Preparing for Tomorrow's Threat Today: What We Can Learn from the History of Malware and Defenses
sponsored by Global Knowledge

There is one given in the IT security realm and that is change. The challenges faced by security professionals a decade ago are much different than the challenges we face today. Not long ago, hackers concentrated their efforts on malicious software that was designed for recognition, fame, and glory. Attack vectors of the 21st century have changed; now, many attacks are financial in nature. Current FBI estimates indicate that malicious software and attacks targeting identity theft cost American businesses and consumers more than $50 billion a year. Yesterday's virus is today's custom malware, while denial of service attacks has been replaced with botnets.

 

From 'Early Attacks' to 'Bleeding-Edge Defenses', this paper examines the history of attacks of malware and the defenses needed to counter these attacks.

 

(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
Available Resources from Global Knowledge
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement