Verified Document

Malware Since The Earliest Days Term Paper

However, nothing can be done until the malware actually occurs. With all the different viruses, worms and Trojans, how can security managers possibly predict what malware will occur next? In contrast, a behavioral rule defines legitimate activity in a system. Any activity not matching the profile will cause the security product to be triggered. As rules are not specific to a particular type of attack, they can block malicious behavior without having to recognize the precise attack used. Thus, there is additional protection against new attacks as they emerge. It is to effectively prevent any unauthorized applications, including malicious code and Trojans. or, it could protect a webserver by making it impossible for anyone to access the webserver to change the files and limiting the risk of a hack (Franklin, 2002). However, the dilemma comes how many rules should the system have? The security manager must decide between an effective security procedure and a low number of false alarms. Applying too many rules will keep the company from meeting its basic business objectives and becomes very difficult to maintain. However, not using enough rules allows the application to proceed unchecked and potential malicious intrusion. In addition, because computer systems are continually changing, rule and signature changes are necessary for each server with every system change. This makes the rules-based solutions not only inaccurate, but also impractical to use across the enterprise on production systems. If one makes a system more secure, it makes a system harder to use, and vice versa.

There is no easy answer to the...

Because of this, efforts must be taken at different levels. The states should continue to pass laws against computer crime. Companies need to find the balance between too many and not enough rules. They also have to continually educate their people who have their hands on a great deal of valuable information. As long as there are individuals who are willing to take unethical or illegal steps for personal gain, processes have to be in place to prevent them.
References Cited

Bowyer, K.W. (2003). "Living responsibly in a computerized world." Ethics and Computing. New York: IEEE press.

Control Guard. http://www.controlguard.com/index.asp

Franklin, I. (November 26, 2002) "Entercept Security Technologies: Rules or signatures?

The best method of prevention." Toolbox. Retrieved from website September 16,

2006. http://security.ittoolbox.com/documents/peer-publishing/rules-or-best-method-of-prevention-3212.

National Conference of State Legislators (July 13, 2006). "2006 State Legislation

Relating to Internet Spyware or Adware." Website retrieved September 15, 2006.

Smith, R.E. (September 7, 2006) "Laptop Hall of Shame" Forbes.com. Website Retrieved September 16, 2006.

http://www.forbes.com/columnists/2006/09/06/laptops-hall-of-shame-cx_res_0907laptops.html.

Viruslist. "Malware" Website retrieved September 16, 2006. http://www.virusbtn.com.

Wikipedia. (September 16, 2006) "Malware." Website retrieved September 17, 2006.

http://en.wikipedia.org/wiki/Malware

Sources used in this document:
References Cited

Bowyer, K.W. (2003). "Living responsibly in a computerized world." Ethics and Computing. New York: IEEE press.

Control Guard. http://www.controlguard.com/index.asp

Franklin, I. (November 26, 2002) "Entercept Security Technologies: Rules or signatures?

The best method of prevention." Toolbox. Retrieved from website September 16,
2006. http://security.ittoolbox.com/documents/peer-publishing/rules-or-best-method-of-prevention-3212.
http://www.forbes.com/columnists/2006/09/06/laptops-hall-of-shame-cx_res_0907laptops.html.
Viruslist. "Malware" Website retrieved September 16, 2006. http://www.virusbtn.com.
http://en.wikipedia.org/wiki/Malware
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber-Crime, Cyber-Terrorism, and Cyber-Warfare Since
Words: 2784 Length: 10 Document Type: Research Paper

Contemporary Cyber-warfare Cases Studies In 2011, the Center for Strategic and International Studies published Significant Cyber Incidents Since 2006 (Lewis, 2011) as part of its Cyber and Internet Policy, Technology and Public Policy Program. Among the incidents detailed in that report, referenced by their year of occurrence: 2007 After officials in former-Soviet Estonia removed a World War II memorial from its capital city of Tallinn in the Spring of 2007, a large-scale cyber-attack

Cyber Threats: Executive Summary It Is Important
Words: 1475 Length: 4 Document Type: Essay

Cyber Threats: Executive Summary It is important to note, from the onset, that even before the personal computer became as popular and as widely used as it is today, vandals still compromised computerized phone systems either for fun or for economic benefit. During the very early decades of IT, computer attacks were mostly committed by insiders, i.e. disgruntled employees of an entity (de Leeuw and Bergstra, 2007). The said attacks in

Operating Systems the Rise &
Words: 1851 Length: 6 Document Type: Research Paper

More than two hundred enterprise applications are now assured to be Vista-compatible. Vista SP1 systems start up in forty five rather than ninety seconds, according to Microsoft, and shut down in eleven. and, according to a new Microsoft-commissioned study, eighty six percent of consumer customers utilizing Vista would recommend it to their friends (Parker, 2008). Microsoft believes that broadcasting this type of data will help the company make the case

IT Management OS Systems History OS Systems
Words: 1218 Length: 4 Document Type: Essay

IT Management OS Systems History OS Systems History and Recommendations for Use "An OS is a program that controls the execution of application programs and acts as an interface between applications and the computer hardware," and is thus a crucial part in modern technology within a business context (Stallings 2009 p 51). Such systems help run software, provide access to needed devices, control user access to files and systems, as well as

Persistent Threat Information Security/Advanced Persistent
Words: 2653 Length: 9 Document Type: Research Paper

They include the use of stealthy tactics, tools and techniques in order to avoid detection by antimalware software. The second goal is to create a backdoor that allows the attackers to gain greater access to the compromised software especially if other access points are discovered or patched. The third goal is to initiate the primary mission of the attackers which may be to steal sensitive information, monitor communications or

Computer Vulnerabilities Computer Security Vulnerabilities the Extent...
Words: 1375 Length: 5 Document Type: Research Paper

Computer Vulnerabilities Computer Security Vulnerabilities The extent of the problem This is not a small issue. The book "Analyzing Computer Security" lays out the following scenario: "First, 20 million U.S. smart phones stop working. Next follow outages in wireline telephone service, problems with air traffic control, disruptions to the New York Stock Exchange, and eventually severe loss of power on America's East Coast" (Pfleeger & Pfleeger, 2011, 3). The authors are talking about

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now