Malware Testing Rules Improved

On the latest news broadcast, the coverage of principles and resources on security tool examination was extended by the anti malware governing body, Anti Malware Testing Standards Organization (AMTSO).

This was set off for the purpose of distributing software testers that possess high-quality and precise schemes on checking the level of security that an item can offer.

Strengthening of scanning abilities was called for

During a meeting that was held in the month of May, the constituents of AMTSO collectively agreed on the utilization of the two recently-distributed papers regarding the testing principles.

The first paper was entitled as “Whole Product Protection Testing Guidelines” and this talks mainly about what kind of action the testers should perform.

As written on this document, the software testers must use an unbiased when it comes to appraising security devices.

Systematic evaluation has always been necessary

According to Igor Muttik, the director of AMTSO, many of the latest assessment tools concentrate on individual technologies like that of on-demand scans.

Muttik stated that a rational perception on a tool can only be achieved through a thorough examination on the capacity of a security product to provide well-built protection.  

Careful assessment can, in fact, help in assessing the protection that a tool can offer to the users of computers.

Another paper was approved by the anti malware agency, Anti Malware Testing Standards Organization, in response to their aim for the high-quality security tester.

This paper, “Performance Testing Guidelines”, happens to be the second installment that was talked about in the said meeting.

This shows the intricacies in performing a successful speed testing.

Data appear distorted when testers examine products

According to the chief research officer of F-Secure, Mikko Hyppönen, there is a variety of factors as to why there are differences in the results when testers examine the security products.

Hence, the two papers will surely be of great help when it comes to recognizing the differences whenever the security tools are being examined.

This will also assist the testers in limiting the occurrence of the discrepancies when these are providing the results of a comprehensive examination.