PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
Using 'synergistic' antivirus to combat multi-vector viruses and worms

This article is part of the Information Security magazine issue of May 2002
Many IT security managers have a difficult time coming to terms with the fact that their primary security controls are fallible. "Primary" controls, in this context, refer to security mechanisms or technologies that mitigate a particular threat most of the time-in fact, more than 90 percent of the time -- but never all of the time. Antivirus scanners are a good example of the fallibility of primary controls. AV scanners stop in excess of 90 percent of malicious code threats. But despite the huge day-in, day-out success of AV products, failures still happen -- often in spectacular fashion. According to the Seventh Annual ICSA Labs' Virus Prevalence Survey every year organizations spend more and more money attempting to mitigate the risk of viruses and worms. Yet each year the impact of viruses -- measured as frequency or cost of virus encounters, incidents and disasters -- continues to worsen. There are two main reasons why our defenses continue to lag behind the virus and worm problem: the problem is evolving faster than our ...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
How to solve the growing enterprise issue of cyber menace
This issue of Information Security offers a six-part special report on the growing threat of viruses and worms and how enterprises can best battle the never-ending cyber menace.
-
Predicting the future of malware and tomorrow's malicious code
The future of malware will grow exponentially. David Harley presents his predictions on blended threats, e-mail exploits, social engineering and more.
-
The best malware program to defeat unwanted, non-viral code
The best malware program supports a healthy system because it is naturally more resistant to all forms of malicious attacks.
-
Using 'synergistic' antivirus to combat multi-vector viruses and worms
Signature scanners stop many malicious threats, but they aren't enough to combat today's multi-vector viruses and worms.
Columns in this issue
-
Thirteen website attacks that damage an enterprise's Web presence
Many website attacks are potentially dangerous and can damage an organization's Web presence. Learn about the most common attacks and how they function.
-
Q&A with Critical Infrastructure Protection board VP Howard Schmidt
New Vice Chairman of the Critical Infrastructure Protection Board Howard Schmidt aims to keep cybersecurity a top priority in the post-9/11 world.
-
How an inside hacker helped boost jail's Web security
A system administrator at a country sheriff's office allowed an inmate inside hacker to exploit security holes to prove that the organization needed better security.
-
Secure reads: Building Secure Software
Building Secure Software covers new vulnerabilities and explains how software vendors can stop attacks with secure coding practices.