Kevin Mitnick Authors Appsense Whitepaper |
Wednesday, 12 July 2006 by Michel Roth | |||
Titled, "Mitigating Malware in Userland," the white paper illustrates detailed insights into a typical computer hacker's mindset and provides real-life examples of IT security breaches at various corporations. The paper includes a thorough analysis of various protection technologies and concludes with a "Best Practices" recommendation on how to secure an enterprise from today's elaborate attackers. "Today's hackers are incredibly savvy in their methods, exploiting IT systems to steal sensitive information for financial gain," said Mitnick. "These malicious hackers utilize everything from Rootkits, Trojans and Backdoors to infiltrate the corporate network and obtain highly sensitive intelligence. This white paper evaluates technologies such as trusted ownership, white/black lists and digital signatures, and details what IT administrators should do to control user behavior, eliminate hacker attacks and protect systems and vital information." The white paper covers: • Impact/threat of hacking attacks, worms, viruses, Trojans, and the newest form of attack 'botnets,' and how hackers have become incredibly creative in how they put malicious code on targeted systems. • Attacker motivations. Rather than being motivated by status, ego and revenge, malware authors are increasingly driven by the financial gains possible through exploiting information obtained via malicious code, such as botnets and Trojan Horses. • Analysis of existing technologies on the market for mitigating risk, including restricting user privileges, self-healing, anti-spyware utilities, trusted ownership, digital signatures and white/black lists. • Recommendations of what organizations of all sizes must do to successfully and continually protect their systems against attacks. Read the whitepaper here.
Show/Hide comment form
|