| 
                           
                              | 
                                       Chey Cobb
                                          | Chapter 24 – | Antivirus Technology |  
 Chapter Contents:
 
 
 
                                       
                                          |  | 24.1 |  | Introduction |  
                                          |  | 24.1.1 |  | Antivirus (AV) Terminology |  
                                          |  | 24.1.2 |  | Antivirus Issues |  
                                          |  | 24.2 |  | A History of Viral Changes |  
                                          |  | 24.3 |  | Antivirus Basics |  
                                          |  | 24.3.1 |  | Early Days of AV Scanners |  
                                          |  | 24.3.2 |  | Validity of Scanners |  
                                          |  | 24.3.3 |  | Scanner Internals |  
                                          |  | 24.3.4 |  | Antivirus Engines and Antivirus Databases |  
                                          |  | 24.4 |  | Scanning Methodologies |  
                                          |  | 24.4.1 |  | Detection |  
                                          |  | 24.4.2 |  | Prevention |  
                                          |  | 24.4.3 |  | Heuristics |  
                                          |  | 24.5 |  | Immune Systems |  
                                          |  | 24.5.1 |  | How Does the Immune System Work? |  
                                          |  | 24.5.2 |  | Will it Work? |  
                                          |  | 24.6 |  | Content Filtering |  
                                          |  | 24.6.1 |  | How Content Filters Work |  
                                          |  | 24.6.2 |  | Efficiency and Efficacy |  
                                          |  | 24.7 |  | Antivirus Deployment |  
                                          |  | 24.7.1 |  | Desktops Alone |  
                                          |  | 24.7.2 |  | Server-Based Antivirus |  
                                          |  | 24.8 |  | Policies and Strategies |  
                                          |  | 24.9 |  | Conclusion |  
                                          |  | 24.10 |  | For Further Reading |  
 |  | 
                  
                     |  |