Franklin

Combating Spyware in the Enterprise : Discover, Detect, and Eradicate the Internet's Greatest Threat.

Author/Creator:
Piccard, Paul.
Publication:
Rockland : Elsevier Science & Technology Books, 2006.
Format/Description:
Book
1 online resource (411 pages)
Edition:
1st ed.
Status/Location:
Loading...

Options
Location Notes Your Loan Policy

Details

Subjects:
Computer security.
Spyware (Computer software).
Form/Genre:
Electronic books.
Summary:
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware. * A recent survey published by Information Security Magazine stated that "combating spyare" was the #2 priority for security professionals in 2005 * Despite the high priority placed on combating spyware by security professionals, there are no other books published or announced that address this market *
Author Paul Piccard is Director of Research for Webroot, which is a market leader for pure-play anti-spyware vendors.
Contents:
Front Cover
Combating Spyware in the Enterprise
Copyright Page
Contents
Chapter 1. An Overview of Spyware
Introduction
Spyware: Defined
Malware: Defined
Adware: Defined
Parasiteware: Defined
Phishing: Defined
Botnets: Defined
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 2. The Transformation of Spyware
Introduction
The Humble Beginnings
Spyware in the Twenty-First Century
The Future of Spyware
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 3. Spyware and the Enterprise Network
Introduction
Keystroke Loggers
Trojan Encapsulation
Spyware and Backdoors
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 4. Real Spyware-Crime, Economic Espionage, and Espionage
Introduction
White to Gray to Black- Increasing Criminal Use of Spyware
It's All in the Delivery
Phishing Detection
Reporting Phishing
Bot Detection
Reporting Botnets
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 5. Solutions for the End User
Introduction
Freeware Solutions
Toolbar Solutions
Licensed Solutions
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 6. Forensic Detection and Removal
Introduction
Manual Detection Techniques
Detection and Removal Tools
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 7. Dealing with Spyware in a Non-Microsoft World
Introduction
Spyware and Linux
Spyware and the Macintosh
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 8. The Frugal Engineer's Guide to Spyware Prevention
Introduction
Locking Down Internet Explorer
Developing a Security Update Strategy
Securing E-mail
Securing Windows
Summary
Solutions Fast Track.
Frequently Asked Questions
Appendix A: Malware, Money Movers, and Ma Bell Mayhem!
Introduction
Mule Driving and Money Laundering
Phishers Phone Home
Slithering Scalability
The Phuture of Phishing
Summary
Solutions Fast Track
Frequently Asked Questions
Index.
Notes:
Description based on publisher supplied metadata and other sources.
Local notes:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2021. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Contributor:
Piccard, Paul.
Other format:
Print version: Piccard, Paul Combating Spyware in the Enterprise
ISBN:
9780080502229
9781597490641
OCLC:
842281901