Verified Document

Malware Since The Earliest Days Term Paper

However, nothing can be done until the malware actually occurs. With all the different viruses, worms and Trojans, how can security managers possibly predict what malware will occur next? In contrast, a behavioral rule defines legitimate activity in a system. Any activity not matching the profile will cause the security product to be triggered. As rules are not specific to a particular type of attack, they can block malicious behavior without having to recognize the precise attack used. Thus, there is additional protection against new attacks as they emerge. It is to effectively prevent any unauthorized applications, including malicious code and Trojans. or, it could protect a webserver by making it impossible for anyone to access the webserver to change the files and limiting the risk of a hack (Franklin, 2002). However, the dilemma comes how many rules should the system have? The security manager must decide between an effective security procedure and a low number of false alarms. Applying too many rules will keep the company from meeting its basic business objectives and becomes very difficult to maintain. However, not using enough rules allows the application to proceed unchecked and potential malicious intrusion. In addition, because computer systems are continually changing, rule and signature changes are necessary for each server with every system change. This makes the rules-based solutions not only inaccurate, but also impractical to use across the enterprise on production systems. If one makes a system more secure, it makes a system harder to use, and vice versa.

There is no easy answer to the...

Because of this, efforts must be taken at different levels. The states should continue to pass laws against computer crime. Companies need to find the balance between too many and not enough rules. They also have to continually educate their people who have their hands on a great deal of valuable information. As long as there are individuals who are willing to take unethical or illegal steps for personal gain, processes have to be in place to prevent them.
References Cited

Bowyer, K.W. (2003). "Living responsibly in a computerized world." Ethics and Computing. New York: IEEE press.

Control Guard. http://www.controlguard.com/index.asp

Franklin, I. (November 26, 2002) "Entercept Security Technologies: Rules or signatures?

The best method of prevention." Toolbox. Retrieved from website September 16,

2006. http://security.ittoolbox.com/documents/peer-publishing/rules-or-best-method-of-prevention-3212.

National Conference of State Legislators (July 13, 2006). "2006 State Legislation

Relating to Internet Spyware or Adware." Website retrieved September 15, 2006.

Smith, R.E. (September 7, 2006) "Laptop Hall of Shame" Forbes.com. Website Retrieved September 16, 2006.

http://www.forbes.com/columnists/2006/09/06/laptops-hall-of-shame-cx_res_0907laptops.html.

Viruslist. "Malware" Website retrieved September 16, 2006. http://www.virusbtn.com.

Wikipedia. (September 16, 2006) "Malware." Website retrieved September 17, 2006.

http://en.wikipedia.org/wiki/Malware

Sources used in this document:
References Cited

Bowyer, K.W. (2003). "Living responsibly in a computerized world." Ethics and Computing. New York: IEEE press.

Control Guard. http://www.controlguard.com/index.asp

Franklin, I. (November 26, 2002) "Entercept Security Technologies: Rules or signatures?

The best method of prevention." Toolbox. Retrieved from website September 16,
2006. http://security.ittoolbox.com/documents/peer-publishing/rules-or-best-method-of-prevention-3212.
http://www.forbes.com/columnists/2006/09/06/laptops-hall-of-shame-cx_res_0907laptops.html.
Viruslist. "Malware" Website retrieved September 16, 2006. http://www.virusbtn.com.
http://en.wikipedia.org/wiki/Malware
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber-Crime, Cyber-Terrorism, and Cyber-Warfare Since
Words: 2784 Length: 10 Document Type: Research Paper

Contemporary Cyber-warfare Cases Studies In 2011, the Center for Strategic and International Studies published Significant Cyber Incidents Since 2006 (Lewis, 2011) as part of its Cyber and Internet Policy, Technology and Public Policy Program. Among the incidents detailed in that report, referenced by their year of occurrence: 2007 After officials in former-Soviet Estonia removed a World War II memorial from its capital city of Tallinn in the Spring of 2007, a large-scale cyber-attack

IT Management OS Systems History OS Systems
Words: 1218 Length: 4 Document Type: Essay

IT Management OS Systems History OS Systems History and Recommendations for Use "An OS is a program that controls the execution of application programs and acts as an interface between applications and the computer hardware," and is thus a crucial part in modern technology within a business context (Stallings 2009 p 51). Such systems help run software, provide access to needed devices, control user access to files and systems, as well as

Computer Hacker Nefarious Notions III
Words: 9646 Length: 35 Document Type: Term Paper

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Protecting Against Cyberthreats During a Global Covid 19 Pandemic
Words: 4298 Length: 14 Document Type: Research Paper

New Solutions to New Threat: Optimizing the Remote Work Environment during a Global COVID- PandemicGiven the continuous political turmoil emanating from the nation’s capital for the past three and a half years, few observers would likely have regarded 2019 as “the good old days,” but the multiple crises of an ongoing global COVID-19 pandemic combined with a devastated economy, massive unemployment and growing unrest over racial disparities underscore just how

Crime Workplace Is Not Safe From Numerous
Words: 3278 Length: 11 Document Type: Essay

Crime Workplace is not safe from numerous types of crimes. These crimes can range anywhere from burglary to homicides and from discrimination on the basis of sex to even rape for that matter. But these crimes are physical crimes and it is easy to avoid them or keep them at bay by making use of physical barriers, security cameras and a few sensible risk/security management tactics. For instance, if only

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now