14.9 Summary This chapter discusses the steps any organization, or person, should take to proactively minimize the risk from malicious mobile code. First, they should create a malicious mobile code defense plan to protect all their computer assets. A reliable antivirus scanner should be deployed on the desktop, or elsewhere within the organization to provide a reasonable level of protection. Other defense tools should be used as an adjunct to build a stronger security domain. Every PC should be modified to prevent the spread of malicious mobile code that gets past the defense perimeter. If these steps are followed the threat of malicious mobile code will be significantly minimized. Chapter 15 discusses the future types of malicious mobile code. |
Team-Fly |
Top |