O'Reilly logo

How to Defeat Advanced Malware by Simon Crosby, Henry Dalziel

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Protection’s Weak Link

Abstract

A selection of existing defensive security technologies are analyzed, including antivirus systems, host intrusion prevention systems, desktop firewalls, desktop virtualization systems, patch management solutions, and application whitelisting solutions.

Keywords

sandboxing
antivirus systems
host intrusion prevention systems
desktop firewalls
desktop virtualization systems
patch management solutions
application whitelisting solutions
hypervisor
virtualization
honeypots
In response, an array of defensive security technologies has been developed that aims to complement traditional detection-centric approaches. They include antivirus systems, host intrusion prevention systems, desktop firewalls, desktop ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required