Professional Documents
Culture Documents
The Internet: The global network converted our disconnected World into a small village, where everyone
connects to everyone else. The average time for sending packets between any two places in the World Wide
Web is around 50ms. Much faster than traveling to the location.
Computer Complexity: Computers are pretty complex beasts. There are thousands of different subsystems
which can be an attack vector for our attacker. With so many security holes, they are pretty hard to defend. Plus,
the software and hardware landscape is changing rapidly, and something working Today will not work
Tomorrow.
Many Privacy Tools: Computer criminals can use the same set of privacy-oriented software applications
used by ordinary people. Unfortunately, these people usually are much more technically adept than the average
computer user. Computer users are fighting versus a better-trained enemy.
Malware Scalability: Like the rapid scale of different software products, malware can spread itself at the
same speed. In a matter of hours, a well-designed malware can affect thousands or even millions of computers.
2 How to protect software theft? Describe briefly.