版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1BasicComponents2ThreatsandAttacks3SecurityStrategy4MeasurestoProtectComputerSecurity5MalwareLeadin
Thetermcomputersecurityisusedfrequently,butthecontentofacomputerisvulnerabletofewrisksunlessthecomputerisconnectedtoothercomputersonanetwork.Astheuseofcomputernetworks,especiallytheInternet,hasbecomepervasive,theconceptofcomputersecurityhasexpandedtodenoteissuespertainingtothenetworkeduseofcomputersandtheirresources.1BasicComponents
ThemajortechnicalareasofcomputersecurityareusuallyrepresentedbytheinitialsCIA:confidentiality,integrity,andavailability.BasicComponents1
Confidentialityistheconcealmentofinformationorresources.Theneedforkeepinginformationsecretarisesfromtheuseofcomputersinsensitivefieldssuchasgovernmentandindustry.Forexample,militaryandcivilianinstitutionsinthegovernmentoftenrestrictaccesstoinformationtothosewhoneedthatinformation.Asafurtherexample,alltypesofinstitutionskeeppersonnelrecordssecret.Accesscontrolmechanismssupportconfidentiality.Oneaccesscontrolmechanismforpreservingconfidentialityiscryptography,whichscramblesdatatomakeitincomprehensible.BasicComponents1Confidentiality
Integrityreferstothetrustworthinessofdataorresources,anditisusuallyphrasedintermsofpreventingimproperorunauthorizedchange.Integrityincludesdataintegrity(thecontentoftheinformation)andoriginintegrity(thesourceofthedata,oftencalledauthentication).Workingwithintegrityisverydifferentfromworkingwithconfidentiality.Withconfidentiality,thedataiseithercompromisedoritisnot,butintegrityincludesboththecorrectnessandthetrustworthinessofthedata.Theoriginofthedata(howandfromwhomitwasobtained),howwellthedatawasprotectedbeforeitarrivedatthecurrentmachine,andhowwellthedataisprotectedonthecurrentmachineallaffecttheintegrityofthedata.BasicComponents1Integrity
Availabilityreferstotheabilitytousetheinformationorresourcedesired.Availabilityisanimportantaspectofreliabilityaswellasofsystemdesignbecauseanunavailablesystemisatleastasbadasnosystematall.Theaspectofavailabilityrelevanttosecurityisthatsomeonemaydeliberatelyarrangetodenyaccesstodataortoaservicebymakingitunavailable.“Denialofservice(DoS)”attacksareattacksagainstavailability.BasicComponents1Availability2ThreatsandAttacks
Athreatisapotentialviolationofsecurity.Anattackisanyattempttodestroy,expose,alter,disable,stealorgainunauthorizedaccesstoormakeunauthorizeduseofanasset.Thosewhoexecuteattacks,orcausethemtobeexecuted,arecalledattackers.Passiveattackandactiveattackaretwotypesofattacks.Apassiveattackattemptstolearnormakeuseofinformationfromthesystembutdoesnotaffectsystemresourceswhereasanactiveattackattemptstoaltersystemresourcesoraffecttheiroperation.Thethreesecurityservicesconfidentiality,integrity,andavailabilitycounterthreatstothesecurityofasystem.Belowweintroducecommonthreats.ThreatsandAttacks2ThreatsandAttacks2Snooping01
Snoopingisanunauthorizedinterceptionofinformation.Itispassive,suggestingsimplythatsomeentityislisteningto(orreading)communicationsorbrowsingthroughfilesorsysteminformation.Wiretapping,orpassivewiretapping,isaformofsnoopinginwhichanetworkismonitored.(Itiscalled“wiretapping”becauseofthe“wires”thatcomposethenetwork,althoughthetermisusedevenifnophysicalwiringisinvolved.)Confidentialityservicescounterthisthreat.ThreatsandAttacks2
Modificationoralterationisanunauthorizedchangeofinformation.Unlikesnooping,modificationisactive;itresultsfromanentitychanginginformation.Activewiretappingisaformofmodificationinwhichdatamovingacrossanetworkisaltered;theterm“active”distinguishesitfromsnooping.Anexampleistheman-in-the-middle(MITM)attack,inwhichanintruderreadsmessagesfromthesenderandsends(possiblymodified)versionstotherecipient,inthehopethattherecipientandthesenderwillnotrealizethepresenceoftheintermediary.[1]Integrityservicescounterthisthreat.02ModificationThreatsandAttacks2
Masqueradingorspoofingisanimpersonationofoneentitybyanother.Itluresavictimintobelievingthattheentitywithwhichitiscommunicatingisadifferententity.Forexample,ifausertriestologintoacomputeracrosstheInternetbutinsteadreachesanothercomputerthatclaimstobethedesiredone,theuserhasbeenspoofed.Similarly,ifausertriestoreadafile,butanattackerhasarrangedfortheusertobegivenadifferentfile,anotherspoofhastakenplace.Thismaybeapassiveattack(inwhichtheuserdoesnotattempttoauthenticatetherecipient,butmerelyaccessesit),butitisusuallyanactiveattack(inwhichthemasqueraderissuesresponsestomisleadtheuseraboutitsidentity).Althoughprimarilydeception,itisoftenusedtousurpcontrolofasystembyanattackerimpersonatinganauthorizedmanager.[2]Integrityservicescounterthisthreat.03MasqueradingThreatsandAttacks2
Repudiationoforiginisafalsedenialthatanentitysent(orcreated)something.Forexample,supposeacustomersendsalettertoavendoragreeingtopayalargeamountofmoneyforaproduct.Thevendorshipstheproductandthendemandspayment.Thecustomerdenieshavingorderedtheproductandbylawisthereforeentitledtokeeptheunsolicitedshipmentwithoutpayment.Thecustomerhasrepudiatedtheoriginoftheletter.Ifthevendorcannotprovethatthelettercamefromthecustomer,theattacksucceeds.Avariantofthisisdenialbyauserthathecreatedspecificinformationorentitiessuchasfiles.Integritymechanismscopewiththisthreat.04RepudiationofOriginThreatsandAttacks2
Denialofservice(DoS)isalong-terminhibitionofservice.Theattackerpreventsaserverfromprovidingaservice.Thedenialmayoccuratthesource(bypreventingtheserverfromobtainingtheresourcesneededtoperformitsfunction),atthedestination(byblockingthecommunicationsfromtheserver),oralongtheintermediatepath(bydiscardingmessagesfromeithertheclientortheserver,orboth).Thisthreatisprobablythenastiest,andmostdifficulttoaddress.Itspremiseissimple:sendmorerequeststothemachinethanitcanhandle.Forexample,ifthehostisabletoanswer20requestspersecondandtheattackerissending50requestspersecond,obviouslythehostwillbeunabletoservealloftheattacker'srequests,muchlessanylegitimaterequests.Availabilitymechanismscounterthisthreat.05DenialofService3SecurityStrategySecurityStrategy3
Preventionmeansthatanattackwillfail.Forexample,ifoneattemptstobreakintoahostovertheInternetandthathostisnotconnectedtotheInternet,theattackhasbeenprevented.Typically,preventioninvolvesimplementationofmechanismsthatuserscannotoverrideandthataretrustedtobeimplementedinacorrect,unalterableway,sothattheattackercannotdefeatthemechanismbychangingit.Preventativemechanismsoftenareverycumbersomeandinterferewithsystemusetothepointthattheyhindernormaluseofthesystem.Butsomesimplepreventativemechanisms,suchaspasswords(whichaimtopreventunauthorizedusersfromaccessingthesystem),havebecomewidelyaccepted.Preventionmechanismscanpreventcompromiseofpartsofthesystem;onceinplace,theresourceprotectedbythemechanismneednotbemonitoredforsecurityproblems,atleastintheory.SecurityStrategy31Prevention
Detectionismostusefulwhenanattackcannotbeprevented,butitcanalsoindicatetheeffectivenessofpreventativemeasures.Detectionmechanismsacceptthatanattackwilloccur;thegoalistodeterminethatanattackisunderway,orhasoccurred,andreportit.Theattackmaybemonitored,however,toprovidedataaboutitsnature,severity,andresults.Typicaldetectionmechanismsmonitorvariousaspectsofthesystem,lookingforactionsorinformationindicatinganattack.Agoodexampleofsuchamechanismisonethatgivesawarningwhenauserentersanincorrectpasswordthreetimes.Theloginmaycontinue,butanerrormessageinasystemlogreportstheunusuallyhighnumberofmistypedpasswords.Detectionmechanismsdonotpreventcompromiseofpartsofthesystem,whichisaseriousdrawback.Theresourceprotectedbythedetectionmechanismiscontinuouslyorperiodicallymonitoredforsecurityproblems.SecurityStrategy32Detection
Recoveryhastwoforms.Thefirstistostopanattackandtoassessandrepairanydamagecausedbythatattack.Asanexample,iftheattackerdeletesafile,onerecoverymechanismwouldbetorestorethefilefrombackuptapes.Inpractice,recoveryisfarmorecomplex,becausethenatureofeachattackisunique.Thus,thetypeandextentofanydamagecanbedifficulttocharacterizecompletely.Moreover,theattackermayreturn,sorecoveryinvolvesidentificationandfixingofthevulnerabilitiesusedbytheattackertoenterthesystem.Insomecases,retaliation(byattackingtheattacker’ssystemortakinglegalstepstoholdtheattackeraccountable)ispartofrecovery.Inallthesecases,thesystem’sfunctioningisinhibitedbytheattack.Bydefinition,recoveryrequiresresumptionofcorrectoperation.SecurityStrategy33Recovery
Inthesecondformofrecovery,thesystemcontinuestofunctioncorrectlywhileanattackisunderway.Thistypeofrecoveryisquitedifficulttoimplementbecauseofthecomplexityofcomputersystems.Itdrawsontechniquesoffaulttoleranceaswellastechniquesofsecurityandistypicallyusedinsafety-criticalsystems.Itdiffersfromthefirstformofrecovery,becauseatnopointdoesthesystemfunctionincorrectly.However,thesystemmaydisablenonessentialfunctionality.Ofcourse,thistypeofrecoveryisoftenimplementedinaweakerformwherebythesystemdetectsincorrectfunctioningautomaticallyandthencorrects(orattemptstocorrect)theerror.[3]SecurityStrategy33Recovery4MeasurestoProtectComputerSecurityMeasurestoProtectComputerSecurity4
Securityisconcernedwithprotectinginformation,hardware,andsoftware.Securitymeasuresconsistofencryption,restrictingaccess,anticipatingdisasters,andmakingbackupcopies.MeasurestoProtectComputerSecurity401020304Encryption
Wheneverinformationissentoveranetwork,thepossibilityofunauthorizedaccessexists.Thelongerthedistancethemessagehastotravel,thehigherthesecurityriskis.Thus,itisofgreatnecessityforindividualsandorganizationstoencrypttheirdata.Encryption,thetranslationofdataintoasecretcode,isthemosteffectivewaytoachievedatasecurity.Toreadanencryptedfile,onemusthaveaccesstoasecretkeyorpasswordthatenableshim/hertodecryptit.Therearetwomaintypesofencryption:symmetricencryptionandasymmetricencryption(alsocalledpublic-keyencryption).MeasurestoProtectComputerSecurity401020304Encryption
Theadvantageofusingsymmetricencryptionliesinitsfastencryptionanddecryptionprocesses(whencomparedwithasymmetricencryptionatthesamesecuritylevel).Thedisadvantagesare,first,theencryptionkeymustbeexchangedbetweentwopartiesinasecurewaybeforesendingsecretmessages.Secondly,onemustusedifferentkeyswithdifferentparties.Forexample,ifAcommunicateswithB,C,DandE,Ashoulduse4differentkeys.Otherwise,BwillknowwhatAandCaswellasAandDhasbeentalkingabout.ThedrawbacksofsymmetrickeyencryptionmakeitunsuitabletobeusedintheInternet,becauseit’sdifficulttofindasecurewaytoexchangetheencryptionkey.MeasurestoProtectComputerSecurity401020304Encryption
Forasymmetricencryption,thereisapairofkeysforeachparty:apublickeyandaprivatekey.Thepublickeyisfreelyavailabletothepublic,butonlythekeyownergetsholdoftheprivatekey.Messagesencryptedbyapublickeycanonlybedecryptedbyitscorrespondingprivatekey,andviceversa.WhenAsendsmessagetoB,AfirstgetsB'spublickeytoencryptthemessageandsendsittoB.Afterreceivingthemessage,Buseshisprivatekeytodecryptthemessage.Theadvantagecomesinthepublickeyfreelyavailabletothepublic,hencefreefromanykeyexchangeproblem.
MeasurestoProtectComputerSecurity401020304Encryption
Thedisadvantageistheslowencryptionanddecryptionprocess.AlmostallencryptionschemesusedintheInternetusesasymmetricencryptionforexchangingthesymmetricencryptionkey,andsymmetricencryptionforbetterperformance.Businesseshavebeenencryptingmessagesforyears.Individualsarealsousingencryptingprogramstosafeguardtheirprivatecommunications.OneofthemostwidelyusedpersonalencryptionprogramsisPrettyGoodPrivacy(PGP).PGPisanE-mailencryptionscheme.Itprovidessecurityservicessuchasprivacy,senderauthentication,messageintegrityandnon-repudiation.Alongwiththesesecurityservices,italsoprovidesdatacompressionandkeymanagementsupport.MeasurestoProtectComputerSecurity4
Securityexpertsareconstantlydevisingwaystoprotectcomputersystemsfromaccessbyunauthorizedpersons.Sometimessecurityisamatterofputtingguardsoncompanycomputerroomsandcheckingtheidentificationofeveryoneadmitted.Oftentimesitisamatterofbeingcarefulaboutassigningpasswordstopeopleandofchangingthemwhenpeopleleaveacompany.Passwordsaresecretwordsornumbersthatmustbekeyedintoacomputersystemtogainaccess.Insome“dial-back”computersystems,theusertelephonesthecomputer,punchesinthecorrectpassword,andhangsup.Thecomputerthencallsbackatacertainpreauthorizednumber.01020304RestrictingAccessMeasurestoProtectComputerSecurity4
Mostmajorcorporationstodayusespecialhardwareandsoftwarecalledfirewallstocontrolaccesstotheirinternalcomputernetworks.Thesefirewallsactasasecuritybufferbetweenthecorporation'sprivatenetworkandallexternalnetworks,includingtheInternet.Alldatapacketsenteringorleavingtheinternalnetworkpassthroughthefirewall,whichexamineseachpacketandblocksthosethatdonotmeetthespecifiedsecuritycriteria.Firewalliscategorizedintothreebasictypes:packetfiltering,applicationgatewaysandcircuit-levelgateways.01020304RestrictingAccessMeasurestoProtectComputerSecurity4PacketfilteringisatechniquewherebyroutershaveACL(AccessControlLists,atableofpacketfilterrules).Bydefault,arouterwillpassalltrafficsenttoit,andwilldosowithoutanysortofrestrictions.EmployingACLsisamethodforenforcingasecuritypolicywithregardtowhatsortsofaccessusersallowtheoutsideworldtohavetousers'owninternalnetwork,andviceversa.[4]Packetsbelongingtoexistingconnectionsarecomparedtothefirewall'sstatetableofopenconnections,anddecisiontoalloworblockistaken.Thisprocesssavestimeandprovidesaddedsecurityaswell.Nopacketisallowedtotrespassthefirewallunlessitbelongstoalreadyestablishedconnection.01020304RestrictingAccessMeasurestoProtectComputerSecurity401020304RestrictingAccess
Anapplicationgateway(sometimesknownasaproxygateway),actsasarelaynodefortheapplication-leveltraffic,asshowninFigure9-1.Theyinterceptincomingandoutgoingpackets,runproxiesthatcopyandforwardinformationacrossthegateway,andfunctionasaproxyserver,preventinganydirectconnectionbetweenatrustedserverorclientandanuntrustedhost.
MeasurestoProtectComputerSecurity401020304RestrictingAccess
Theproxiesareapplicationspecific.TheycanfilterpacketsattheapplicationlayeroftheOSImodel.
Anapplication-specificproxyacceptspacketsgeneratedbyonlyspecifiedapplicationforwhichtheyaredesignedtocopy,forward,andfilter.Forexample,onlyaTelnetproxycancopy,forward,andfilterTelnettraffic.
Ifanetworkreliesonlyonanapplication-levelgateway,incomingandoutgoingpacketscannotaccessservicesthathavenoproxiesconfigured.Forexample,ifagatewayrunsFTPandTelnetproxies,onlypacketsgeneratedbytheseservicescanpassthroughthefirewall.Allotherservicesareblocked.Applicationgatewayscanrestrictspecificactionsfrombeingperformed.Forexample,thegatewaycouldbeconfiguredtopreventusersfromperformingthe“ftp_put”[5]command.Thiscanpreventmodificationoftheinformationstoredontheserverbyanattacker.MeasurestoProtectComputerSecurity401020304RestrictingAccess
Thecircuit-levelgatewayisanintermediatesolutionbetweenthepacketfilterandtheapplicationgateway.Itrunsatthetransportlayerandhencecanactasproxyforanyapplication.Similartoanapplicationgateway,thecircuit-levelgatewayalsodoesnotpermitanend-to-endTCPconnectionacrossthegateway.ItsetsuptwoTCPconnectionsandrelaystheTCPsegmentsfromonenetworktotheother,butitdoesnotexaminetheapplicationdatalikeapplicationgateway.MeasurestoProtectComputerSecurity401020304AnticipatingDisasters
Thedisadvantageistheslowencryptionanddecryptionprocess.AlmostallencryptionschemesusedintheInternetusesasymmetricencryptionforexchangingthesymmetricencryptionkey,andsymmetricencryptionforbetterperformance.Businesseshavebeenencryptingmessagesforyears.Individualsarealsousingencryptingprogramstosafeguardtheirprivatecommunications.OneofthemostwidelyusedpersonalencryptionprogramsisPrettyGoodPrivacy(PGP).PGPisanE-mailencryptionscheme.Itprovidessecurityservicessuchasprivacy,senderauthentication,messageintegrityandnon-repudiation.Alongwiththesesecurityservices,italsoprovidesdatacompressionandkeymanagementsupport.MeasurestoProtectComputerSecurity401020304Backup
Equipmentcanalwaysbereplaced.Data,however,maybeirreplaceable.Mostcompanieshavewaysoftryingtokeepsoftwareanddatafrombeingtamperedwithinthefirstplace.Theyincludecarefulscreeningofjobapplicants,guardingofpasswords,andauditingofdataandprogramsfromtimetotime.Thesafestprocedure,however,istomakefrequentbackupsofdataandtostoretheminremotelocations.5MalwareMalware5Malware,shortformalicioussoftware,isanysoftwareusedtodisruptcomputeroperations,gathersensitiveinformation,gainaccesstoprivatecomputersystems,ordisplayunwantedadvertising.Beforethetermmalwarewascoinedin1990,malicioussoftwarewasreferredtoascomputerviruses.Malwareisdefinedbyitsmaliciousintent,actingagainsttherequirementsofthecomputeruser,anddoesnotincludesoftwarethatcausesunintentionalharmduetosomedeficiency.
Malwarecanbedividedintotwocategories:thosethatneedahostprogram,andthosethatareindependent.Theformer,referredtoasparasitic,areessentiallyfragmentsofprogramsthatcannotexistindependentlyofsomeactualapplicationprogram,utilityorsystemprogram.Virusesandlogicbombsareexamples.Thelatterareself-containedprogramsthatcanbescheduledandrunbytheoperationsystem.Wormsandbotprogramsareexamples.1TypesofMalwareMalware51.VirusComputervirusesareself-replicatingprogramsdeliberatelydesignedtointerferewithcomputeroperation,record,corrupt,ordeletedata,orspreadthemselvestoothercomputersandthroughouttheInternet.Theyfirstappearedintheearly1980s,andthetermitselfwascoinedin1983.Whenthecodeofavirusisexecuted,itspreadsitselftootherprograms.Atypicalcomputervirusdoestwothings.First,itcopiesitselfintopreviouslyuninfectedprograms.Second,itexecutesotherinstructionsthattheviruscreatorhasincludedinit.Whenevertheinfectedcomputercomesintocontactwithanuninfectedpieceofsoftware,afreshcopyoftheviruspassesintothenewprogram.Thus,theinfectioncanbespreadfromcomputertocomputerbyunsuspectinguserswhoeitherswapdisksorsendprogramstooneanotheroveranetwork.Inanetworkenvironment,theabilitytoaccessapplicationsandsystemservicesonothercomputerprovidesaperfectconditionforthespreadofavirus.Malware5
Muchlikehumanviruses,computervirusescanrangeinvariety.Somevirusescauseonlymildlyannoyingeffectswhileotherscandamagesoftwareorfiles.Theyoftenslowthingsdownandcauseotherproblemsintheprocess.Malware52.Worm
Awormissimilartoavirusbyitsdesign,andisconsideredtobeasub-classofavirus.Wormsspreadfromcomputertocomputer,butunlikeavirus,ithasthecapabilitytotravelwithoutanyhelp.Awormtakesadvantageoffileorinformationtransportfeaturesonthesystem,whichallowsittotravelunaided.Thebiggestdangerwithawormisitscapabilitytoreplicateitselfonthecomputersystem.Forexample,awormcansendacopyofitselftoeveryonelistedinusers'E-mailaddressbook.Duetoitscopyingnatureandcapabilitytotravelacrossnetworks,theendresultinmostcasesisthatthewormconsumestoomuchsystemmemoryornetworkbandwidth,causingWebservers,networkserversandindividualcomputerstostopresponding.[7]Malware5
3.TrojanHorseATrojanhorseisfullofasmuchtrickeryasthemythological“TrojanHorse”itwasnamedafter.Unlikevirusesandworms,Trojanhorsesdonotreproducebyinfectingotherfilesnordotheyself-replicating.TheTrojanhorse,atfirstglancewillappeartobeusefulsoftwarebutwillactuallydodamageonceinstalledorrunonthecomputer.ThoseonthereceivingendofaTrojanhorseareusuallytrickedintoopeningthembecausetheyappeartobereceivinglegitimatesoftwareorfilesfromalegitimatesource.WhenaTrojanhorseisactivatedonthecomputer,theresultscanvary.SomeTrojansaredesignedtobemoreannoyingthanmaliciousortheycancauseseriousdamagebydeletingfilesanddestroyinginformationonthesystem.Trojansarealsoknowntocreateabackdooronthecomputerthatgivesmalicioususersaccesstothesystem,possiblyallowingconfidentialorpersonalinformationtobecompromised.Malware54.LogicBomb
Thelogicbombisoneoftheoldesttypesofprogramthreat.Itisapieceofcodeintentionallyembeddedinasoftwaresystemthatissetto“explode”whenspecifiedconditionsaremet.Examplesofsuchconditionsthatcanbeusedastriggersforalogicbombarepresenceorabsenceofcertainfiles,aparticulardayoftheweekordate,oraparticularuserrunningtheapplication.Oncetriggered,abombmayalterordeletedataorentirefiles,causeamachinehalt,ordosomeotherdamage.Malware55.Bot
Abot,alsoknownasazombieordrone,isaprogramthatsecretlytakesoveranotherInternet-attachedcomputerandthenusesthatcomputertolaunchattacksthataredifficulttotracetothebot'screator.Thebotistypicallyplantedonhundredsorthousandsofcomputersbelongingtounsuspectingthirdparties.Thecollectionofbotsofteniscapableofactinginacoordinatedmanner;suchacollectionisreferredtoasabotnet.BotnetshavebeenusedmanytimestosendspamE-mailorparticipateindistributeddenial-of-serviceattacks.Theyareincreasinglyrentedoutbycybercriminalsascommoditiesforavarietyofpurposes.Malware56.Blended-ThreatMalware
Ablendedthreatisasophisticatedattackthatbundlessomeoftheworstaspectsofviruses,worms,Trojanhorsesandmaliciouscodeintoonethreat.BlendedthreatsuseserverandInternetvulnerabilitiestoinitiate,transmitandspreadanattack.Thiscombinationofmethodandtechniquesmeansblendedthreatscanspreadquicklyandcausewidespreaddamage.AnexampleofablendedattackistheNimdaattack[8],whichusesfourdistributionmethods:E-mail,Windowsshares,Webservers,andWebclients.Blendedthreatsareconsideredtobetheworstrisktosecuritysincetheinceptionofviruses,asmostblendedthreatsrequirenohumaninterventiontospread.Malware5
Tocombatmalware,thefirststepistomakesurethatthecomputer'soperatingsystemisup-to-date.Thelatestversionoftheoperatingsystemwillrestoretheexistingbugsandhencestrengthenthesystem'scapabilitytoresistpotentialmalware.Thesecondstepistoinstallanti-virussoftware.Mostoftoday'santi-virussoftwareisdesignedtocombatawiderangeofthreats,includingallmalwarewementionedabove.Theycanidentify,neutralizeoreveneliminatemalwarebyusingtwoapproaches.Thefirstapproachisexaminingorscanningfilestolookforknownvirusesmatchingdefinitioninavirusdictionary.Thesecondisidentifyingsuspiciousbehaviorfromanycomputerprogramwhichmightindicateinfection.Mostcommercialanti-virussoftwareusesbothoftheseapproaches,withanemphasisonthevirusdictionaryapproach.2CombatingMalwareMalware5
Additionally,installingafirewallisofgreatnecessitytocombatmalware.Aswementionedpreviously,afirewallcanbeeitherhardwareorsoftware.Hardwarefirewallsprovideastrongdegreeofprotectionfrommostformsofattackcomingfromtheoutsideworldandcanbepurchasedasastand-aloneproductorinbroadbandrouters.Unfortunately,whenbattlingviruses,wormsandTrojans,ahardwarefirewallmaybelesseffectivethanasoftwarefirewall,asitcouldpossiblyignoreembeddedwormsinoutgoingE-mailsandseethisasregularnetworktraffic.Forindividualhomeusers,themostpopularfirewall
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 护理职业素养课件下载
- 护理基本急救技能
- 护理与无痛护理技术
- 吉林省松原市前郭尔罗斯蒙古族自治县第五高级中学等校2025-2026学年高二下学期5月期中考试历史试卷(无答案)
- 空管自动化系统机务员风险评估水平考核试卷含答案
- 2026年新科教版高中高一历史下册第一单元明清社会发展特征卷含答案
- 电池制造工QC管理水平考核试卷含答案
- 2026年新科教版高中高二物理上册第三单元洛伦兹力应用卷含答案
- 循环冷却水操作工班组管理测试考核试卷含答案
- 高压釜温控工操作规范竞赛考核试卷含答案
- 2026年广东东莞市中考数学二模模拟试卷试题(含答案详解)
- 人教版五年级语文上册第八单元:《青山处处埋忠骨》教案:通过情境朗读家国情怀引导学生理解担当落实革命文化启蒙培育责任意识与表达素养
- 活性炭吸附装置操作规程
- 不甘屈辱奋勇抗争
- 铁路路基病害
- 2023同等学力政治学真题真题啊
- GB/T 40005-2021精细陶瓷强度数据的韦布尔统计分析方法
- 第十一章组织层面的环境管理课件
- 综采工作面作业规程(终极版)
- 高空作业专项施工方案(DOC)
- 2022年上海见证员考试试题
评论
0/150
提交评论