Anti-Virus Tools & Techniques for Computer
No image available
No image available
Provides criteria for judging the functionality, practicality and convenience of anti-virus tools. Discusses strengths and limitations of various classes of anti-virus tools. Does not weigh the merits of specific tools.
No image available
No image available
No image available
No image available
No author available
· 1992
No image available
No author available
· 1992
No image available
· 1992
This report provides an assessment of the threats associated with malicious code and external attacks on systems using commercially available hardware and software. The history of the threat is provided and current protection methods described. A projection of the future threats for both malicious code and human threats is also given. Today, computer systems are under attack from a multitude of sources. These range from malicious code, such as viruses and worms, to human threats, such as hackers and phone "phreaks." These attacks target different characteristics of a system. This leads to the possibility that a particular system is more susceptible to certain kinds of attacks. Malicious code, such as viruses and worms, attack a system in one of two ways, either internally or externally. Traditionally, the virus has been an internal threat, while the worm, to a large extent, has been a threat from an external source. Human threats are perpetrated by individuals or groups of individuals that attempt to penetrate systems through computer networks, public switched telephone networks or other sources. These attacks generally target known security vulnerabilities of systems. Many of these vulnerabilities are simply due to configuration errors.
No image available