Malware and Antivirus Deployment for Enterprise Security

Malware and Antivirus Deployment for Enterprise Security

Raj Sharman, K. Pramod Krishna, H. Raghov Rao, Shambhu Upadhyaya
ISBN13: 9781599049373|ISBN10: 1599049376|EISBN13: 9781599049380
DOI: 10.4018/978-1-59904-937-3.ch205
Cite Chapter Cite Chapter

MLA

Sharman, Raj, et al. "Malware and Antivirus Deployment for Enterprise Security." Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, IGI Global, 2008, pp. 3067-3083. https://doi.org/10.4018/978-1-59904-937-3.ch205

APA

Sharman, R., Krishna, K. P., Rao, H. R., & Upadhyaya, S. (2008). Malware and Antivirus Deployment for Enterprise Security. In H. Nemati (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 3067-3083). IGI Global. https://doi.org/10.4018/978-1-59904-937-3.ch205

Chicago

Sharman, Raj, et al. "Malware and Antivirus Deployment for Enterprise Security." In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, 3067-3083. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3.ch205

Export Reference

Mendeley
Favorite

Abstract

Threats to information security are pervasive, originating from both outside and within an organization. The history of computer security is dotted with the tales of newer methods of identification, detection, and prevention of malware, only to be followed by a new set of threats that circumvent those safeguards. The explosive growth of the Internet and wide availability of toolsets and documentation exacerbates this problem by making malware development easy. As blended threats continue to combine multiple types of attacks into single and more dangerous payloads, newer threats are emerging. Phishing, pharming, spamming, spoofing, spyware, and hacking incidents are increasing at an alarming rate despite the release of breakthrough security defense products. A multi-layered, integrated approach using different security products in conjunction with well-defined security policies and antivirus software will form the foundation for effective enterprise security management.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.