1 / 6
文档名称:

A Practical Understanding of Malware Security.pdf

格式:pdf   页数:6
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

A Practical Understanding of Malware Security.pdf

上传人:bolee65 2014/1/3 文件大小:0 KB

下载得到文件列表

A Practical Understanding of Malware Security.pdf

文档介绍

文档介绍:A PRACTICAL UNDERSTANDING OF MALWARE SECURITY DAY
A PRACTICAL UNDERSTANDING DEFINING THE BUSINESS PROBLEM
OF MALWARE SECURITY Traditionally the ess of threat protection has been defined
as preventing the attack from being essful; preventing the
Greg Day hacker from stealing data, the virus infection from occurring.
McAfee, Alton House, Gatehouse Way, Aylesbury Each of these carries a tangible cost to any business. Most
HP19 8YD, monly tracked for virus infections is the cleanup cost.
However, in recent years the realisation has occurred that this
Tel +44 1296 617008 • Email is no longer a sufficiently exacting measure.
Greg_Day@ Although we may stop the attack occurring, in many of today’s
attacks businesses still suffer impact, which carries a financial
cost. Let me explain by example:
ABSTRACT The Sasser worm was one of the work worms in
In the past decade we have seen the time shrinking between 2004. It used a Buffer Overflow exploit to gain the required
initial discovery of an attack and widespread customer privileges to infect each system. Take the assumption that all
infection. Today, the term ‘zero-day attack’ has e a your known systems were protected with anti-virus and had
major topic of discussion for security teams, as it serves to signatures in place to detect the infection. In theory, the level
both highlight a weakness in the traditional