Next: About this document ...
Up: A Guide to the Selection
Previous: References
- access control shells
- Tools and Techniques, Access Control Shells, Selecting an Access Control
- accuracy
- Selection Factors, Accuracy
- administrative overhead
- Selection Factors, Administrative Overhead
- algorithmic detection
- see scanners
- baseline
- Functionality
- BBS
- For Additional Information
- bulletin board system
- see BBS
- change detection
- Tools and Techniques, Checksums for Change Detection, Selecting a Change Detector
- checksum
- Functionality
- checksums
- see change detection
- CRC
- Functionality
- cryptographic checksums
- Functionality, Functionality
- Cyclic Redundancy Check
- see CRC
- detection
- Detection Tools
- ease of use
- Selection Factors, Ease of Use
- executable
- Definitions and Basic Concepts
- general purpose monitors
- Tools and Techniques, General Purpose Monitors, Selecting a General Purpose
- heuristic binary analysis
- Tools and Techniques, Heuristic Binary Analysis
- identification
- Identification Tools
- inoculation
- Tools and Techniques, Inoculation
- integrity checking
- Detection of Modification
- Message Digesting
- Functionality
- NIST SP 500-166
- Introduction, Definitions and Basic Concepts
- precise identification
- Tools and Techniques, Precise Identification Tools, Selecting an Identification Tool
- removal
- Removal Tools
- scanners
- Signature Scanning and Algorithmic , Selecting a Scanner
- single-point
- Functionality
- self-recognition
- Definitions and Basic Concepts
- signature scanning
- see scanners
- system overhead
- Selection Factors, System Overhead
- Trojan horse
- Definitions and Basic Concepts
- variant
- Definitions and Basic Concepts
- virus
- Definitions and Basic Concepts
- encrypted
- Definitions and Basic Concepts
- ``in the wild''
- Definitions and Basic Concepts
- non-overwriting
- Definitions and Basic Concepts
- overwriting
- Definitions and Basic Concepts
- polymorphic
- Definitions and Basic Concepts, Functionality
- polymorphic
- Definitions and Basic Concepts, Functionality
- research
- Definitions and Basic Concepts
- resident
- Definitions and Basic Concepts
- stealth
- Definitions and Basic Concepts
- variably encrypted
- Definitions and Basic Concepts
- VIRUS-L
- For Additional Information
- worm
- Definitions and Basic Concepts