Managing computer viruses
The emergence of a new type of threat to computer security--the computer virus--has attracted much attention from the media, researchers, and software producers. Such viruses create sets of frequently destructive instructions that propagate automatically throughout entire computer networks. The effects can range from temporary disruption to wholesale havoc involving huge losses of data. The problem has been exacerbated more recently by a deluge of superficial media comment that has sensationalized the topic while offering little in the way of concrete facts or knowledgeable guidance. This book is intended to help managers of today's complex information systems respond to the genuine threat posed by computer viruses in an informed and efficient manner. It presents a concise overview of the problem and a detailed strategy for minimizing the potential risk. It provides a nontechnical explanation of computer viruses based on a conceptual framework adaptable to the constant emergence of new kinds of viruses and their antidotes. The book suggests practical management approaches that are workable within large-scale, integrated systems including those with ongoing security and control devices. There are a number of useful technical appendices, however the book is written to be read and used by those who may not have a technical background, including information systems managers, security consultants, and teachers and advanced students of management interested in information systems.
What people are saying - Write a review
We haven't found any reviews in the usual places.
The destructive potential of computer viruses
Classifying computer viruses
The law and computer viruses
8 other sections not shown
A. K. Dewdney action phase activity anti-virus software backup beneﬁts biological viruses bombs Boot sector virus bytes cause cent Chapter Chris Guy classiﬁcation COMMAND.COM COMMENTS companies company’s computer abuse computer security computer systems computer virus handbook Computer virus notes computer viruses Computers and Security conﬁdentiality copies DAFV damage Dark Avenger deﬁnition Deloitte detection difﬁcult disease diskettes effective employees Eric Louw EXE ﬁles File virus IAFV ﬁle viruses ﬁrm ﬁrst framework Fred Cohen functionality hackers hard disk hardware Haskins & Sells host Ian Beale Ierusalem immune impact of viruses implementation infected diskettes infected ﬁles information security information systems Invitational Symposium KNOWN AS TYPE Mike Whitﬁeld modiﬁed motives operating system organizations personal computer re-boot replicate REPORTED risk security and control signiﬁcant South Africa speciﬁc Suriv SYMPTOMS Trojan horses Turing machine VARIANTS viral virus attacks virus infection worms