Virus Signatures are pieces of code that can uniquely identify malware. Publishers of software that is built to detect malicious code look for telltale functions (behavior) that could be classified as typical of how a particular piece of malicious code works. The unique code is likely to be a type of algorithm known as a “hash”. The system is then searched for matches. The publishers maintain and update databases of the unique malware markers.
Its Relevance: The information security policies and procedures of an organization must address how the infrastructure is to be protected against malicious software vectors. One defensive technique that can be used is to purchase and deploy a security suite that actively scans information systems for recognizable snippets of code to target for deletion.
Return from "Virus Signatures" to Words [V - X]