Chapter 4

Protection’s Weak Link

Abstract

A selection of existing defensive security technologies are analyzed, including antivirus systems, host intrusion prevention systems, desktop firewalls, desktop virtualization systems, patch management solutions, and application whitelisting solutions.

Keywords

sandboxing
antivirus systems
host intrusion prevention systems
desktop firewalls
desktop virtualization systems
patch management solutions
application whitelisting solutions
hypervisor
virtualization
honeypots
In response, an array of defensive security technologies has been developed that aims to complement traditional detection-centric approaches. They include antivirus systems, host intrusion prevention systems, desktop firewalls, desktop ...

Get How to Defeat Advanced Malware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.