The IT Law Wiki
Line 5: Line 5:
 
== Overview ==
 
== Overview ==
   
This publication provides recommendations for improving an organization's [[malware]] [[incident prevention]] measures. It also gives extensive recommendations for enhancing an organization's existing [[incident response]] capability so that it is better prepared to handle [[malware]] [[incident]]s, particularly widespread ones. The recommendations address several major forms of [[malware]], including [[virus]]es, [[worm]]s, [[Trojan horse]]s, [[malicious mobile code]], [[blended attack]]s, [[spyware tracking cookie]]s, and [[attacker tool]]s such as [[backdoor]]s and [[rootkit]]s. The recommendations encompass various [[transmission]] mechanisms, including [[network service]]s (e.g., [[e-mail]], [[Web browsing]], [[file sharing]]) and [[removable media]].
+
This publication provides recommendations for improving an organization's [[malware]] [[incident prevention]] measures. It also gives extensive recommendations for enhancing an organization's existing [[incident response]] capability so that it is better prepared to handle [[malware]] [[incident]]s, particularly widespread ones. The recommendations address several major forms of [[malware]], including [[virus]]es, [[worm]]s, [[Trojan horse]]s, [[malicious mobile code]], [[blended attack]]s, [[spyware]] [[tracking cookie]]s, and [[attacker tool]]s such as [[backdoor]]s and [[rootkit]]s. The recommendations encompass various [[transmission]] mechanisms, including [[network service]]s (e.g., [[e-mail]], [[Web browsing]], [[file sharing]]) and [[removable media]].
 
[[Category:Publication]]
 
[[Category:Publication]]
 
[[Category:Malware]]
 
[[Category:Malware]]

Revision as of 02:27, 6 February 2013

Citation

NIST, Guide to Malware Incident Prevention and Handling (NIST Special Publication 800-83) (Nov. 2005) (full-text).

Overview

This publication provides recommendations for improving an organization's malware incident prevention measures. It also gives extensive recommendations for enhancing an organization's existing incident response capability so that it is better prepared to handle malware incidents, particularly widespread ones. The recommendations address several major forms of malware, including viruses, worms, Trojan horses, malicious mobile code, blended attacks, spyware tracking cookies, and attacker tools such as backdoors and rootkits. The recommendations encompass various transmission mechanisms, including network services (e.g., e-mail, Web browsing, file sharing) and removable media.