0% found this document useful (0 votes)
10 views2 pages

TA VirusDetectionandElimination020603

Uploaded by

xiaoman08
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views2 pages

TA VirusDetectionandElimination020603

Uploaded by

xiaoman08
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

TTeecchhnnoollooggyy A

Arreeaa

D
DEEFFIIN
NIITTIIO
ONN
Name Virus Detection and Elimination
Virus Detection and Elimination addresses those policies, methods and tools
associated with detecting, combating, reporting and eradicating malicious
program code (e.g., worms, Trojan horse, malware).
Description
A virus usually has a destructive or disruptive effect on the executable
program or system component that it affects.
Provide a scalable multi-tiered defense to fend off virus threats and prevent
Rationale
loss of time and money.
Protect assets (i.e., data and resources) from corruption, disruption,
Benefits destruction, and unavailability. Can assist in the system quarantine, repair
and clean-up virus damage.
A
ASSSSO
OCCIIA
ATTEED
DAARRC
CHHIITTEEC
CTTU
URREE LLEEVVEELLSS
List the Domain Name Security
List the Discipline Name Technical Controls
Associated Compliance Components
• Virus Detection and Elimination Policies and Best Practices
• Virus Detection and Elimination Criteria for Anti-Virus Management
Tools
List the Compliance • Virus Detection and Elimination Criteria for Gateways
Component Names • Virus Detection and Elimination Criteria for E-mail/Groupware
• Virus Detection and Elimination Criteria for Servers
• Virus Detection and Elimination Criteria for Workstations
• Virus Detection and Elimination Criteria for Wireless
Associated Product Components
• McAfee
o VirusScan (workstation)
o NetShield (server)
o Groupshield (e-mail)
o WebShield Appliances(gateway)
o EPolicy Orchestrator (management tool)
o VirusScan Wireless Devices (wireless)
• Symantec
List the Product Component o AntiVirus Corporate Edition (workstation)
Names o AntiVirus Corporate Edition (server)
o AntiVirus Corporate Edition (e-mail)
o AntiVirus Corporate Edition (gateway)
o AntiVirus Corporate Edition (management tool)
• Sybari Software Inc.
o Antigen for Microsoft Exchange (e-mail)
o Antigen for Lotus Notes/Domino (e-mail)
o Antigen for Microsoft Exchange (gateway)
• Computer Associates
o InoculateIT (workstation)
o InoculateIT (server)
o InoculateIT (management tool)

TTEEC
CHHN
NOOLLO
OGGYY A
ARREEA
ADDEETTA
AIILL
• NIST 800-5 and 500-1166
Supporting Documentation • Gartner Research Group – Enterprise Anti-Virus product evaluation.
Release Note 22 May 2002
Document Source Reference #
Standard Organization / Government Body
National Institute of
Standards and Technology
Name (NIST), Computer Website http://csrc.nist.gov/
Security Resource Center
(CSRC)
Contact Information inquiries@nist.gov
Name ICSA Labs Website www.icsalabs.com
ICSA Labs is a division of TruSecure Corporation and can be reached at
Contact Information 1-888-396-8348 (info@trusecure.com)

KKEEYYW
WOORRD
DSS
virus, zoo, trojan horse, backdoor, worm, stealth, blended threat, boot
sector infector, companion, denial of service, dropper, file infector, logic
List Keywords bomb, malware, multi-partite, overwriting, parasitic, polymorphic,
tunneling, variant, terminate and stay resident (tsr), management;
boot sector infector
C
CUURRRREEN
NTT SSTTA
ATTU
USS
Provide the Current Status In Development Under Review Approved Rejected
A
AUUD
DIITT TTRRA
AIILL
Creation Date 02-06-03 Date Accepted / Rejected 02-27-2003
Reason for Rejection
Last Date Reviewed Last Date Updated
Reason for Update

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy