Chapter 6. Malicious Software and Intruders
After studying this chapter, you should be able to:
Discuss malware protection strategies
Understand the requirements for malware protection software
Explain the role of firewalls as part of a computer and network security strategy
List the key characteristics of firewalls
Describe the principal approaches to intrusion detection
Chapter 5, “System Access,” discussed the key ingredients of system access capabilities, including authorization, authentication, and access control. The purpose of system access capabilities is to regulate access to information and system resources from human users and programs. System access is an essential part of information security but also provides ...