Online resources online authoritative hoax

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: rm a tio n m a y b e ina c c ura te , inc o m p le te o r o ut o f d a te S e a rc h e ng ine s g e ne ra te h ug e num b e rs o f ind is c rim ina te h its S o m e a nti­virus We b s ite s a re s c a m s (o r c o nta in tro ja n Ho rs e s ) G o d ire c tly to a uth o rita tive a nti­ virus s ite s NOTE #2 NOTE Computer companies are NOT reliable sources of virus information Computer companies: Usually refer you to an anti­virus vendor are not in the anti­virus business themselves are victims! ONLINE RESOURCES ONLINE Authoritative Hoax Information securityresponse.symantec.com/avcenter/hoax.html vil.mcafeesecurity.com/vil/hoaxes.asp Authoritative Anti-Virus Vendor Information securityresponse.symantec.com/avcenter/vinf odb.html odb.html www.mcafeesecurity.com/us/security/vil.htm REFERENCES REFERENCES Authoritative Security Alert Information securityresponse.symantec.com/ (Symantec) www.microsoft.com/security (Microsoft) www.apple.com/support/security/ (Apple) Authoritative Anti-Virus Organizations Authoritative www.cert.org (Computer Emergency Response Team-CMU) (Computer www.ciac.org/ciac www.ciac.org/ciac (CIAC-Department of Energy) (CIAC-Department www.sans.org/aboutsans.php www.sans.org/aboutsans.php (Server and Network Security) (Server www.first.org www.first.org (Forum of Incident Response and Security Teams) (Forum www.cirt.rutgers.edu www.cirt.rutgers.edu (Computing Incident Response Team-Rutgers) (Computing Authoritative Free Public Anti-Virus Removal Tool Information Tool s e c urityre s p o ns e .s y m a nte c .c o m /a vc e nte r/to o ls .lis t.h t vil.na i.c o m /vil/a ve rtto o ls .a s p m s s g .rutg e rs .e d u/d o c um e nta tio n/virus e s (R utg e rs ) s o m e p ro fe s s io na l lib ra ry s ite s h a ve p o inte rs to re lia b le a nti­virus info rm a tio n PRINT RESOURCES PRINT Alle n, J ulia , (2 0 0 1 ) The CERT Guide to System and Network Security Practices, Addison­Wesley, New York Crume, Jeff, (2000) Inside Internet Security, Addison­Wesley, New York Ratzan, Lee, (January 2005) A new role for libraries, SC Magazine (Secure Computing Magazine), page 26 Ratzan, Lee, (2004) Understanding Information Systems, American Library Association, Chicago A NEW ROLE FOR LIBRARIES? NEW THE AUTHOR ACKNOWLEDGES THE The cooperation of InfoLink (www.infolink.org) for promoting library professional development programs The Monroe Public Library for the use of its facilities SC Magazine for publishing an essay on libraries being at the forefront of information security Lisa DeBilio for her production of the PowerPoint slides. THANK YOU ALL...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online