14.1 Defense Strategy Here are the steps to a good malicious mobile code defense strategy:
The plan should encompass all the policies and procedures needed to protect the PCs and networks under your control. It must address the protection of PCs, include end user education, list the tools you will use to fight malicious code, and establish how outbreaks will be handled. Each personal computer under your control needs to be modified to prevent malicious mobile code from attacking and from spreading further. Part of the defense plan must include installing a good antivirus scanner in your environment, although where is a bigger question. It must be remembered , however, that it takes more than a single approach to provide reasonable computer security. It takes the symbiotic effort of many tools to mount a good, solid defense. These four steps will be the overall focus of this chapter.
|
Team-Fly |
Top |