Next: About this document ... Up: A Guide to the Selection Previous: References

Index

access control shells
Tools and Techniques, Access Control Shells, Selecting an Access Control
accuracy
Selection Factors, Accuracy
administrative overhead
Selection Factors, Administrative Overhead
algorithmic detection
see scanners
baseline
Functionality
BBS
For Additional Information
bulletin board system
see BBS
change detection
Tools and Techniques, Checksums for Change Detection, Selecting a Change Detector
checksum
Functionality
checksums
see change detection
CRC
Functionality
cryptographic checksums
Functionality, Functionality
Cyclic Redundancy Check
see CRC
detection
Detection Tools
ease of use
Selection Factors, Ease of Use
executable
Definitions and Basic Concepts
general purpose monitors
Tools and Techniques, General Purpose Monitors, Selecting a General Purpose
heuristic binary analysis
Tools and Techniques, Heuristic Binary Analysis
identification
Identification Tools
inoculation
Tools and Techniques, Inoculation
integrity checking
Detection of Modification
Message Digesting
Functionality
NIST SP 500-166
Introduction, Definitions and Basic Concepts
precise identification
Tools and Techniques, Precise Identification Tools, Selecting an Identification Tool
removal
Removal Tools
scanners
Signature Scanning and Algorithmic , Selecting a Scanner
single-point
Functionality
self-recognition
Definitions and Basic Concepts
signature scanning
see scanners
system overhead
Selection Factors, System Overhead
Trojan horse
Definitions and Basic Concepts
variant
Definitions and Basic Concepts
virus
Definitions and Basic Concepts
encrypted
Definitions and Basic Concepts
``in the wild''
Definitions and Basic Concepts
non-overwriting
Definitions and Basic Concepts
overwriting
Definitions and Basic Concepts
polymorphic
Definitions and Basic Concepts, Functionality
polymorphic
Definitions and Basic Concepts, Functionality
research
Definitions and Basic Concepts
resident
Definitions and Basic Concepts
stealth
Definitions and Basic Concepts
variably encrypted
Definitions and Basic Concepts
VIRUS-L
For Additional Information
worm
Definitions and Basic Concepts

konczal@csrc.ncsl.nist.gov
Fri Mar 11 21:26:02 EST 1994