Malware and Antivirus Procedures

Malware and Antivirus Procedures

Xin Luo, Merrill Warkentin
Copyright: © 2005 |Pages: 9
ISBN13: 9781591405610|ISBN10: 1591405610|EISBN13: 9781591407966
DOI: 10.4018/978-1-59140-561-0.ch081
Cite Chapter Cite Chapter

MLA

Luo, Xin, and Merrill Warkentin. "Malware and Antivirus Procedures." Encyclopedia of Multimedia Technology and Networking, edited by Margherita Pagani, IGI Global, 2005, pp. 562-570. https://doi.org/10.4018/978-1-59140-561-0.ch081

APA

Luo, X. & Warkentin, M. (2005). Malware and Antivirus Procedures. In M. Pagani (Ed.), Encyclopedia of Multimedia Technology and Networking (pp. 562-570). IGI Global. https://doi.org/10.4018/978-1-59140-561-0.ch081

Chicago

Luo, Xin, and Merrill Warkentin. "Malware and Antivirus Procedures." In Encyclopedia of Multimedia Technology and Networking, edited by Margherita Pagani, 562-570. Hershey, PA: IGI Global, 2005. https://doi.org/10.4018/978-1-59140-561-0.ch081

Export Reference

Mendeley
Favorite

Abstract

The last decade has witnessed the dramatic emergence of the Internet as a force of inter-organizational and inter-personal change. The Internet and its component technologies, which continue to experience growing global adoption, have become essential facilitators and drivers in retailing, supply chain management, government, entertainment, and other processes. However, this nearly-ubiquitous, highly-interconnected environment has also enabled the widespread, rapid spread of malware, including viruses, worms, Trojan horses, and other malicious code. Malware is becoming more sophisticated and extensive, infecting not only our wired computers and networks, but also our emerging wireless networks. Parallel to the rise in malware, organizations have developed a variety of antivirus technologies and procedures, which are faced with more challenging tasks to effectively detect and repair current and forthcoming malware. This article surveys the virus and antivirus arena, discusses the trends of virus attacks, and provides solutions to existing and future virus problems (from both technical and managerial perspectives).

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.