TITLE

Worm outbreak has managers fishing for answers

AUTHOR(S)
McNamara, Paul
PUB. DATE
June 1999
SOURCE
Network World;06/21/99, Vol. 16 Issue 25, p11
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on computer network managers' efforts to address the security risks posed by computer viruses. Network managers' reactions to the ExploreZip virus outbreak; Computer virus' impact on Louisville, Colorado-based StorageTek's computer network.
ACCESSION #
2666216

 

Related Articles

  • Fighting to keep networks healthy and virus-free.  // Communications News;May94, Vol. 31 Issue 5, p58 

    Focuses on how to prevent a company's network from being infected by computer viruses. Myths about security approaches according to David Stang of Norman Data Defense Systems; Best method as the one which involves no user intervention.

  • THE FUTURE COMES CRAWLING.  // eWeek;06/04/2001, Vol. 18 Issue 22, p62 

    Introduces a debate on the use of a worm to plug computer network security gaps. Role of a worm called the Cheese Worm.

  • Crackers: Your help is not wanted here.  // eWeek;06/04/2001, Vol. 18 Issue 22, p62 

    Criticizes the use of a worm to plug computer network security gaps. Cheese Worm's utilization of hostile code techniques of trying to hide its presence; Inability of Cheese Worm to solve the real problem; Vulnerable version of Berkeley Internet Name Domain.

  • Detecting And Recovering From A Virus Incident--Part 2. Stone, John // Business Communications Review;Apr2003, Vol. 33 Issue 4, p59 

    Suggests ways for business communication systems to detect and recover from a virus incident. Creation of a cleanup procedure; Investigation of the causes of a virus attack; Improvement of policies, technologies and procedures. INSET: The Security Command Center.

  • Strategies for battling viruses. Musthaler, Linda // Network World;10/22/2001, Vol. 18 Issue 43, p47 

    Focuses on the strategies for protection against computer viruses and security breeches in the United States. Services of the initiative Strategic Technology Protection Program by Microsoft; Availability of tools and methods to monitor Internet-connected systems; Presence of informative virus...

  • Onslaught of E-Mail Viruses Send Companies Scrambling. Lewis, Connie // San Diego Business Journal;8/25/2003, Vol. 24 Issue 34, p6 

    Focuses on the virus protection software used by companies to fight off the invasion of the SoBig virus in San Diego, California. Importance of utilizing different brands of anti-virus software protection; Emphasis on the ability of the software to filter viruses, worms and spam; Use of...

  • Corporate Defense Is Weak Against Virus Invasions. Coffey, Tim // San Diego Business Journal;2/19/2001, Vol. 22 Issue 8, p14 

    Focuses on an increase in number of viruses invading corporate computers. Spread of worm virus called Kournikova; Complexity of codes used to write the viruses; Costs of worker down time; Difficulty in selling security for Internet-based applications and Web sites.

  • High-tech combat for network viruses. West, Diane // National Underwriter / Property & Casualty Risk & Benefits Manag;06/15/98, Vol. 102 Issue 24, p3 

    Focuses on the security problems posed by computer viruses on computer networks. Increase in costs of virus infections; Causes of virus infection; Computer laboratories dedicated to finding solutions for computer viruses.

  • Battle of the bug. Dancer, Helen // Bulletin with Newsweek;09/14/99, Vol. 117 Issue 6191, p82 

    Reports on the development of the Immune System, a neural network that can interrogate networks, identify computer viruses and remove them from the affected system. Approximation of human thought with its capability to recognize patterns and apply computational processes to them; Potential...

  • 'See you later. Thanks.'. Gibbs, Mark // Network World;8/20/2001, Vol. 18 Issue 34, p58 

    Focuses on the exploitation of computer viruses. Failure of spending money on systems security; Need to re-think the reliability issues of networked corporate Personal Computers; Assessment of risk.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics