Top-Rated Free Essay
Preview

Virus Attack Prevention

Good Essays
595 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Virus Attack Prevention
Virus Attack Prevention

Based on Hulme (2004) article, many companies are now using firewalls, antivirus software and intrusion detection systems, but hackers and worms still break through business systems and cause serious damage. Lately it seems that more and more prevention and protection is required. Based on the article, attacks such as Blaster, MyDoom, and Witty cost businesses more than ten billion dollars a year. There is a need for more intelligent shields to ward off new attacks as they happen, instead of relying on signatures. Intrusion-prevention systems are what companies need to protect vulnerable computers and stop unforeseen attack methods (Hulme, 2004). The only way to make sure of protection before an attack is to integrate security technology and policies with regular and effective backups of systems, and important data. Virus attacks are becoming more sophisticated and often combine several types of threats to maximize impact against organizations.

Companies are searching for new and better technologies to block threats. According to Michael Assante, “Intrusion-prevention systems have a learning capability, intelligent, and are better able to identify and stop attacks. Since attacks are happening too fast for reactive tools, having these engines would be important to a company. There are primarily two types of intrusion prevention system. Host based is one type, which protects systems such as servers, and personal computers. Network based is the second type, which protect traffic from attacks (Hulme, 2004). Intrusion prevention systems use chunks of code that protect against potential attacks aimed at known software vulnerabilities. Many intrusion prevention systems can learn normal application and network behavior to block bad activities, like a file trying to infect a system, or a worm getting through application vulnerability and launch a buffer-overflow (Hulme, 2004). In doing more research on attack prevention, I learned that blended threats are more complex and a single security technology is not sufficient enough to defend against attacks. Effective protection from blended threats requires a security solution that has a multiple layers of defense, and response mechanism. Creating a defense barrier that includes an antivirus, firewall, content filtering, vulnerability management, and intrusion detection measures will make systems difficult for intruders to access sensitive data. All parts of the network should be protected with a response in place to provide security at all levels. Creating backups is very important in a business. But companies are not verifying their recoverability. This can lead to false backup, when a company assumes their data is secured, then finding out after a virus attack, that the backups failed and data was lost. Test recoveries should be scheduled regularly to ensure backup procedures are working like they should.
As threats quickly revolve and become more complex, managing these threats can become a great challenge for businesses. Companies need to have a good security policy in place; especially in employees are connected to an internal network with attached servers containing programs or important data. Once a virus gets through a security defense, it can quickly go through the system, destroying files, corrupting data, and make applications useless. Using a multiple layer of security, such as, running antivirus software, keeping virus definitions up-to-date, and enforcing regular backup schedules, can prevent attacks. Prevention is always the best security policy.

References
Hulme, G. (2004, October 11). Security: Get Your Shields Up! InformationWeek. Cisco Systems. Retrieved on July 12, 2008, from http://www.developers.net/ciscoshowcase/view/1201

Office of Information Security. (2008, March 31). Prevention/Recovery: Best Practices. Retrieved on July 13, 2008, from http://www.infosec.uga.edu/service/bcp/best_practices.php

References: Hulme, G. (2004, October 11). Security: Get Your Shields Up! InformationWeek. Cisco Systems. Retrieved on July 12, 2008, from http://www.developers.net/ciscoshowcase/view/1201 Office of Information Security. (2008, March 31). Prevention/Recovery: Best Practices. Retrieved on July 13, 2008, from http://www.infosec.uga.edu/service/bcp/best_practices.php

You May Also Find These Documents Helpful

  • Powerful Essays

    LETTER OF TRANSMITTAL Chapter one Computer virus COMPUTER VIRUS A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Malware includes computer viruses, computer worms, ransomware, Trojan horses, keyloggers, most rootkits, spyware, dishonest…

    • 4916 Words
    • 20 Pages
    Powerful Essays
  • Better Essays

    ITT-TECH.EDU Web Application Attacks Prevention Week 3 Assignment Affiliated Date Sept.2013 Web Application Attacks Prevention advantage is used to benefit a protective or preventative standard used for determining the dimensions, area, with response capabilities such as an application layer firewall over a solution that identifies vulnerabilities in an application that are mean-full. Week 3 Assignment: Web Application Attacks Prevention Learning Objectives and Outcomes You will…

    • 1988 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Broad Topic: The Zika Virus: Transmission, Effects, and Prevention Narrowed Topic: The Transmission, Effects and Prevention of the Zika Virus by Mosquitoes Research Question: How is the Zika Virus, transmitted to humans by mosquitoes, what are the effects and what ways can the transmission be reduced? Thesis Statement: The Aedes species is the primary medium responsible for the transmission of ZikV, which may be accompanied with other ailments. Introduction: The Zika virus is one considered as a…

    • 746 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    U.S. Plans for Cyber Attack Prevention CMGT 441 U.S. Plans for Cyber Attack Prevention Introduction The improvements being done in technology touted to make lives and work easier also makes it easier for cyber-criminals to perform his or her nefarious deeds. Some of the most vulnerable and potentially damaging targets are critical infrastructures such as the energy grid and nuclear-power plants. To help combat this, the U.S. Government is launching a program dubbed “Perfect Citizen”…

    • 816 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The Zika virus is very effective, especially on the brain. The Zika virus attacks the Immune System. If a woman is pregnant and they get bit by an infected mosquito that can be really bad. Then when the baby is born, it will be born with a very small head. If you catch Zika then you can have serious health issues.…

    • 61 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    PROTECTING ANTI-VIRUS SOFTWARE UNDER VIRAL ATTACKS by Raghunathan Srinivasan A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master of Science ARIZONA STATE UNIVERSITY August 2007 PROTECTING ANTI-VIRUS SOFTWARE UNDER VIRAL ATTACKS by Raghunathan Srinivasan has been approved July 2007 Graduate Supervisory Committee: Partha Dasgupta, Chair Charles Colbourn Aviral Shrivastava ACCEPTED BY THE GRADUATE COLLEGE ABSTRACT Computers are an important part…

    • 17792 Words
    • 72 Pages
    Good Essays
  • Satisfactory Essays

    Summary Report on a Malicious Code Attack: The CiH Virus CiH Virus Summary Description of CIH Virus The CIH Virus, also known as the Chernobyl Virus, was directed towards Microsoft Windows platforms. It became known as the Chernobyl Virus because the triggered payload date is April 26th, the same date as the Chernobyl disaster (this is purely coincidental). The name of the virus is derived from the virus’s creator, Chen Ing-Hau. Payload is defined as the malicious activity that is a result…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Virus

    • 515 Words
    • 3 Pages

    A virus is a small infectious agent that can replicate only inside the living cells of an organism. Viruses can infect all types of organisms, from animals and plants to bacteria and archaea.[1] Since Dmitri Ivanovsky's 1892 article describing a non-bacterial pathogen infecting tobacco plants, and the discovery of the tobacco mosaic virus by Martinus Beijerinck in 1898,[2] about 5,000 viruses have been described in detail,[3] although there are millions of different types.[4] Viruses are found in…

    • 515 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Virus

    • 1318 Words
    • 6 Pages

    Amy Rogers Office Hours: MW 9-10 AM • Viruses are on the border between living & nonliving things • Have either DNA or RNA, never both • Often cause death of the host cell • Genus/species names not used in viral classification Compenents of a virus (lipid bilayer) Viral components: Nucleic Acid • Viral genomes can be either DNA or RNA • This genome, once inside a host cell, directs synthesis of new viral proteins, and also replication of new viral genomes • Viral genomes come in all kinds:…

    • 1318 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Virus

    • 508 Words
    • 3 Pages

    eat brains...although there are some....later! Another argument is that viruses should not be added to the tree of life...even the big viruses...but then the concept of a tree of life may be outdated as well2,3. So, back to some virology. A virus can not make more of itself, or multiply, without help from the contents of living cells (lets leave…

    • 508 Words
    • 3 Pages
    Good Essays