Chapter 10. Signs of Hope

This chapter includes the following topics:

Harnessing the Network

Scanning for Signatures

Behavioral Analysis of Bad Code

The Power of Reputation

Global Threat Correlation

Combining Countermeasures

The arms race between malware creators and security vendors isn’t about to let up. Because there is profit to be made, malware will keep getting smarter, faster, and more dangerous. However, as you will read in this chapter, there is reason to believe that the security industry can combat threatening malware attacks and keep the Internet a generally (if not completely) safe place.

But delivering a “generally safe” Internet experience means IT professionals need to stay current on the latest technologies, and ...

Get Securing the Borderless Network: Security for the Web 2.0 World now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.