IDEAS home Printed from https://ideas.repec.org/a/igg/jeei00/v4y2013i3p53-64.html
   My bibliography  Save this article

An Innovative Custom Cyber Security Solution for Protecting Enterprises and Corporates’ Assets

Author

Listed:
  • Karim Ouazzane

    (School of Computing, London Metropolitan University, London, UK)

  • Markson Aigbodi

    (LifelineIT Ltd, Borehamwood, London, UK)

  • Daniel Mitchell

    (LifelineIT Ltd, Borehamwood, London, UK)

  • Vassil Vassilev

    (School of Computing, London Metropolitan University, London, UK)

  • Jun Li

    (Department of Oncology, University of Oxford, Oxford, UK)

Abstract

Anti-virus software has been the main defense against malicious application and will remain so in the future. However the strength of an anti-virus product will depend on having an updated virus signature and the heuristic engine to detect future and unknown virus. The time gap between an exploit appearing on the internet and the user receiving an update for their anti-virus signature database on their machine is very crucial. Having a diverse multi-Engine anti-virus scanner in the infrastructure with the capability for custom signature definition as part of a defence in-depth strategy will help to close that gap. This paper presents a technique of deploying more than one anti-virus solution at different layers and using custom anti-virus signature which is deployed in a custom proxy solution as part of a defence in-depth strategy.

Suggested Citation

  • Karim Ouazzane & Markson Aigbodi & Daniel Mitchell & Vassil Vassilev & Jun Li, 2013. "An Innovative Custom Cyber Security Solution for Protecting Enterprises and Corporates’ Assets," International Journal of E-Entrepreneurship and Innovation (IJEEI), IGI Global, vol. 4(3), pages 53-64, July.
  • Handle: RePEc:igg:jeei00:v:4:y:2013:i:3:p:53-64
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijeei.2013070104
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jeei00:v:4:y:2013:i:3:p:53-64. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.