Trojans, Worms, and Spyware : A Computer Security Professional's Guide to Malicious Code (Paperback)

Michael Erbschloe

  • 出版商: Butterworth-Heineman
  • 出版日期: 2004-11-01
  • 定價: $1,470
  • 售價: 2.0$299
  • 語言: 英文
  • 頁數: 232
  • 裝訂: Paperback
  • ISBN: 0750678488
  • ISBN-13: 9780750678483
  • 相關分類: 資訊安全
  • 立即出貨 (庫存 < 4)

買這商品的人也買了...

商品描述

Description:

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.

This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats – new and advanced variants of Trojans, as well as spyware (both hardware and software) and “bombs” – and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.

 

Table of Contents:

Preface
Dedication
Acknowledgements
Introduction


Chapter One: Malicious Code Overview
Why Malicious Code Attacks are Dangerous
The Impact of Malicious Code Attacks on Corporate Security
Why Malicious Code Attacks Work
Flaws in Software
Weaknesses in System and Network Configurations
Social Engineering
Human Error and Foolishness
Hackers, Thieves, and Spies
Action Steps to Combat Malicious Code Attacks

Chapter Two: Types of Malicious Code
Email Viruses
Trojans
Back Doors
Worms
Blended Threats
Time Bombs
Spy Ware
Ad Ware
Steal Ware
Action Steps to Combat Malicious Code Attacks


Chapter Three: Review of Malicious Code Incidents
Historic Tidbits
The Morris Worm
Melissa
Love Bug
Code Red(s)
SirCam
Nimda
Slammer
The Summer of 2003 Barrage of Blaster, Sobig and More
Early 2004 with MyDoom, Netsky and More
Action Steps to Combat Malicious Code Attacks


Chapter Four: Basic Steps to Combat Malicious Code
Understanding The Risks
Using Security Policies to Set Standards
System and Patch Updates
Establishing a Computer Incident Response Team
Training for IT Professionals
Training End Users
Applying Social Engineering Methods in an Organization
Working with Law Enforcement Agencies
Action Steps to Combat Malicious Code Attacks


Chapter Five: Organizing for Security, Prevention, and Response
Organization of the IT Security Function
Where Malicious Code Prevention fits Into the IT Security Function
Staffing for Malicious Code Prevention in IT
Budgeting for Malicious Code Prevention
Evaluating Products for Malicious Code Prevention
Establishing and Utilizing an Alert Systems
Establishing and Utilizing a Reporting System
Corporate Security and Malicious Code Incident Investigations
Action Steps to Combat Malicious Code Attacks


Chapter Six: Controlling Computer Behavior of Employees
Policies on Appropriate Use of Corporate Systems
Monitoring Employee Behavior
Site Blockers and Internet Filters
Cookie and Spyware Blockers
Pop Up Blockers
Controlling Downloads
SPAM Control
Action Steps to Combat Malicious Code Attacks


Chapter Seven: Responding to a Malicious Code Incident
The First Report of a Malicious Code Attack
The Confirmation Process
Mobilizing the Response Team
Notifying Management
Using an Alert system and Informing End-Users
Clean up and Restoration
Controlling and Capturing Malicious Code
Identifying the Source of Malicious Code
The Preservation of Evidence
When to Call Law Enforcement
Enterprise Wide Eradication
Returning to Normal Operations
Analyzing Lessons Learned
Action Steps to Combat Malicious Code Attacks


Chapter Eight: Model Training Program for End-Users
Explaining why The Training is Important
Explaining The Appropriate Use Policy for Computers and Networks
Explaining How the Help Desk and PC Support of the Organization Works
Covering the Basic Do’s and Don’ts of Computer Usage to Prevent Attacks
Providing Basic Information about Malicious Code
Explaining How it Identify Potentially Malicious Code
Explaining What Employees Should to do if They Suspect Code is Malicious
Explaining What Employees Should Expect From the IT Department During Incident Response.
Performing the Administrative Aspects of a Training Program
Action Steps to Combat Malicious Code Attacks


Chapter Nine: The Future of Malicious Code
Military Style Information Warfare
Open Source Information Warfare
Militancy and Social Action
Homeland Security Efforts
Action Steps to Combat Malicious Code Attacks


Index

Appendix A: Computer Security Resources

商品描述(中文翻譯)

描述:
《木馬、蠕蟲和間諜軟體》提供實用、易於理解且可立即應用的建議,幫助組織改善安全性,減少惡意程式碼攻擊的風險。儘管全球經濟衰退,資訊系統安全仍然是當今世界上需求量較高的專業之一。隨著互聯網作為商業工具的廣泛使用,對資訊安全的重視程度比以往任何時候都要高。為了成功應對這種依賴程度的增加和病毒和蠕蟲攻擊的不斷增長威脅,資訊安全和資訊保證(IA)專業人員需要一本不涉及行話的書籍,解決滿足新安全要求的實際問題。

本書提供了一個全面的威脅清單,解釋了它們是什麼以及它們如何對系統造成破壞,並提供了一套生活規則以及開發程序和實施安全培訓的系統。對抗新一代計算機安全威脅(木馬的新型和高級變體,以及間諜軟體(硬體和軟體)和“炸彈”)是一項艱巨的任務,《木馬、蠕蟲和間諜軟體》將成為計算機安全專業人員必備的參考資料,以對抗和防止系統攻擊對財務和運營造成的損害。

目錄:
前言
獻辭
致謝
介紹

第一章:惡意程式碼概述
為什麼惡意程式碼攻擊是危險的
惡意程式碼攻擊對企業安全的影響
為什麼惡意程式碼攻擊有效
軟體中的缺陷
系統和網絡配置的弱點
社交工程
人為錯誤和愚蠢行為
駭客、竊賊和間諜
對抗惡意程式碼攻擊的行動步驟

第二章:惡意程式碼的類型
電子郵件病毒
木馬
後門
蠕蟲
混合威脅
定時炸彈
間諜軟體
廣告軟體
竊取軟體
對抗惡意程式碼攻擊的行動步驟

第三章:惡意程式碼事件回顧
歷史趣聞
莫里斯蠕蟲
梅麗莎
愛情蟲
Code Red
SirCam
Nimda
Slammer
2003年夏季的Blaster、Sobig和更多攻擊
2004年初的MyDoom、Netsky和更多攻擊
對抗惡意程式碼攻擊的行動步驟

第四章:對抗惡意程式碼的基本步驟
了解風險
使用安全政策設定標準
系統和補丁更新
建立計算機事件應對團隊
IT專業人員培訓
終端用戶培訓
在組織中應用社交工程方法
與執法機構合作
對抗惡意程式碼攻擊的行動步驟

第五章:組織安全、預防和應對
IT安全職能組織
惡意程式碼預防在IT安全職能中的位置
IT中的惡意程式碼預防人員配置
惡意程式碼預防的預算
評估惡意程式碼預防產品
建立和使用警報系統
建立和使用報告系統
企業安全和惡意程式碼事件調查
對抗惡意程式碼攻擊的行動步驟

第六章:控制員工的電腦行為
適當使用企業系統的政策
監控員工的電腦行為