Malware and Antivirus Deployment for Enterprise Security
Raj Sharman (University of New York at Buffalo, USA), K. Pramod Krishna (State University of New York at Buffalo, USA), H. Raghov. Rao (State University of New York at Buffalo, USA) and Shambhu Upadhyaya (State University of New York at Buffalo, USA)
Copyright: © 2006
Threats to information security are pervasive, originating from both outside and within an organization. The history of computer security is dotted with the tales of newer methods of identification, detection, and prevention of malware, only to be followed by a new set of threats that circumvent those safeguards. The explosive growth of the Internet and wide availability of toolsets and documentation exacerbates this problem by making malware development easy. As blended threats continue to combine multiple types of attacks into single and more dangerous payloads, newer threats are emerging. Phishing, pharming, spamming, spoofing, spyware, and hacking incidents are increasing at an alarming rate despite the release of breakthrough security defense products. A multi-layered, integrated approach using different security products in conjunction with well-defined security policies and antivirus software will form the foundation for effective enterprise security management.