Historical IT A Quick Overview of Situations we have addressed Stacey L. Vernooy 8-Feb-11
  • 2. Complicated Systems … What are viruses ? How have we reacted ? How do we protect ourselves going forward ? 2/5/2011 S. VERNOOY 2
  • 3. Types of Viruses Viruses by nature are attacks on a computers system files or a users personal files by causing hardware and function failure, inconvenience and potential sharing of secured information. i.e. ‘Nuisance’ – actions that impact the performance and limit a users ability to perform common tasks. I.e.. pop up message boxes ‘Trojan’ – sneak attack through attachment to a system file ‘Worm’ – resides on the computer memory in a hidden file and executes randomly playing ‘hide and seek’ throughout system files 2/5/2011 3 S. VERNOOY
  • 4. Samples from the past… Michael Angelo N a t a s Y2K crisis Cobol crisis Melissa 2/5/2011 4 S. VERNOOY
  • 5. Michael Angelo March 4th 1991 In the early nineties, as home computers were beginning to be more common, a generic date triggered virus threatened the ‘system startup’ of pc’s 2/5/2011 5 S. VERNOOY
  • 6. ‘N a t a s’  SATAN London 1995 A virus of local impact was launched through ‘on-campus’ computer labs. Passed by the transfer of boot disks between workstations, the virus attacked by ‘fragmenting’ programs and documents, re-attached and re-executed itself on each login. When the virus met a home pc, a complete reformat was required by professionals as attempts to use system user disks failed on multiple attempts. At UWO, a complete network reinstallation was required in the junior first year labs. 2/5/2011 6 S. VERNOOY
  • 7. Y2K crisis … December 31st 1999 – January 1st 2000 Triggered by the turn of midnight on New Years Eve, the Y2K virus was the result of legacy systems that used a shortened date format in calculations that did not account for the year 2000. During development of systems in the early 1970’s the anticipation that the same systems would still be full production and usage by the turn of the century was not correct. Impact – Government systems, including nuclear regulatory systems, aviation and navigation systems in use by military, financial calculations of markets and billing, medical and surgical instruments and several stand alone systems that automated routines by date function were impacted 2/5/2011 7 S. VERNOOY
  • 8. Cobol Crisis … September 9th 1999 Legacy systems, including several factory and banking automated routines used the COBOL language which leveraged a date format of ‘nines’ I.e.. 99-99-99 as interpreted DD-MM-YYYY As September 9th 1999, was a sensitive trigger date, many reported that it would be a pre-cursor to the issues to be experienced during the Y2K crisis of the same year. 2/5/2011 8 S. VERNOOY
  • 9. ‘Melissa’ Toronto 2002 An ‘address book’ virus, attached itself through individual users email contact books and would send random messages that would execute the attachment to the next address book. In corporate culture, where all address books contain the entire company roster of employees, the virus would continue to re-circle users and the dramatic effect shutdown networks of internal communication. One of several similar type of viruses that attacked a new generation of users that kept custom address books Untraceable in origin, could be attached to an email without detection, intended or not. 2/5/2011 9 S. VERNOOY
  • 10. Results … Many causes of concern that brought attention to the maintenance required to keep systems reliable, the requirement that accuracy and foresight would create longer lasting applications and the awareness of the intricate nature of the systems themselves. Documentation was required Analysis of all individual components was required Streamlining for easier, ongoing maintenance 2/5/2011 S. VERNOOY 10
  • 11. The ‘Task force’ Knowledge/Experience - programmers with a complex collection of skills within multiple languages to cross-leverage workable solutions. Time – dedicated individuals that spent considerable time to identify the changes required and implemented new routines to parallel existing systems until a smooth transition could be completed seamlessly Effort – learning new languages, applying revisions and testing. 2/5/2011 S. VERNOOY 11
  • 12. Minor fixes … Changes in policy to limit the exposure of larger corporations to public access. Restrictions to employees about personal email that could be sourced from less reliable or less protected outsiders and intruders. Installations of additional safeguards, firewalls and anti-virus programs that were created and regularly updated into systems to be proactive in attacking and resolving potential threats. Additional hardware, user restrictions and accountability. 2/5/2011 S. VERNOOY 12
  • 13. Government support … It wasn’t enough to alert the public of the ‘cause for concern’. The nature of the Y2K instance was global, a wide spread impact and influence that brought together nations of knowledge to offset potential global threat. Incentives were created for new IT graduates to be hired to perform either day-to-day operations, to free the time of more experienced programmers or to hire the fresh programmers for analysis of millions of lines of code and to respond appropriately. 2/5/2011 S. VERNOOY 13
  • 14. Technology is evolving … Complex and with constant changes, new languages and skill sets are required all the time. Where COBOL, Fortran and earlier versions of C remain staples in the learning discipline of the study of computer languages, the ‘fourth generation’ of visual availability and implementation serves a quicker resolution to problems. A ‘web generation’ has faster turnarounds to release online solutions, systems in most cases ‘have already been built once’ and the learning’s are quick to share. 2/5/2011 S. VERNOOY 14
  • 15. Now we know… It has been years since an ‘outbreak’ has occurred and with a wireless generation that builds more resilient and bullet proof coding, many public exposures are reduced. The ‘new threat’ is the availability of the content contained in the systems as a generation has become dependent on sharing, often personal and private details that can be leveraged to obtain even further information. It’s the silent attack from ‘behind the scenes’. 2/5/2011 S. VERNOOY 15
  • 16. Thank you Questions, Comments and or Concerns 2/5/2011 S. VERNOOY 16