Back to Results
First PageMeta Content
Cyberwarfare / Botnet / Malware / Internet security / Firewall / Egress filtering / Personal firewall / Computer worm / Denial-of-service attack / Computer network security / Computing / Computer security


Microsoft Word - Current Malware Threats and Mitigation Strategies - MS ISA…
Add to Reading List

Document Date: 2013-04-15 13:11:50


Open Document

File Size: 132,70 KB

Share Result on Facebook

Company

Intrusion Detection Systems / Microsoft / /

Country

United States / /

Currency

pence / /

Facility

National Institute of Standards and Technology / Analysis Center / /

IndustryTerm

covert network / software smarter / near real time / malicious web sites / internal routers / anti-virus software / internal proxy server / external web-based email / corroborative network device / patch management software / outbound communications / users visiting web sites / web-based protocols / outbound web proxy server / Internet Relay Chat / web browser / anti-virus applications / removable media / automated software program / test security tools / hidden key-logging software / firewall device / Internet-facing firewall / Web Content Filters Implement / encrypted web transactions / robot network / internal systems / non-business web / personal firewall software / antispyware software / abnormal network communications / bot-controlling server / web filtering / internal network / include installing hidden key-logging software / /

OperatingSystem

Unix / XP / Linux / Windows 98 / DoS / /

Organization

Multi-State Information Sharing and Analysis Center / NIST SP / National Security Agency / National Institute of Standards and Technology / US-CERT Department of Homeland Security Mail Stop / Center for Information Security / Domain Name Service / /

/

Position

consultant / botnet controller / analyst / discovered controller / controller / Corporal / /

ProgrammingLanguage

HTML / php / DC / T / /

Technology

AV / wsh / Linux / Unix / VPN / Instant Messaging / operating system / UDP / HTML / Operating systems / anti-virus software / web-based protocols / Trivial File Transfer Protocol / DNS / proxy server / FIREWALL / HTTP / service protocols / /

URL

http /

SocialTag