Virus Attack Prevention

Topics: Intrusion detection system, Computer security, Computer virus Pages: 2 (595 words) Published: August 10, 2008
Virus Attack Prevention

Based on Hulme (2004) article, many companies are now using firewalls, antivirus software and intrusion detection systems, but hackers and worms still break through business systems and cause serious damage. Lately it seems that more and more prevention and protection is required. Based on the article, attacks such as Blaster, MyDoom, and Witty cost businesses more than ten billion dollars a year. There is a need for more intelligent shields to ward off new attacks as they happen, instead of relying on signatures. Intrusion-prevention systems are what companies need to protect vulnerable computers and stop unforeseen attack methods (Hulme, 2004). The only way to make sure of protection before an attack is to integrate security technology and policies with regular and effective backups of systems, and important data. Virus attacks are becoming more sophisticated and often combine several types of threats to maximize impact against organizations.

Companies are searching for new and better technologies to block threats. According to Michael Assante, “Intrusion-prevention systems have a learning capability, intelligent, and are better able to identify and stop attacks. Since attacks are happening too fast for reactive tools, having these engines would be important to a company. There are primarily two types of intrusion prevention system. Host based is one type, which protects systems such as servers, and personal computers. Network based is the second type, which protect traffic from attacks (Hulme, 2004). Intrusion prevention systems use chunks of code that protect against potential attacks aimed at known software vulnerabilities. Many intrusion prevention systems can learn normal application and network behavior to block bad activities, like a file trying to infect a system, or a worm getting through application vulnerability and launch a buffer-overflow (Hulme, 2004). In doing more research on attack prevention, I learned that...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Web Application Attacks Prevention Essay
  • U.S. Plans for Cyber Attack Prevention Essay
  • The Attack Essay
  • Computer Virus and Its Prevention Methods Essay
  • Prevention Essay
  • Attack Prevention Paper
  • Website Evaluation-Homeland Security Todays Attack Prevention Essay
  • Detection and Prevention of Distributed Ddos Attacks Essay

Become a StudyMode Member

Sign Up - It's Free