Trojans, Worms, and Spyware : A Computer Security Professional's Guide to Malicious Code


Michael. Erbschloe
Bok Engelsk 2004 · Electronic books.
Annen tittel
Utgitt
Burlington : : Elsevier Science, , 2004.
Omfang
1 online resource (233 p.)
Opplysninger
Description based upon print version of record.. - Front Cover; Trojans, Worms, and Spyware; Copyright Page; Table of Contents; Preface; Introduction; Inside This Book; Acknowledgements; Chapter 1. Malicious Code Overview; Why Malicious Code Attacks Are Dangerous; Impact of Malicious Code Attacks on Corporate Security; Why Malicious Code Attacks Work; Action Steps to Combat Malicious Code Attacks; Chapter 2. Types of Malicious Code; E-mail Viruses and Miscellaneous Viruses; Trojans and Other Backdoors; Worms; Blended Threats; Time Bombs; Spyware; Adware; Stealware; Action Steps to Combat Malicious Code Attacks. - Action Steps to Combat Malicious Code AttacksChapter 6. Controlling Computer Behavior of Employees; Policies on Appropriate Use of Corporate Systems; Monitoring Employee Behavior; Web Site Blockers and Internet Filters; Cookie and Spyware Blockers; Pop-up Blockers; Controlling Downloads; SPAM Control; Action Steps to Combat Malicious Code Attacks; Chapter 7. Responding to a Malicious Code Incident; About the Case Study; The First Report of a Malicious Code Attack; The Confirmation Process; Mobilizing the Response Team; Notifying Management; Using an Alert System and Informing End Users. - Chapter 3. Review of Malicious Code IncidentsHistoric Tidbits; The Morris Worm; Melissa; Love Bug; Code Red(s); SirCam; Nimda; Slammer; The Summer of 2003 Barrage of Blaster, Sobig, and More; Early 2004 with MyDoom, Netsky, and More; Action Steps to Combat Malicious Code Attacks; Chapter 4. Basic Steps to Combat Malicious Code Attacks; Understanding the Risks; Using Security Policies to Set Standards; System and Patch Updates; Establishing a Computer Incident Response Team; Training for IT Professionals; Training End Users; Applying Social Engineering Methods in an Organization. - Cleanup and RestorationControlling and Capturing Malicious Code; Identifying the Source of Malicious Code; Preserving Evidence; When to Call Law Enforcement and What to Expect; Enterprise-wide Eradication; Returning to Normal Operations; Analyzing Lessons Learned; Action Steps to Combat Malicious Code Attacks; Chapter 8. Model Training Program for End Users; Explaining Why the Training Is Important; Explaining the Appropriate-Use Policy for Computers and Networks; Explaining How the Help Desk and PC Support of the Organization Works; Providing Basic Information about Malicious code. - Covering the Basic Do's and Don'ts of Computer Usage to Prevent Attacks. - Working with Law Enforcement AgenciesAction Steps to Combat Malicious Code Attacks; Chapter 5. Organizing for Security, Prevention, and Response; Organization of the IT Security Function; Where Malicious Code Attack Prevention Fits into the IT Security Function; Staffing for Malicious Code Prevention in IT; Budgeting for Malicious Code Prevention; Evaluating Products for Malicious Code Prevention; Establishing and Utilizing an Alert System; Establishing and Utilizing a Reporting System; Corporate Security and Malicious Code Incident Investigations. - Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information
Emner
Sjanger
Dewey
ISBN
0750678488. - 9780750678483

Bibliotek som har denne