First page Back Continue Last page Graphics
Malicious Code Protection
Types of Products
Scanners - identify known malicious code - search for signature strings
Integrity Checkers – determine if code has been altered or changed – checksum based
Vulnerability Monitors - prevent modification or access to particularly sensitive parts of the system – user defined
Behavior Blockers - list of rules that a legitimate program must follow – sandbox concept