Computer infectors: Prevention, detection, and recovery

Computer infectors (such as logic bombs, worms, and viruses) represent a growing concern among information system (IS) professionals. Infectors may be introduced to systems intentionally by employees or by an unknown assailant under the guise of a Trojan horse or through more direct infection means....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Information & management 1992-10, Vol.23 (4), p.205-216
Hauptverfasser: Joseph, Gilbert W., Blanton, J.Ellis
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Computer infectors (such as logic bombs, worms, and viruses) represent a growing concern among information system (IS) professionals. Infectors may be introduced to systems intentionally by employees or by an unknown assailant under the guise of a Trojan horse or through more direct infection means. This paper identifies the organizational and technical aspects of a total infector control program. Since eradication and recovery controls cannot guarantee total damage removal, the primary objective of an infector control program is generally identified as preventing an infection. However, whether an organization should properly emphasize prevention/ detection or recovery depends on the organization's appraisal of infector threats and risks.
ISSN:0378-7206
1872-7530
DOI:10.1016/0378-7206(92)90045-H