Chapter 6. Malicious Software and Intruders

Learning Objectives

After studying this chapter, you should be able to:

  • Discuss malware protection strategies

  • Understand the requirements for malware protection software

  • Explain the role of firewalls as part of a computer and network security strategy

  • List the key characteristics of firewalls

  • Describe the principal approaches to intrusion detection

Chapter 5, “System Access,” discussed the key ingredients of system access capabilities, including authorization, authentication, and access control. The purpose of system access capabilities is to regulate access to information and system resources from human users and programs. System access is an essential part of information security but also provides ...

Get Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.