10.5. Preventive Measures
Now that you have seen the implications of these rogue programs, what can you do about them? The only foolproof way to identify a malicious program is to have a knowledgeable programmer review the source code. Since most applications are already in an executable format, this would require a step back to reverse engineer every file on the system. Obviously, doing so is too time-consuming and expensive to be a feasible option for the typical organization.
With this in mind, any other preventive measures will fall short of being 100 percent effective. You are faced with performing a risk analysis to determine just how much protection you actually require. You can employ many techniques to prevent infection. Each has its ...
Get Mastering™ Network Security, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.