Book description
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you.AVIEN’s sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about malicious code and anti-malware technology, and the top security administrators of AVIEN who use those technologies in real life. This new book uniquely combines the knowledge of these two groups of experts. Anyone who is responsible for the security of business information systems should be aware of this major addition to security literature.
* “Customer Power takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It then considers the roles of the independent researcher, the vendor-employed specialist, and the corporate security specialist.
* “Stalkers on Your Desktop considers the thorny issue of malware nomenclature and then takes a brief historical look at how we got here, before expanding on some of the malware-related problems we face today.
* “A Tangled Web discusses threats and countermeasures in the context of the World Wide Web.
* “Big Bad Bots tackles bots and botnets, arguably Public Cyber-Enemy Number One.
* “Crème de la CyberCrime takes readers into the underworld of old-school virus writing, criminal business models, and predicting future malware hotspots.
* “Defense in Depth takes a broad look at DiD in the enterprise, and looks at some specific tools and technologies.
* “Perilous Outsorcery offers sound advice on how to avoid the perils and pitfalls of outsourcing, incorporating a few horrible examples of how not to do it.
* “Education in Education offers some insights into user education from an educationalist’s perspective, and looks at various aspects of security in schools and other educational establishments.
* “DIY Malware Analysis is a hands-on, hands-dirty approach to security management, considering malware analysis and forensics techniques and tools.
* “Antivirus Evaluation & Testing continues the D-I-Y theme, discussing at length some of the thorny issues around the evaluation and testing of antimalware software.
* “AVIEN & AVIEWS: the Future looks at future developments in AVIEN and AVIEWS.
Table of contents
- Front Cover
- AVIEN Malware Defense Guide for the Enterprise
- Copyright Page
- Lead Author and Technical Editor
- Foreword Author
- Contributors (1/2)
- Contributors (2/2)
- Contents (1/3)
- Contents (2/3)
- Contents (3/3)
- Foreword
- Preface
- Introduction
-
Chapter 1: Customer Power and AV Wannabes
- Introduction
- History of AVIEN and AVIEWS
- Anti-virus Vendor Image
- AV Wannabe
- So You Want to Be a Bona Fide Computer Anti-Malware Researcher?
- You Should Be Certified
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 2: Stalkers on Your Desktop
-
Chapter 3: A Tangled Web
- Introduction
- Attacks on the Web
- Hacking into Web Sites
- Index Hijacking
- DNS Poisoning (Pharming)
- Malware and the Web: What, Where, and How to Scan
- Parsing and Emulating HTML
- Browser Vulnerabilities
- Testing HTTP-scanning Solutions
- Tangled Legal Web
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 4: Big Bad Botnets
- Chapter 5: Cregraveme de la Cybercrime
- Chapter 6: Defense-in-depth
-
Chapter 7: Perilous Outsorcery
- Introduction
- Key Concepts: Outsourcing AV Services and Risk Management
-
Key Building Blocks for Managing Outsourced Security
- What Do “Security Activities” Imply for a Business Manager?
- What does “Outsourcing AV Services” Mean?
- What Drives the Success or Failure of Outsourced Operational AV?
- What Common Phases does the Project Manager Encounter when Outsourcing AV Services?
- What Are The Most Common Problems Seen During AV Outsourcing?
- The Perils of Outsourcing AV Activities
- The ‘Perilous Outsorcery’ Management Matrix
-
Critical Success Factors for Surviving AV Outsourcing
- Sources of CSFs: the More Explicit, the Better!
- Open Peer Communication Lines Between Both Companies
- Use a Questionnaire to Match People to AV Functions
- Align as Soon as Possible with Monitoring Services (SOC) and Incident Management Teams
- Outline the AV infrastructure (as Seen by the Customer and the Vendor) and Discuss Differences
- Putting the Pieces Together
- Roles and Responsibilities
- Sample AV Skills and Experience Questionnaire for an AV Service Provider.
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 8: Education in Education
-
Chapter 9: DIY Malware Analysis
- Introduction
- Anti-Malware Tools of the Trade 101
- The Basics: Identifying a Malicious File (1/2)
- The Basics: Identifying a Malicious File (2/2)
- Process and Network Service Detection Tools (1/2)
- Process and Network Service Detection Tools (2/2)
- Web-based Inspection and Virus Analysis Tools
- Using Packet Analyzers to Gather Information
- Examining Your Malware Sample with Executable Inspection Tools (1/2)
- Examining Your Malware Sample with Executable Inspection Tools (2/2)
- Using Vulnerability Assessment and Port Scanning Tools (1/2)
- Using Vulnerability Assessment and Port Scanning Tools (2/2)
- Advanced Tools: An Overview of Windows Code Debuggers
- Advanced Analysis and Forensics
- Advanced Malware Analysis
- Forensic Analysis
- Summary
- Solutions Fast Track
- Frequently Asked Questions
-
Chapter 10: Antimalware Evaluation and Testing
- Introduction
- Antimalware Product Evaluation
- Evaluation Checklist
- Testing Antimalware Products
- Independent Testing and Certification Bodies
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 11: AVIEN and AVIEWS: the Future
- Appendix A: Resources
- Appendix B: Glossary
- Index (1/3)
- Index (2/3)
- Index (3/3)
Product information
- Title: AVIEN Malware Defense Guide for the Enterprise
- Author(s):
- Release date: April 2011
- Publisher(s): Syngress
- ISBN: 9780080558660
You might also like
book
The Best Damn Firewall Book Period, 2nd Edition
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Apple Boot Camp Public Beta First Look
Unlike emulation systems such as Microsoft's Virtual PC, Apple's new Boot Camp takes advantage of the …
book
Microsoft® Windows® Security: Essentials
Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially …