Malware Since the Earliest Days Term Paper

Total Length: 1957 words ( 7 double-spaced pages)

Total Sources: 1+

Page 1 of 7

However, nothing can be done until the malware actually occurs. With all the different viruses, worms and Trojans, how can security managers possibly predict what malware will occur next? In contrast, a behavioral rule defines legitimate activity in a system. Any activity not matching the profile will cause the security product to be triggered. As rules are not specific to a particular type of attack, they can block malicious behavior without having to recognize the precise attack used. Thus, there is additional protection against new attacks as they emerge. It is to effectively prevent any unauthorized applications, including malicious code and Trojans. or, it could protect a webserver by making it impossible for anyone to access the webserver to change the files and limiting the risk of a hack (Franklin, 2002).

However, the dilemma comes how many rules should the system have? The security manager must decide between an effective security procedure and a low number of false alarms. Applying too many rules will keep the company from meeting its basic business objectives and becomes very difficult to maintain.
However, not using enough rules allows the application to proceed unchecked and potential malicious intrusion. In addition, because computer systems are continually changing, rule and signature changes are necessary for each server with every system change. This makes the rules-based solutions not only inaccurate, but also impractical to use across the enterprise on production systems. If one makes a system more secure, it makes a system harder to use, and vice versa.

There is no easy answer to the malware dilemma. Because of this, efforts must be taken at different levels. The states should continue to pass laws against computer crime. Companies need to find the balance between too many and not enough rules. They also have to continually educate their people who have their hands on a great deal of valuable information. As long as there are individuals who are willing to take unethical or illegal steps for personal gain, processes have to be in place to prevent them......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Malware Since The Earliest Days" (2006, September 17) Retrieved May 3, 2024, from
https://www.aceyourpaper.com/essays/malware-since-earliest-days-71726

Latest MLA Format (8th edition)

Copy Reference
"Malware Since The Earliest Days" 17 September 2006. Web.3 May. 2024. <
https://www.aceyourpaper.com/essays/malware-since-earliest-days-71726>

Latest Chicago Format (16th edition)

Copy Reference
"Malware Since The Earliest Days", 17 September 2006, Accessed.3 May. 2024,
https://www.aceyourpaper.com/essays/malware-since-earliest-days-71726