Article

Deployment of anti-virus software: A case study

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

The growth of Inter- and intranets and the sharing of software have led to a rise in the transmission of viruses, especially among the PC and MAC platforms. However, maintaining virus protection software and pattern updates for any large organization is a monumental problem, especially when the organization supports multiple platforms and operating systems. The Jet Propulsion Laboratory (JPL) and other National Aeronautics and Space Administration (NASA) Centers have had problems maintaining current virus protection software and pattern files, and so NASA asked the JPL Network and Computer Security (NCS) Group to lead an effort to search for a comprehensive solution. This paper puts forward a study, analysis and recommendations concerning anti-virus software solutions, problems encountered and their resolutions. One of the key issues was finding a single-source anti-virus software solution. Selection and deployment of single-source anti-virus software were successful. The lessons learned in the deployment of a software product site-wide may benefit other organizations facing a similar situation.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

Article
For an evaluation of the software product, the national/international organizations and labs have been studying various methodologies for the quality on the basis of ISO/IEC Quality Assurance System, but they still have many issues in evaluation of the anti-virus software that has special characteristics of complexity. In this paper, to establish a methodology of the quality evaluation for the anti-virus software, fulfilling the requirements more than reasonable level, a process to draw the evaluation items and quantification was established. And the information of weight was objectified by analyzing the relative magnitude between each factors. Based on the defined information (evaluation item, weight), conducting the quality evaluations for 70 kinds of open anti-virus software collected from the portal sites in the real test environment, and as a result of the positive analysis with user's long-term experience, this paper justifies the evaluation item and the weight.
Article
Leadership styles and information security in small businesses: An empirical investigation
Conference Paper
Full-text available
Today's anti-virus technology, based largely on analysis of existing viruses by human experts, is just barely able to keep pace with the more than three new computer viruses that are writ­ ten daily. In a few years, intelligent agents nav­ igating through highly connected networks are likely to form an extremely fertile medium for a new breed of viruses. At IBM, we are de­ veloping novel, biologically inspired anti-virus techniques designed to thwart both today's and tomorrow's viruses. Here we describe two of these: a neural network virus detector that learns to discriminate between infected and un­ infected programs, and a computer immune system that identifies new viruses, analyzes them automatically, and uses the results of its analysis to detect and remove all copies of the virus that are present in the system. The neural-net technology has been incorporated into IBM's commercial anti-virus product; the computer immune system is in prototype.
Chapter
The Computer Crime and Intellectual Property Section of the Department of Justice submitted comments in response to the request of the Federal Trade Commission (“FTC”) for comments on its workshop on Consumer Information Privacy and its Database Study. The Department is deeply concerned about the safety and security of American citizens. The Department is vigilant to take appropriate measures to guard their privacy while using all the resources at its disposal, including information resources, to investigate and prosecute violations of the federal criminal law. The comments are listed in Exhibit 1.
Article
IBM Thomas J. Watson Research Center has derived a biological analogy to be helpful in understanding the propagation of computer viruses on a global scale and inspirational in the development of defenses against them. Building on decades of research by mathematical epidemiologists, the center has obtained some understanding on the factors governing the spread of virus.
Article
An abstract is not available.
Article
From the Publisher:Beat hackers at their own game — The world of a hacker revealed by a corporate hack master Hack Attacks Revealed Take a technogothic journey inside the world of a hacker as seen by security expert John Chirillo. Drawing on his own experience as a hacking consultant for Fortune 1000 companies, Chirillo shows how hackers can exploit network security holes and how you can recognize an oncoming threat to your security. The book features details of the powerful Tiger Box(r) system, used by hackers to penetrate vulnerable networks, and teaches you how to use that same tool to your advantage. In this highly provocative work, you'll discover: * The hacker's perspective on networking protocols and communication technologies * A complete hacker's technology handbook, illustrating techniques used by hackers, crackers, phreaks, and cyberpunks * Information discovery and scanning tools for hacking into known and unknown ports and service vulnerabilities * Detailed instructions for customizing the Tiger Box for your needs and using it to search hack attacks
Article
This easy-to-use, step-by-step guide will empower network and system administrators to defend their information and computing assets---whether or not they have security experience. In Counter Hack, leading network security expert Edward Skoudis presents comprehensive, insider's explanations of today's most destructive hacker tools and tactics---and specific, proven countermeasures for both UNIX and Windows environments. Whatever your role in protecting network infrastructure and data, Counter Hack delivers proven solutions you can implement right now---and long-term strategies that will improve security for years to come.
Article
This report develops a model of a personal computer network for office use from the standpoint of the end user. A network designed for personal computers is differentiated from personal computers which must be attached to an existing communications system. Three types of the latter networks are discussed: (1) networks which connect personal computers to personal computers, personal computers to computer centers, and personal computers to bulletin boards by means of public and private telephone systems; (2) networks which connect personal computers to computer centers by means of direct wire in the same manner that terminals are directly connected to computer centers; and (3) networks which connect personal computers to networks designed for large computers. Each personal computer network type is compared, according to level of service provided, to a model which embodies the needs and expectations of personal computer users. The generic types of service used for the comparison include file and print service; mail; messaging and conferencing; login; remote task execution; outside communication; and network configuration. A discussion of options available to those who have an immediate need for a personal computer network is also presented. The text is supplemented with 8 tables and 11 figures, and a list of 27 references is provided. (Author/EW)
Conference Paper
Not Available
Article
Analogies with biological disease with topological considerations added, which show that the spread of computer viruses can be contained, and the resulting epidemiological model are examined. The findings of computer virus epidemiology show that computer viruses are far less rife than many have claimed, that many fail to thrive, that even successful viruses spread at nowhere near the exponential rate that some have claimed, and that centralized reporting and response within an organization is an extremely effective defense. A case study is presented, and some steps for companies to take are suggested.< >
E-mail Virus Protection Handbook: Protect Your E-Mail from Viruses, Trojan Horses and Mobile Code Attacks
  • B Bagnal
  • J. Stanger
The Virus Creation Lab: A Journey into the Underground
  • G Smith
Guidance on Planning and Implementing Computer System Reliability
  • US Department of Commerce, Computer Science and Technology, National Bureau of Standards
Cashing in on virus anxieties
  • C Wilder
Bigelow’s Virus Trouble-shooting Pocket Reference
  • K Dunham
Of UNIX, worms, and viruses: science fiction becomes real
  • J Gantz
Virus plagues DoD network”, Management Information Systems Week
  • I Greenstein
  • M Neubarth
Beware: it’s virus season”, Personal Computing
  • P Honan
The real threats posed by so-called computer viruses
  • R. Howard
Virus alters networking”, Communications Week
  • K Jackson
Time bomb: inside the Texas virus trail”, Computer Decisions
  • E Joyce
Computer viruses are as easy to prevent as the common cold
  • A Kask
Virus control center is proposed
  • M. Marshall
The computer virus danger grows”, Modern Office Technology
  • B Menkus
Beware of companies that fan flames of computer virus fear
  • R Parker
Dr Pournelle vs the virus”, Byte
  • J Pournelle
For MIS, the virus lingers”, Information Week
  • M Puttre
User organization offers virus prescription”, Communications Week
  • C Roeckl
Infection protection
  • N. Rubenking
Computer Security Handbook
  • S Bosworth
  • M E Kabay
The real threats posed by so-called computer viruses”, Digital News
  • R Howard
E-mail Virus Protection Handbook: Protect Your E-Mail from Viruses
  • B Bagnal
  • J Stanger
The scourge of computer viruses”, Science
  • E Marshall
Infection protection”, PC Magazine
  • N Rubenking