14.1 Defense Strategy

Team-Fly    

 
Malicious Mobile Code: Virus Protection for Windows
By Roger A. Grimes
Slots : 1
Table of Contents
Chapter 14.  Defense

14.1 Defense Strategy

Here are the steps to a good malicious mobile code defense strategy:

  • Develop and implement a defense plan

  • Use a good antivirus scanner

  • Secure individual systems

  • Implement additional defense tools

The plan should encompass all the policies and procedures needed to protect the PCs and networks under your control. It must address the protection of PCs, include end user education, list the tools you will use to fight malicious code, and establish how outbreaks will be handled. Each personal computer under your control needs to be modified to prevent malicious mobile code from attacking and from spreading further. Part of the defense plan must include installing a good antivirus scanner in your environment, although where is a bigger question. It must be remembered , however, that it takes more than a single approach to provide reasonable computer security. It takes the symbiotic effort of many tools to mount a good, solid defense. These four steps will be the overall focus of this chapter.

No warranty or fitness for use is implied or given by the author or the publisher for any of the products reviewed in this book. Use products at your own risk.


Team-Fly    
Top


Malicious Mobile Code. Virus Protection for Windows
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net