首页> 外文期刊>Signals >Conquering Complex Viruses
【24h】

Conquering Complex Viruses

机译:征服复杂病毒

获取原文
获取原文并翻译 | 示例
           

摘要

Viruses have been a long-standing threat to enterprise security and are becoming an even bigger threat to enterprises each year. Whether it is a virus, worm, Trojan Horse, hostile Java applet or ActiveX Control, it is likely that the malicious code was created using technology originally developed for a legitimate business purpose. Programmers are hired to write software that exposes the vulnerabilities of operating and application systems. In the course of their diagnostic work, they can create gateways for hostile technologies inadvertently. Then, through the proliferation of information available through the Internet, these technologies can become available to virus writers who may turn it into malicious code. Although vendors generally fix such security exposures in subsequent product releases, users who have not obtained the update may still find themselves exposed to a malicious attack. The highly publicized February 2000 denial of service attacks on several well-known Web sites may have been facilitated by technology originally authored to combat such attacks.
机译:病毒一直是对企业安全的长期威胁,并且每年都对企业造成更大的威胁。无论是病毒,蠕虫,特洛伊木马,敌对的Java applet还是ActiveX控件,都可能使用最初为合法商业目的而开发的技术来创建恶意代码。雇用程序员来编写软件,该软件暴露了操作系统和应用程序系统的漏洞。在诊断过程中,他们可能会无意间为恶意技术创建网关。然后,通过Internet上可用信息的扩散,病毒编写者可以使用这些技术,这些编写者可能会将其转换为恶意代码。尽管供应商通常会在后续产品版本中修复此类安全漏洞,但未获得更新的用户仍可能会发现自己受到恶意攻击。最初针对这种攻击而创作的技术可能促进了在2000年2月广为宣传的对多个知名网站的拒绝服务攻击。

著录项

  • 来源
    《Signals》 |2002年第5期|p.75|共1页
  • 作者

    Vincent Weafer;

  • 作者单位

    Symantec Security Response, Cupertino, California;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 通信;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号