From Threat Detection to Information Protection

Paquette, Mike
June 2007
Security: Solutions for Enterprise Security Leaders;Jun2007, Vol. 44 Issue 6, p50
Trade Publication
The article focuses on the issue concerning computer security in relation to malware. It defines the potentials of malware in attacking computers, and cites some forms of malware such as keystroke loggers and screen-scrapers. According to the author, the computer attacks of today begin with socially clever schemes that compromise computers with malware. He explains the evolution of network-based security systems to protect computers.


Related Articles

  • The New Era in Netcentric Security. LEGGIERE, PHILIP // HS Today;Jan2009, Vol. 6 Issue 1, p36 

    The article explores the new era of netcentric security. The evolution of organized crime marked the development of Web-based malware. Technological, educational and legal components encompass the multi-dimensional challenge of combating cybercrime. Among the educational initiatives to address...

  • Cybercrime: A threat to Network Security. Yassir, Ammar; Nayak, Smitha // International Journal of Computer Science & Network Security;Feb2012, Vol. 12 Issue 2, p84 

    This research paper discusses the issue of cyber crime in detail, including the types, methods and effects of cyber crimes on a network. In addition to this, the study explores network security in a holistic context, critically reviewing the effect and role of network security in reducing...

  • Security and the Internet.  // OECD Observer;Jul2008, Issue 268, p10 

    The article focuses on the significance of computer security in preventing malwares. It cites that there are a lot of virus ready to attack computer systems such as Archveus and Trojan. It mentions that computer security companies are overwhelmed by the amount of malware penetrating the...

  • Viruses 'winning the war' Fisher, Dennis // eWeek;3/8/2004, Vol. 21 Issue 10, p9 

    This article presents an analysis on the threat of computer viruses. The threats which are variants of previous malware, such as Bagle, Netsky or MyDoom, did not spread widely or do much damage. IT managers say that with several threats showing up daily, few enterprises can keep up. Focus on...

  • Security News and Products.  // Database & Network Journal;Dec2011, Vol. 41 Issue 6, p30 

    The article offers new briefs related to information security in Great Britain. The Global Information Security Workforce Study revealed that application vulnerability ranked as the number one threat in 2011. A research from Amit Klein has been released which revealed that cybercriminals are...

  • PROTECTING GUEST DATA: What to Do about Malware. Goodendorf, Lynn // Hospitality Upgrade;Summer2011, p180 

    The article discusses the result of the 2010 Data Breach Investigation Report by Verizon and the U.S. Secret Service, which revealed that 85% of cyber attacks were not considered highly difficult. It mentions the importance of taking actions to prevent malware infection, which is being used by...

  • SSH PROBES: THE PRICE OF UNIX MAINSTREAMING? Kikkas, Kaido // Proceedings of the IADIS International Conference on WWW/Interne;Nov2005, p175 

    Security has gradually risen to be one of the key fields in today's Internet. Easily-operated personal computers and fast broadband connections have multiplied the user base - at the cost of the average technical knowledge level. This has resulted in epidemic spread of malware, viruses and worms...

  • Protecting IMS Networks From Attack. Kurapati, Krishna // Business Communications Review;Sep2006, Vol. 36 Issue 9, p40 

    The article offers a look at application-level attacks, which the author claims are on the rise in business enterprises. The article suggests that in order to cope, network operators who plan to offer Internet-based services using IP Multimedia Subsystem (IMS) must go to great lengths to protect...

  • IBM Report: Stealthy, Targeted Online Attacks Continue To Grow In 2007.  // Software World;Sep2007, Vol. 38 Issue 5, p17 

    The article reports on statistics which explores the growth of malicious software (malware) volume and sophistication in exploit leasing in Great Britain. Based on the 2006 International Business Machines Corp.'s (IBM's) X-Force research and development team, providers managed to purchase...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics