Computer infectors: Prevention, detection, and recovery
Computer infectors (such as logic bombs, worms, and viruses) represent a growing concern among information system (IS) professionals. Infectors may be introduced to systems intentionally by employees or by an unknown assailant under the guise of a Trojan horse or through more direct infection means....
Gespeichert in:
Veröffentlicht in: | Information & management 1992-10, Vol.23 (4), p.205-216 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Computer infectors (such as logic bombs, worms, and viruses) represent a growing concern among information system (IS) professionals. Infectors may be introduced to systems intentionally by employees or by an unknown assailant under the guise of a Trojan horse or through more direct infection means. This paper identifies the organizational and technical aspects of a total infector control program. Since eradication and recovery controls cannot guarantee total damage removal, the primary objective of an infector control program is generally identified as preventing an infection. However, whether an organization should properly emphasize prevention/ detection or recovery depends on the organization's appraisal of infector threats and risks. |
---|---|
ISSN: | 0378-7206 1872-7530 |
DOI: | 10.1016/0378-7206(92)90045-H |