Trojans, Warms and Spyware: A Computer Security professional Guide to milicious Code

Posted by Aamir khan

 

Preface:

Malicious code attacks cost businesses billions of dollars each year. Most organizations
that have been hit by a malicious code attack find that response,
cleanup, and restoration of computers and files is time consuming and costly. In
some cases, it can take days to recover from an attack and get operations back to
a normal state.

Table of Content:

1 Malicious Code Overview

  • Why Malicious Code Attacks Are Dangerous
  • Impact of Malicious Code Attacks on
  • Corporate Security
  • Why Malicious Code Attacks Work
  • Action Steps to Combat Malicious Code Attacks

2 Types of Malicious Code

  • E-mail Viruses and Miscellaneous Viruses
  • Trojans and Other Backdoors
  • Worms
  • Blended Threats
  • Time Bombs
  • Spyware
  • Adware
  • Stealware
  • Action Steps to Combat Malicious Code Attacks


3 Review of Malicious Code Incidents

  • Historic Tidbits
  • The Morris Worm
  • Melissa
  • Love Bug
  • Code Red(s)
  • SirCam
  • Nimda
  • Slammer

4 Basic Steps to Combat Malicious Code Attacks

  • Understanding the Risks
  • Using Security Policies to Set Standards
  • System and Patch Updates
  • Establishing a Computer Incident Response Team
  • Training for IT Professionals
  • Training End Users
  • Applying Social Engineering Methods in
  • an Organization
  • Working with Law Enforcement Agencies
  • Action Steps to Combat Malicious Code Attacks

5 Organizing for Security, Prevention, and Response

  • Organization of the IT Security Function
  • Where Malicious Code Attack Prevention Fits into the IT
  • Security Function
  • Staffing for Malicious Code Prevention in IT
  • Budgeting for Malicious Code Prevention
  • Evaluating Products for Malicious Code Prevention
  • Establishing and Utilizing an Alert System
  • Establishing and Utilizing a Reporting System

And more:

Controlling Computer Behavior of Employees
Responding to a Malicious Code Incident
Model Training Program for End Users
The Future of Malicious Code

Name:  Trojans, Warms and Spyware: A Computer Security professional Guide to milicious Code
Format: PDF
Size: 1.18 Mb (Original)
Download format: RAR
Download size: 603 kb

Download


{ 5 comments... read them below or add one }

Anonymous said...

This paragrаρh will asѕist the internet usеrs
for ѕetting up neω wеbpаgе
or even a blog from stаrt to end.

my ѕite online corporate reputation management

Anonymous said...

excellent poіnts altogether, you simply gaineԁ a new reader.
What woulԁ you reсommend аbοut youг poѕt thаt yοu simply mаde a fеw days іn the past?
Anу certain?

My webѕite - Red Kings Poker Bonus

Anonymous said...

This is vеry intereѕtіng,
You are а vеry skіlleԁ bloggeг.

Ι've joined your rss feed and look forward to seeking more of your fantastic post. Also, I have shared your website in my social networks!

My blog ... Arjun Kanuri

Anonymous said...

I like the valuable info you supply for your articles.

I will bookmark your weblog and take a look at once
more right here regularly. I'm reasonably sure I'll be told lots of new
stuff proper right here! Good luck for the
next!

my web blog: Holdem Poker

Aamir khan said...

thanks @Arjun kanuri

Post a Comment

What you Says

..-

Related Posts Plugin for WordPress, Blogger...

If you like this blog,then link back to me.
This is what you will see.



Optionally use this Widget installer to add this link to your blogger blog.