This preview shows page 1. Sign up to view the full content.
Unformatted text preview: itself from security attacks. The project will also take a look at how the botnet is used by dodgy organizations around the world to share and spread information as well as make money using the infrastructure composed of infected systems on the world wide web. References 1. Spiess, Kevin (September 7, 2007). "Worm 'Storm' gathers strength". Neoseeker. Retrieved 2007-10-10. 2. "Storm Worm's virulence may change tactics". British Computer Society. August 2, 2007. Retrieved 2007-10-10....
View Full Document
- Spring '10