Prevention and Defense
The discussion of rogue software in the preceding chapters illustrates how dangerous this menace is. A worm can appear out of nowhere and infect all the computers of an organization within minutes. Once deeply embedded, it starts sending tentacles outside, looking for more computers to infect, and may also look inside for sensitive information to send back to its creator. Thus, discovering this type of software early, preventing its appearance in the first place, and defending against it are important goals of any computer user, whether an individual or part of an organization. Methods and ideas for preventing malware and defending against it are the topic of this chapter.
KeywordsComputer User Activity Monitor Email Message Program Counter Integrity Checker
Unable to display preview. Download preview PDF.
- CA (2004) is www3.ca.com/securityadvisor/virusinfo/default.aspx.Google Scholar
- CERT (2004) is http://www.cert.org/other_sources/viruses.html.
- EICAR (2004) is http://www.eicar.org/.
- FBI (2008) is losangeles.fbi.gov/dojpressrel/pressrel08/file la041608usa.htm.Google Scholar
- IbmAntiVirus (2005) http://www.research.ibm.com/antivirus/.
- McAfee (2004) is http://www.mcafee.com/us/.
- MSoffice (2005) is http://office.microsoft.com/en-us/officeupdate/.
- MSsecurity (2005) is http://www.microsoft.com/security/.
- MStechnet (2005) is http://www.microsoft.com/technet/security/.
- NIST (2004) is http://csrc.nist.gov/virus/.
- sophos (2005) is www.sophos.com/virusinfo/hoaxes.
- Symantec (2004) is http://www.symantec.com/index.htm.
- vmyths (2005) is http://www.vmyths.com/.
- Wild List (2004) is http://www.wildlist.org/.