> Perimeter E-Security > Guide to Malware and Attack Methods
 

Guide to Malware and Attack Methods

White Paper Published By: Perimeter E-Security
Perimeter E-Security
Published:  Oct 21, 2010
Type:  White Paper
Length:  3 pages

Malware has been used to execute the largest and most well known data security breaches including Heartland Payment Systems, Hannaford, TJX, and many others. Malware costs organizations hundreds of millions of dollars every year. Malware is the biggest problem in information security. With firewalls, intrusion detection and prevention systems and a host of other network or edge based security solutions, hackers have for the last several years moved to more subversive attacks that attempt to compromise the end user system directly. Read the guide to learn more about the popular methods these criminals are using to compromise internal systems.



Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips, mission critical systems, system av, patch management, policy management, layered security, end user security awareness training, strong policies, audited procedures