McAfee virusscan 4.5 Guia Do Utilizador
Preface
x
McAfee VirusScan Anti-Virus Software
Information security as a business necessity
Coincidentally or not, these darkly inventive new virus attacks and speedy
propagation methods appeared as more businesses made the transition to
Internet-based information systems and electronic commerce operations. The
convenience and efficiency that the Internet brought to business saved money
and increased profits. This probably also made these same businesses
attractive targets for pranksters, the hacker underground, and those intent on
striking at their favored targets.
propagation methods appeared as more businesses made the transition to
Internet-based information systems and electronic commerce operations. The
convenience and efficiency that the Internet brought to business saved money
and increased profits. This probably also made these same businesses
attractive targets for pranksters, the hacker underground, and those intent on
striking at their favored targets.
Previously, the chief costs from a virus attack were the time and money it took
to combat an infection and restore computer systems to working order. To
those costs the new types of virus attacks now added the costs of lost
productivity, network and server downtime, service denials for e-mail and
other critical business tools, exposure—and perhaps widespread distribution
—of confidential information, and other ills.
to combat an infection and restore computer systems to working order. To
those costs the new types of virus attacks now added the costs of lost
productivity, network and server downtime, service denials for e-mail and
other critical business tools, exposure—and perhaps widespread distribution
—of confidential information, and other ills.
Ultimately, the qualifying differences between a hacker-directed security
breach in a network and a security breach that results from a virus attack
might become merely ones of intent and method, not results. Already new
attacks have shaken the foundations of Net-enabled businesses, many of
which require 24-hour availability for networks and e-mail, high data
integrity, confidential customer lists, secure credit card data and purchase
verification, reliable communications, and hundreds of other computer-aided
transactional details. The costs from these virus attacks in the digital economy
now cut directly into the bottom line.
breach in a network and a security breach that results from a virus attack
might become merely ones of intent and method, not results. Already new
attacks have shaken the foundations of Net-enabled businesses, many of
which require 24-hour availability for networks and e-mail, high data
integrity, confidential customer lists, secure credit card data and purchase
verification, reliable communications, and hundreds of other computer-aided
transactional details. The costs from these virus attacks in the digital economy
now cut directly into the bottom line.
Because they do, protecting that bottom line means implementing a total
solution for information and network security—one that includes
comprehensive anti-virus protection. It’s not enough to rely only on
desktop-based anti-virus protection, or on haphazard or ad hoc security
measures. The best defense requires sealing all potential points by which
viruses can enter or attack your network, from the firewall and gateway down
to the individual workstation, and keeping the anti-virus sentries at those
points updated and current.
solution for information and network security—one that includes
comprehensive anti-virus protection. It’s not enough to rely only on
desktop-based anti-virus protection, or on haphazard or ad hoc security
measures. The best defense requires sealing all potential points by which
viruses can enter or attack your network, from the firewall and gateway down
to the individual workstation, and keeping the anti-virus sentries at those
points updated and current.
Part of the solution is deploying the McAfee Active Virus Defense* software
suite, which provides a comprehensive, multi-platform series of defensive
perimeters for your network. You can also build on that security with the
McAfee Active Security suite, which allows you to monitor your network
against intrusions, watch actual network packet traffic, and encrypt e-mail and
network transmissions. But even with anti-virus and security software
installed, new and previously unidentified viruses will inevitably find their
way into your network. That’s where the other part of the equation comes in:
a thorough, easy-to-follow anti-virus security policy and set of practices for
your enterprise—in the last analysis, only that can help to stop a virus attack
before it becomes a virus epidemic.
suite, which provides a comprehensive, multi-platform series of defensive
perimeters for your network. You can also build on that security with the
McAfee Active Security suite, which allows you to monitor your network
against intrusions, watch actual network packet traffic, and encrypt e-mail and
network transmissions. But even with anti-virus and security software
installed, new and previously unidentified viruses will inevitably find their
way into your network. That’s where the other part of the equation comes in:
a thorough, easy-to-follow anti-virus security policy and set of practices for
your enterprise—in the last analysis, only that can help to stop a virus attack
before it becomes a virus epidemic.