Virus Attack Prevention

Only available on StudyMode
  • Download(s) : 87
  • Published : August 10, 2008
Open Document
Text Preview
Virus Attack Prevention

Based on Hulme (2004) article, many companies are now using firewalls, antivirus software and intrusion detection systems, but hackers and worms still break through business systems and cause serious damage. Lately it seems that more and more prevention and protection is required. Based on the article, attacks such as Blaster, MyDoom, and Witty cost businesses more than ten billion dollars a year. There is a need for more intelligent shields to ward off new attacks as they happen, instead of relying on signatures. Intrusion-prevention systems are what companies need to protect vulnerable computers and stop unforeseen attack methods (Hulme, 2004). The only way to make sure of protection before an attack is to integrate security technology and policies with regular and effective backups of systems, and important data. Virus attacks are becoming more sophisticated and often combine several types of threats to maximize impact against organizations.

Companies are searching for new and better technologies to block threats. According to Michael Assante, “Intrusion-prevention systems have a learning capability, intelligent, and are better able to identify and stop attacks. Since attacks are happening too fast for reactive tools, having these engines would be important to a company. There are primarily two types of intrusion prevention system. Host based is one type, which protects systems such as servers, and personal computers. Network based is the second type, which protect traffic from attacks (Hulme, 2004). Intrusion prevention systems use chunks of code that protect against potential attacks aimed at known software vulnerabilities. Many intrusion prevention systems can learn normal application and network behavior to block bad activities, like a file trying to infect a system, or a worm getting through application vulnerability and launch a buffer-overflow (Hulme, 2004). In doing more research on attack prevention, I learned that...
tracking img