TITLE

QUICK TIPS FOR ELIMINATING COMPUTER THREATS

AUTHOR(S)
Colby, Kent L.
PUB. DATE
October 2006
SOURCE
Alaska Business Monthly;Oct2006, Vol. 22 Issue 10, p76
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article cites ways on how to office networks may eliminate computer threats such as viruses and spyware. Companies must purchase or secure a commercial-off-the-shelf software program to mitigate potential threats. The program is designed to identify and quarantine viruses. They may also use Code Sequence Identification technology to identify new and unknown variants of known targets. Companies may also create a standard requirement on the viewing pane of incoming electronic mail.
ACCESSION #
22712559

 

Related Articles

  • The first wireless worm? Munro, Ken // SC Magazine: For IT Security Professionals (UK Edition);Feb2007, p21 

    The article discusses the security threats arising from wireless ad-hoc connections of computers. Laptops connected to wireless networks are more vulnerable to computer crimes. Wireless connections could spread from one laptop to another, resulting to uncontrolled propagation of the connection....

  • Network Security in the Workplace. Williams, Coleen Madonna Flood // Alaska Business Monthly;Apr2001, Vol. 17 Issue 4, p98 

    Focuses on computer network security as an essential but often overlooked business component. Preventative savings in maintaining the safety and integrity of a company's reputation, client trust and sales; Investment in firewalls, virus protection, intrusion systems and support; Computer...

  • Virus Hoax.  // Network Dictionary;2007, p517 

    A definition of the term "Virus Hoax" is presented. It refers to a false warning about a computer virus. The warning usually arrives either through an e-mail or through a note distributed in a company's internal network. The notes are forwarded using distribution lists and they will suggest that...

  • On the lookout for spyware. Messmer, Ellen // Network World;8/16/2004, Vol. 21 Issue 33, p21 

    Organizations are increasingly eyeing spyware as a threat that needs to be blocked from reaching end users' desktops. A catchword for software programs that watch what end users are doing at their computers, spyware is said to encompass everything from marketing cookies, pop-ups and adware...

  • All-out blitz against Web app attacks. Desmond, Paul // Network World;5/17/2004, Vol. 21 Issue 20, p47 

    Armed with Web application firewalls, intrusion-protection systems and vulnerability scanners, companies can defend against application-level cyber attacks.One of the best forms of defense against application-layer attacks is to avoid following the crowd because attackers typically target the...

  • Quick tips for Web application security. Powell, Thomas // Network World;5/17/2004, Vol. 21 Issue 20, p50 

    This article presents tips on improving Web application security. First, if one is in charge of designing or administrating a public Web site, one has to embrace the fact that one cannot trust one's users. One should always err on the side of caution. Second, one has to keep a low profile by...

  • Dangers lurk in file sharing.  // e.learning age;Jul/Aug2004, p27 

    Cautions business enterprises against accessing peer-to-peer sites on enterprise networks. Security issues that arise due to site access; Disadvantages of peer-to-peer file sharing; Percentage of the most popular files shared on KaZaa in 2003 that contained viruses, worms or Trojan horses.

  • The Great Wall. E. B. // Entrepreneur;Apr2004, Vol. 32 Issue 4, p38 

    In the mind-boggling complex world of Internet security a firewall's role seems straightforward. It's software and hardware that sits between consumer's computers and the Internet, keeping the nasty stuff out. But firewalls come in many guises, playing a more complex role as threats broaden and...

  • Cyberfraud and Computer Crime. Cheney // Strategic Finance;Nov99, Vol. 81 Issue 5, p38 

    The article offers tips on how to prevent computer crime, cyberfraud, and Internet invasion. Experts advise companies to prioritize their information assets according to their worth to the firm. Once assets are prioritized and defense mechanisms put in place companies should institute a disaster...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics