The IT Law Wiki
(Created page with "== Citation == NIST, A Guide to Selection of Anti-Virus Tools and Techniques ('''NIST Special Publication 800-5''') (Dec. 1992) ([http://www.dtic.mil/cgi-bin/GetTRDoc?AD=...")
 
(Adding categories)
 
(5 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
== Citation ==
 
== Citation ==
   
[[NIST]], A Guide to Selection of Anti-Virus Tools and Techniques ('''NIST Special Publication 800-5''') (Dec. 1992) ([http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA405145 full-text]).
+
[[National Institute of Standards and Technology]], A Guide to Selection of Anti-Virus Tools and Techniques ('''NIST Special Publication 800-5''') (Dec. 1992) ([http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA405145 full-text]).
   
 
== Overview ==
 
== Overview ==
  +
  +
This guide provides criteria for judging the [[functionality]], practicality, and convenience of [[anti-virus]] [[tool]]s. It furnishes [[information]] which readers can use to determine which [[tool]]s are best suited to target environments, but it does not weigh the merits of specific tools.
  +
  +
The technical guidance in this document is intended to supplement the guidance found in [[NIST Special Publication 500-166]], "Computer Viruses and Related Threats: A Management Guide."
  +
[[Category:Publication]]
  +
[[Category:Malware]]
  +
[[Category:Technology]]
  +
[[Category:Cybersecurity]]
  +
[[Category:1992]]

Latest revision as of 23:07, 13 March 2014

Citation[]

National Institute of Standards and Technology, A Guide to Selection of Anti-Virus Tools and Techniques (NIST Special Publication 800-5) (Dec. 1992) (full-text).

Overview[]

This guide provides criteria for judging the functionality, practicality, and convenience of anti-virus tools. It furnishes information which readers can use to determine which tools are best suited to target environments, but it does not weigh the merits of specific tools.

The technical guidance in this document is intended to supplement the guidance found in NIST Special Publication 500-166, "Computer Viruses and Related Threats: A Management Guide."