AVIEN malware defense guide for the Enterprise

Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to m...

Descripción completa

Detalles Bibliográficos
Otros Autores: Harley, David (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, MA : Syngress 2007.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627578006719
Tabla de Contenidos:
  • Front Cover; AVIEN Malware Defense Guide for the Enterprise; Copyright Page; Lead Author and Technical Editor; Foreword Author; Contributors; Contents; Foreword; Preface; Introduction; Chapter 1: Customer Power and AV Wannabes; Introduction; History of AVIEN and AVIEWS; Background: So Who Is Robert Vibert?; AV Vendor/Researcher Lists and Groups; VB 2000: A Star is Born; Cocktails For Two - and More; After the Hangover; One Day at a Time; Oh No,The Users Are Ganging Up On Us!!!; The Objectives of AVIEN and AVIEWS; AVIEN Membership Benefits; Alerts and Advisories; Peer Discussions
  • AVIEN ProjectsAnti-virus Vendor Image; AVIEN & AVIEWS: Independents and Vendors in Anti-Malware Research; Favorite Myths; "Anti-virus Only Catches Known Viruses"; "Vendors Protect Their Own Revenue Stream, Not Their Customers"; "Vendors Only Know About and Detect Viruses"; "They Write All the Viruses"; "Anti-virus Should Be a Free Service: After All, There Are Free Services That Do a Better Job"; AV Wannabe; So You Want to Be a Bona Fide Computer Anti-Malware Researcher?; In the Beginning...; Anti-virus Company Analysts; Independent Researchers; Technical and Psychological Analysts
  • Corporate Anti-virus SpecialistWhat is a Researcher?; Researcher Skill-Set; What Makes a Researcher?; In The End; You Should Be Certified; (ISC)2; SSCP; CISSP; CISSP Concentrations; SANS GIAC/GSM Certifications; Other Certifications and Qualifications; Vendor-Dependent Training; McAfee; Sophos; Symantec; Should There Be a Vendor-independent Malware Specialist Certification?; Levels of Certification and Associated Knowledge Bases; Certified Anti-Virus Administrator (CAVA); Certified Anti-virus Specialist (CAVS); Certified Enterprise Anti-virus Architect (CEAVA); Updating the Certifications
  • SummarySolutions Fast Track; Frequently Asked Questions; Chapter 2: Stalkers on Your Desktop; Introduction; Malware Nomenclature; 21st Century Paranoid Man; In The Beginning; The Current Threatscape; The Rise of Troy; Rootkits; Kernel Mode and User Mode; Persistency and Non-Persistency; Rootkit Detection; Words Can Hurt You; Spam, Spam, Spam; Fraudian Slips; Advance Fee Fraud (419s); Phishing Scams; Or Would You Rather Be a Mule?; Pump and Dump Scams; Hoaxes and Chain Letters; Why Do People Pass Hoaxes and Chain Letters On?; Summary; Solutions Fast Track; Frequently Asked Questions
  • Chapter 3: A Tangled WebIntroduction; Attacks on the Web; Hacking into Web Sites; Index Hijacking; DNS Poisoning (Pharming); Malware and the Web: What, Where, and How to Scan; What to Scan; Where to Scan; How to Scan; Parsing and Emulating HTML; Browser Vulnerabilities; Testing HTTP-scanning Solutions; Tangled Legal Web; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4: Big Bad Botnets; Introduction; Bot Taxonomy; How Botnets are Used; DoS and DDoS ATTACKS; SYNs and Sensibility; UDP Flooding; ICMP Attacks; DNS Reflector Attacks; Managing DoS and DDoS Attacks
  • The Botnet as Spam Tool