Preface:
Malicious code attacks cost businesses billions of dollars each year. Most organizationsthat have been hit by a malicious code attack find that response,
cleanup, and restoration of computers and files is time consuming and costly. In
some cases, it can take days to recover from an attack and get operations back to
a normal state.
Table of Content:
1 Malicious Code Overview
- Why Malicious Code Attacks Are Dangerous
- Impact of Malicious Code Attacks on
- Corporate Security
- Why Malicious Code Attacks Work
- Action Steps to Combat Malicious Code Attacks
2 Types of Malicious Code
- E-mail Viruses and Miscellaneous Viruses
- Trojans and Other Backdoors
- Worms
- Blended Threats
- Time Bombs
- Spyware
- Adware
- Stealware
- Action Steps to Combat Malicious Code Attacks
3 Review of Malicious Code Incidents
- Historic Tidbits
- The Morris Worm
- Melissa
- Love Bug
- Code Red(s)
- SirCam
- Nimda
- Slammer
4 Basic Steps to Combat Malicious Code Attacks
- Understanding the Risks
- Using Security Policies to Set Standards
- System and Patch Updates
- Establishing a Computer Incident Response Team
- Training for IT Professionals
- Training End Users
- Applying Social Engineering Methods in
- an Organization
- Working with Law Enforcement Agencies
- Action Steps to Combat Malicious Code Attacks
5 Organizing for Security, Prevention, and Response
- Organization of the IT Security Function
- Where Malicious Code Attack Prevention Fits into the IT
- Security Function
- Staffing for Malicious Code Prevention in IT
- Budgeting for Malicious Code Prevention
- Evaluating Products for Malicious Code Prevention
- Establishing and Utilizing an Alert System
- Establishing and Utilizing a Reporting System
And more:
Controlling Computer Behavior of EmployeesResponding to a Malicious Code Incident
Model Training Program for End Users
The Future of Malicious Code
Name: Trojans, Warms and Spyware: A Computer Security professional Guide to milicious Code
Format: PDF
Size: 1.18 Mb (Original)
Download format: RAR
Download size: 603 kb
{ 5 comments... read them below or add one }
This paragrаρh will asѕist the internet usеrs
for ѕetting up neω wеbpаgе
or even a blog from stаrt to end.
my ѕite online corporate reputation management
excellent poіnts altogether, you simply gaineԁ a new reader.
What woulԁ you reсommend аbοut youг poѕt thаt yοu simply mаde a fеw days іn the past?
Anу certain?
My webѕite - Red Kings Poker Bonus
This is vеry intereѕtіng,
You are а vеry skіlleԁ bloggeг.
Ι've joined your rss feed and look forward to seeking more of your fantastic post. Also, I have shared your website in my social networks!
My blog ... Arjun Kanuri
I like the valuable info you supply for your articles.
I will bookmark your weblog and take a look at once
more right here regularly. I'm reasonably sure I'll be told lots of new
stuff proper right here! Good luck for the
next!
my web blog: Holdem Poker
thanks @Arjun kanuri
Post a Comment
What you Says