The First step in Defending Against Malicious Code Infections is Ensuring that a Strong Trust Infrastructure is in Place and Well Secured.