Guarding Against Virus and Trojan-Horse Applications The most effective way to mitigate virus and Trojan-horse applications is to use antivirus software or a host-based IPS. These mitigation techniques can be deployed at the host and at the network level to prevent the entry of this attack vector into the network. The key point to remember is that these software applications rely on a database for the virus and Trojan-horse application signatures and the database must be kept up-to-date. |