Prevention and Defense

  • David Salomon
Part of the Undergraduate Topics in Computer Science book series (UTICS)


The discussion of rogue software in the preceding chapters illustrates how dangerous this menace is. A worm can appear out of nowhere and infect all the computers of an organization within minutes. Once deeply embedded, it starts sending tentacles outside, looking for more computers to infect, and may also look inside for sensitive information to send back to its creator. Thus, discovering this type of software early, preventing its appearance in the first place, and defending against it are important goals of any computer user, whether an individual or part of an organization. Methods and ideas for preventing malware and defending against it are the topic of this chapter.


Computer User Activity Monitor Email Message Program Counter Integrity Checker 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

  1. CA (2004) is Scholar
  2. Cohen, Fred (1987) “A cryptographic checksum for integrity protection,’ Computers and Security, 6(6)505–510, December 1.CrossRefGoogle Scholar
  3. EICAR (2004) is
  4. FBI (2008) is la041608usa.htm.Google Scholar
  5. McAfee (2004) is
  6. MSsecurity (2005) is
  7. Rochlis, J., and M. Eichin (1989) “With Microscope and Tweezers: The Worm from MIT’s Perspective,” Communications of the ACM, 32(6):689– 698, June.CrossRefGoogle Scholar
  8. vmyths (2005) is
  9. Wild List (2004) is

Copyright information

© Springer London 2010

Authors and Affiliations

  1. 1.Computer Science Dept.California State University, NorthridgeNorthridgeUSA

Personalised recommendations