Information Technology Reference
In-Depth Information
table 9.6 Applied iA 2 Summary: Anti-Malware
IA 2  Topic
Description
Mechanism
Anti-malware
Drivers
Protect enterprise information technology from receiving
malware. Detect the presence of malware and remove it
from information technology. Business drivers include
productivity, confidentiality of proprietary information (e.g.,
keystroke capture spyware), integrity (e.g., malicious
modification of data), and availability (e.g., denial of service
from virus or worms).
IA 2 view
Anti-malware is a technical mechanism and aligns with IA 2
views: Systems and applications, information/data,
infrastructure (technical)
IA core principles
Applicable IA core principles include:
Confidentiality-integrity-availability (CIA)
Authenticity-utility (AU)
Privacy-authorized use (PA)
Compliance
requirements
Legislation, regulation, policies, and guidelines that
reference anti-malware directly or indirectly via liability for
initiating or propagating malware
ELCM application
Applicable ELCM elements could be all, though anti-malware
is most applicable in O&M.
Verification
Penetration testing; tiger team
Operations
Applicable IA operations cycle phases: Anticipate (potential
malware), defend (exogenous and endogenous), monitor
(endogenous), respond
9.6 Anti-Malware
he term malware is a contraction of the phrase malicious software , and is a formal ref-
erence to the more colloquial cyber-nasties . Anti-malware mechanisms are safeguards
against malicious software. These safeguards include anti-virus, anti-spam, and anti-
spyware. Table 9.6 presents anti-malware in context of the IA 2 Framework.
9.6.1
Applied IA 2 : Anti-Malware
The applied IA 2 snapshot for anti-malware is very similar to the other technical dis-
cussions in this chapter. Anti-malware is an integral part of information assurance.
 
Search WWH ::




Custom Search