News

Monday, November 26, 2007

How to Protect Against Internet-Based Threats

Windows IT Pro
Protect Against Internet-Based Threats

While the Internet has become a necessary tool for business and also provides a vast array of options for personal use, it does have a dark side. Over the past several years, the Internet has become an increasingly dangerous place to work and play, with viruses, Phishing, Pharming and malicious web sites. This white paper will examine technologies that will help guard against Internet-based threats, such as:

  • Software that identifies, analyzes, and categorizes applications and protocols.
  • Honey Pots which are unpatched computers that are intentionally placed on the Internet so they can become infected - allowing the evolution of a particular attach to be monitored and tracked.
  • Honey Clients or fully patched computers that actively visit different web sites in an attempt to become infected, thus identifying threats before they become active.
  • Web Data Mining - machines actively looking for sites that contain known infections and/or have attributes and /or activities that are suspicious.

Register now to ensure your company's data and users are protected.


If you no longer wish to receive messages about ebooks, white papers or events from Windows IT Pro, unsubscribe here.

If you wish to be removed from ALL promotional emails from the Windows IT Pro Network please click here.

View the Windows IT Pro Privacy policy at:
www.windowsitpro.com/AboutUs/Index.cfm?action=privacy

Windows IT Pro is a division of Penton Media, Inc.
221 East 29th Street, Loveland, CO 80538 USA
Phone: 1-800-793-5697 or 1-970-663-4700

Copyright 2007, Penton Media, Inc. All Rights Reserved.

No comments:

Blog Archive