The IT Law Wiki
(Created page with "== Citation == NIST, Guide to Malware Incident Prevention and Handling (Nov. 2005) ('''NIST Special Publication 800-83''') ([http://csrc.nist.gov/publications/nistpubs/800-8...")
 
(Adding categories)
Tag: categoryselect
 
(3 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
== Citation ==
 
== Citation ==
   
[[NIST]], Guide to Malware Incident Prevention and Handling (Nov. 2005) ('''NIST Special Publication 800-83''') ([http://csrc.nist.gov/publications/nistpubs/800-83/SP800-83.pdf full-text]).
+
[[NIST]], Guide to Malware Incident Prevention and Handling for Desktops and Laptops, ('''NIST Special Publication 800-83''') (Rev. 1) (Sept. 2013) ([http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf full-text]).
   
 
== Overview ==
 
== Overview ==
   
This publication provides recommendations for improving an organization's [[malware]] [[incident prevention]] measures. It also gives extensive recommendations for enhancing an organization's existing [[incident response]] capability so that it is better prepared to handle [[malware]] [[incident]]s, particularly widespread ones. The recommendations address several major forms of [[malware]], including [[virus]]es, [[worm]]s, [[Trojan horse]]s, [[malicious mobile code]], [[blended attack]]s, [[spyware tracking cookie]]s, and [[attacker tool]]s such as [[backdoor]]s and [[rootkit]]s. The recommendations encompass various [[transmission]] mechanisms, including [[network service]]s (e.g., [[e-mail]], [[Web browsing]], [[file sharing]]) and [[removable media]].
+
This publication provides recommendations for improving an organization's [[malware]] [[incident prevention]] measures. It also gives extensive recommendations for enhancing an organization's existing [[incident response]] capability so that it is better prepared to handle [[malware]] [[incident]]s, particularly widespread ones. The recommendations address several major forms of [[malware]], including [[virus]]es, [[worm]]s, [[Trojan horse]]s, [[malicious mobile code]], [[blended attack]]s, [[spyware]] [[tracking cookie]]s, and [[attacker tool]]s such as [[backdoor]]s and [[rootkit]]s. The recommendations encompass various [[transmission]] mechanisms, including [[network service]]s (e.g., [[e-mail]], [[Web browsing]], [[file sharing]]) and [[removable media]].
 
[[Category:Publication]]
 
[[Category:Publication]]
 
[[Category:Malware]]
 
[[Category:Malware]]
 
[[Category:Security]]
 
[[Category:Security]]
  +
[[Category:2013]]

Latest revision as of 01:30, 1 September 2015

Citation[]

NIST, Guide to Malware Incident Prevention and Handling for Desktops and Laptops, (NIST Special Publication 800-83) (Rev. 1) (Sept. 2013) (full-text).

Overview[]

This publication provides recommendations for improving an organization's malware incident prevention measures. It also gives extensive recommendations for enhancing an organization's existing incident response capability so that it is better prepared to handle malware incidents, particularly widespread ones. The recommendations address several major forms of malware, including viruses, worms, Trojan horses, malicious mobile code, blended attacks, spyware tracking cookies, and attacker tools such as backdoors and rootkits. The recommendations encompass various transmission mechanisms, including network services (e.g., e-mail, Web browsing, file sharing) and removable media.