The Code Red Worm

This paper focuses on the behavior of the Code Red (CRv2) and Code Red II worms, discussing how the worms propagated and capitalized on known yet unpatched software vulnerabilities. Creating a computer and network security policy is discussed in light of the lessons learned from these worms.
By
John Dolak
August 28, 2001

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg