StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Antimalware and Antispam Technology - Case Study Example

Cite this document
Summary
An increasing variety of malware like worms, spyware and adware threatens both personal and business computing (Computer Security Institute, 2005). Since 2001, large-scale Internet worm outbreaks have not only compromised hundreds of thousands of computer systems but also slowed down many parts of the Internet (Moore et al., 2002; Moore et al, 2003)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Antimalware and Antispam Technology
Read Text Preview

Extract of sample "Antimalware and Antispam Technology"

Download file to see previous pages

The decision proved costly as the software exhibited a persistent tendency to incorrectly identify Outlook files as malware and permanently delete them. Within two weeks it had deleted dozens of important emails. As no amount of configuring seemed to solve this problem, we made the transition to Symantec's Norton Internet Security. Since 2004, every computer and laptop in our company has been running Norton Internet Security. The software has, quite successfully, prevented users from logging onto a host of sites which we have identified as potentially threatening and from running peer to peer software.

Indeed, the results of the ICT Department's periodic review of the application's logs indicate that Norton Internet Security has effectively protected us from a wide array of malware. Effective protection, however, does not mean immunity and therefore, we have implemented a second level of protection. Following a thorough investigation of anti-malware applications the ICT department decided to implement BINDER. A host-based detection system that can detect a wide class of malware on computers, including worms, spyware, and adware, with few false alarms, it operates through a simple algorithm which is based on inferring user intent.

It detects new unknown malware on personal computers by identifying extrusions, malicious outbound network requests which the user did not intend. At the same time, and as the ICT Director informed me, we have also developed and implemented a large-scale honeyfarm system that ensures high-fidelity honeypot operation, efficiently discards the incessant Internet .background radiation that has only nuisance value when looking for new forms of activity, and devises and enforces an effective containment policy to ensure that the detected malware does not inflict external damage or skew internal analyses.

Operating side-by-side, these two malware detection systems have, over the past fifteen months, effectively protected the company from malware attacks and infections. 3.1 Inferring User IntentI asked our ICT Director precisely how BINDER infers user-intent connections and, in response, he cited a very simple example. Let us assume that a user opens an Internet Explorer (IE) window, goes to a news web site, then leaves the window idle. In this example, new connections are generated in the following four cases:(1) When the user opens IE by double-clicking its icon on My Desktop in Windows, the shell process explorer.

exe (PID=1664) of Windows receives the user input, and then starts the IE process. After the domain name of the default homepage is resolved, the IE process makes a connection to it to download the homepage. This connection of IE is triggered by the user input of its parent process of explorer.exe.(2) Case II: After the user clicks a bookmark of news.yahoo.com in the IE window, the domain name is resolved as xx.xxx.xx.xxx. Then the IE process makes a connection to it to download the HTML file.

This connection is triggered by the user input of the same process.(3) Case III: After receiving the HTML file in 4 packets, IE goes to retrieve two image files from the websites in question. IE makes connections to them after the domain

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Antimalware and Antispam Technology Case Study Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1522615-antimalware-and-antispam-technology
(Antimalware and Antispam Technology Case Study Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/miscellaneous/1522615-antimalware-and-antispam-technology.
“Antimalware and Antispam Technology Case Study Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1522615-antimalware-and-antispam-technology.
  • Cited: 0 times

CHECK THESE SAMPLES OF Antimalware and Antispam Technology

James m. mcpherson crossroads of freedom antietam

Name Instructor Course Date James M.... Mcpherson: Crossroads of Freedom: Antietam Introduction September 17, 1862, is arguably the Americans bloodiest day.... The war is commonly referred to as the Battle of Antietam whose aftermath left more than 6,000 soldiers dead.... hellip; This number is arguably more than four times the number of soldiers killed on the D-Day....
3 Pages (750 words) Essay

Data and Information System Models

Security plan is composed of both technology components and policy.... The technology components of security that should be adopted include access control such as encryption, password/ username, antimalware programs, backup and recovery plans besides physical locks on doors to implement restriction....
3 Pages (750 words) Assignment

The Battle of Antietam

The paper under the title 'The Battle of Antietam' presents the Battle of Antietam which was fought for one full day with casualties outnumbering the total seconds it was fought over.... The result was nothing but sadness and grief all around and a change of commands for a chosen few.... hellip; This paper has discussed the events that led to the actual battle as well as distributed the same in three spans, starting from the morning, peaking at mid-day and talking a bit about the afternoon session....
8 Pages (2000 words) Case Study

Antifoam Addition to Shake Flask Cultures of Recombinant Pichia Pastoris Increases Yield

Pichia pastoris, a kind of yeast which finds its industrial use in recombinant protein production, needs to be cultured either in large shake flakes or continuously stored tank bioreactors after the initial selection of suitable clones and preparation of optimum standard for… However, there is usually potential problem with this process....
3 Pages (750 words) Essay

Antimalware techniques

Boston, MA: Course technology/ Cengage Learning.... Network Security Foundations: technology Fundamentals for IT Success.... Updating of anti-Malware software updates the Black List of Hashes (or Signatures) of known… Filtering of URL uses a well maintained Black List/White List database technique to prevent users from steering to web sites that were previously antimalware Techniques of antimalware Techniques Black or White List Creation: Anti-malware software computes the hashes for a particular application and compares it with the “Black List” of the hashes that has been identified as the malwares previously....
1 Pages (250 words) Essay

Assignment (most current IT threats)

In this respect, the threat infects Windows 2000, Windows NT, Windows Server 2003, Windows XP, Windows Server 2008, and Windows 7 Most Current IT Threats One threat that information technology systems face today is Trojan.... remele can be detected by antivirus or antimalware software installed in a computer (Symantec, 2013)....
1 Pages (250 words) Essay

Risk Management and Security Threat

One report is about the threats that come about with new technology platforms while the other is about the evolution of malwares to becoming smarter, shadier and stealthier.... The 2013 report is about how development and advancements in technology have opened up new opportunities for malware developers.... Government should initiate programs that will encourage growth and development of antimalware....
2 Pages (500 words) Essay

The Benefits of Mail Server

… The Internet Message Access Protocol, Version 4 (IMAP4) and Post Office Protocol,Version 3 (POP3), are open Internet standards for retrieving mail from a server.... WithIMAP4 and POP3, any messaging client software can connect with any messagingserver.... The Internet Message Access Protocol, Version 4 (IMAP4) and Post Office Protocol,Version 3 (POP3), are open Internet standards for retrieving mail from a server....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us