O'Reilly logo

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition by Aaron LeMasters, Sean M. Bodmer, Michael A. Davis, Christopher C. Elisan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 11

GENERAL SECURITY PRACTICES

Now that we’ve covered the various functionalities of malware and rootkits and associated protection technologies, we’ll discuss security practices. These practices encompass simple corporate policies such as user education, training awareness programs, patching and update policies, and/or simply implementing industry-approved security standards. In this section, you’ll learn more about some simple strategies that, when implemented, can increase your overall security posture and reduce your risk of malware infection.

End-User Education

An important part of any security program is end-user education. If your users don’t know what to be on the lookout for or what threats they may fall victim to, your foundation ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required