home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Internet Standards
/
CD1.mdf
/
misc
/
fips
/
500_166.txt
next >
Wrap
Internet Message Format
|
1990-04-11
|
128KB
From brian@ucsd.Edu Thu Apr 12 19:07:26 1990
From: brian@ucsd.Edu (Brian Kantor)
Newsgroups: comp.doc
Subject: FIPS_500_166.TXT.1
Date: 10 Apr 90 03:24:39 GMT
Distribution: usa
Organization: The Avant-Garde of the Now, Ltd.
Computer Systems Technology
================================================================================
NIST Special Publication 500-166
Computer Viruses and Related Threats:
A Management Guide
John P. Wack
Lisa J. Carnahan
Ordering information:
Copies can be ordered from:
Superintendent of Documents
Government Printing Office
Washington, D.C. 20402
(202) 783-3238
GPO # 003-003-02955-6
Price is $2.50 per copy
COMPUTER VIRUSES AND RELATED THREATS
Table of Contents
Executive Summary . . . . . . . . . . . . . . . . . . . . . . v
1. Introduction . . . . . . . . . . . . . . . . . . . . . . 1-1
1.1 Audience and Scope . . . . . . . . . . . . . . . 1-1
1.2 How to Use This Guide . . . . . . . . . . . . . . 1-2
2. A Brief Overview on Viruses and Related Threats . . . . 2-1
2.1 Trojan Horses . . . . . . . . . . . . . . . . . . 2-1
2.2 Computer Viruses . . . . . . . . . . . . . . . . 2-3
2.3 Network Worms . . . . . . . . . . . . . . . . . . 2-5
2.4 Other Related Software Threats . . . . . . . . . 2-8
2.5 The Threat of Unauthorized Use . . . . . . . . . 2-8
3. Virus Prevention in General . . . . . . . . . . . . . . 3-1
3.1 User Education . . . . . . . . . . . . . . . . . 3-3
3.2 Software Management . . . . . . . . . . . . . . . 3-4
3.3 Technical Controls . . . . . . . . . . . . . . . 3-6
3.4 General Monitoring . . . . . . . . . . . . . . . 3-8
3.5 Contingency Planning . . . . . . . . . . . . . . 3-9
4. Virus Prevention for Multi-User Computers and Associated
Networks . . . . . . . . . . . . . . . . . . . . . . . 4-1
4.1 General Policies . . . . . . . . . . . . . . . . 4-1
4.2 Software Management . . . . . . . . . . . . . . . 4-2
4.3 Technical Controls . . . . . . . . . . . . . . . 4-4
4.4 Monitoring . . . . . . . . . . . . . . . . . . . 4-7
4.5 Contingency Planning . . . . . . . . . . . . . . 4-9
4.6 Associated Network Concerns . . . . . . . . . . . 4-10
5. Virus Prevention for Personal Computers and Associated
Networks . . . . . . . . . . . . . . . . . . . . . . . 5-1
5.1 General Policies . . . . . . . . . . . . . . . . 5-2
5.2 Software Management . . . . . . . . . . . . . . . 5-3
5.3 Technical Controls . . . . . . . . . . . . . . . 5-4
5.4 Monitoring . . . . . . . . . . . . . . . . . . . 5-6
5.5 Contingency Planning . . . . . . . . . . . . . . 5-7
iii
COMPUTER VIRUSES AND RELATED THREATS
5.6 Associated Network Concerns . . . . . . . . . . . 5-9
References . . . . . . . . . . . . . . . . . . . . . . . . A-1
Suggested Reading . . . . . . . . . . . . . . . . . . . . . B-1
iv
COMPUTER VIRUSES AND RELATED THREATS
EXECUTIVE SUMMARY
Executive Summary
Computer viruses and related threats represent an increasingly
serious security problem in computing systems and networks. This
document presents guidelines for preventing, deterring,
containing, and recovering from attacks of viruses and related
threats. This section acquaints senior management with the
nature of the problem and outlines some of the steps that can be
taken to reduce an organization's vulnerability.
What Are Computer Viruses and Related Threats?
Computer viruses are the most widely recognized example of a
class of programs written to cause some form of intentional
damage to computer systems or networks. A computer virus
performs two basic functions: it copies itself to other programs,
thereby infecting them, and it executes the instructions the
author has included in it. Depending on the author's motives, a
program infected with a virus may cause damage immediately upon
its execution, or it may wait until a certain event has occurred,
such as a particular date and time. The damage can vary widely,
and can be so extensive as to require the complete rebuilding of
all system software and data. Because viruses can spread rapidly
to other programs and systems, the damage can multiply
geometrically.
Related threats include other forms of destructive programs such
as Trojan horses and network worms. Collectively, they are
sometimes referred to as malicious software. These programs are
often written to masquerade as useful programs, so that users are
induced into copying them and sharing them with friends and work
colleagues. The malicious software phenomena is fundamentally a
people problem, as it is authored and initially spread by
individuals who use systems in an unauthorized manner. Thus, the
threat of unauthorized use, by unauthorized and authorized users,
must be addressed as a part of virus prevention.
v
COMPUTER VIRUSES AND RELATED THREATS
EXECUTIVE SUMMARY
What Are the Vulnerabilities They Exploit?
Unauthorized users and malicious software may gain access to
systems through inadequate system security mechanisms, through
security holes in applications or systems, and through weaknesses
in computer management, such as the failure to properly use
existing security mechanisms. Malicious software can be copied
intentionally onto systems, or be spread when users unwittingly
copy and share infected software obtained from public software
repositories, such as software bulletin boards and shareware.
Because malicious software often hides its destructive nature by
performing or claiming to perform some useful function, users
generally don't suspect that they are copying and spreading the
problem.
Why Are Incidents of Viruses and Related Threats On the Rise?
Viruses and related threats, while not a recent phenomena, have
had relatively little attention focused on them in the past.
They occurred less frequently and caused relatively little
damage. For these reasons, they were frequently treated lightly
in computer design and by management, even though their potential
for harm was known to be great.
Computer users have become increasingly proficient and
sophisticated. Software applications are increasingly complex,
making their bugs and security loopholes more difficult to
initially detect and correct by the manufacturer. In conjunction
with these two factors, some brands of software are now widely
used, thus their bugs and security loopholes are often known to
users. With the widespread use of personal computers that lack
effective security mechanisms, it is relatively easy for
knowledgeable users to author malicious software and then dupe
unsuspecting users into copying it.
vi
COMPUTER VIRUSES AND RELATED THREATS
EXECUTIVE SUMMARY
Steps Toward Reducing Risk
Organizations can take steps to reduce their risk to viruses and
related threats. Some of the more important steps are outlined
below.
o Include the damage potential of viruses, unauthorized
use, and related threats in risk analysis and contingency
planning. Develop a plan to deal with potential
incidents.
o Make computer security education a prerequisite to any
computer use. Teach users how to protect their systems
and detect evidence of tampering or unusual activity.
o Ensure that technically oriented security and management
staff are in place to deal with security incidents.
o Use the security mechanisms that exist in your current
software. Ensure that they are used correctly. Add to
them as necessary.
o Purchase and use software tools to aid in auditing
computing activity and detecting the presence of
tampering and damage.
vii
COMPUTER VIRUSES AND RELATED THREATS
EXECUTIVE SUMMARY
viii
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 1
1. Introduction
This document provides guidance for technical managers for the
reduction of risk to their computer systems and networks from
attack by computer viruses, unauthorized users, and related
threats. The guidance discusses the combined use of policies,
procedures, and controls to address security vulnerabilities that
can leave systems open to attack. The aim of this document is
not to provide solutions to the wide range of specific problems
or vulnerabilities, rather it is to help technical managers
administer their systems and networks such that manifestations of
viruses and related threats can be initially prevented, detected,
and contained.
1.1 Audience and Scope
This document is intended primarily for the managers of multi-
user systems, personal computers, and associated networks, and
managers of end-user groups. Additionally, the document is
useful for the users of such systems. The document presents an
overview of computer viruses and related threats, how they
typically work, the methods by which they can attack, and the
harm they can potentially cause. It then presents guidance in
the following areas:
o Multi-User Systems and Associated Networks - with _____________________________________________
guidance directed at managers of medium to small
systems (as opposed to mainframes that already provide
generally effective security controls or are by their
nature more secure) and associated wide area and large
local area networks, as well as managers of end-users
of such systems
o Personal Computer Systems and Networks - guidance is
directed at those responsible for the management of
personal computers and personal computer networks, as
well as the managers of personal computer end-users
1-1
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 1
Within these general categories, individual computing
environments will vary widely, from size of computer to user
population to type of software and computing requirements. To
accommodate these differences, the guidance presented here is
general in nature. It attempts to address computer security
problems and vulnerabilities that are likely to be found in most
computing environments. This document does not address problems
directly related to specific brands of software or hardware. A
reading list at the end of the document contains references and
pointers to other literature that address specific systems and
software.
Recommended control measures are grouped according to categories
that include general policies and procedures, education, software
management, technical controls, monitoring, and contingency
planning. The guidance emphasizes the need for a strong security
program as a means for protection from manifestations of viruses
and related threats, and as a means for providing detection,
containment, and recovery. Such a security program requires
personal involvement on the part of management to ensure that the
proper policies, procedures, and technical controls exist, and
that users are educated so that they can follow safe computing
practices and understand the proper actions to take if they
detect the presence of viruses or related threats. The
guidelines recommend that network managers, multi-user system
managers, end-users, and end-user managers work with each other
and approach virus protection from an organizationally consistent
basis.
1.2 How to Use This Guide
This document is divided into five chapters and two appendices.
Chapter 2 describes in general how viruses and related software
operate, the vulnerabilities they exploit, and how they can be
introduced into systems and networks. Chapter 3 discusses
general protection strategies and control measures that apply to
technical and end-user management in general; this is done so
that the same guidance need not be repeated for each of the
1-2
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 1
succeeding chapters that deal with specific environments.
Chapters 4 and 5 present guidance specific to multi-user and
personal computer environments, respectively. The guidance in
these chapters is directed at the respective technical managers
and managers of associated networks, as well as the managers of
end-user groups that use such systems and networks. It is
recommended that all readers, regardless of their management
perspective, examine Chapters 3, 4, and 5 to gain a fuller
appreciation of the whole environment with regard to threats,
vulnerabilities, and controls.
Appendix A contains document references, while Appendix B
contains a reading list with references to general and specific
information on various types of viruses, systems, and protective
measures. Readers can use these documents to obtain information
specific to their individual systems and software.
1-3
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 1
1-4
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 2
2. A Brief Overview on Viruses and Related Threats
The term computer virus is often used in a general sense to
indicate any software that can cause harm to systems or networks.
However, computer viruses are just one example of many different
but related forms of software that can act with great speed and
power to cause extensive damage -other important examples are
Trojan horses and network worms. In this document, the term
malicious software refers to such software.
2.1 Trojan Horses
A Trojan horse1 program is a useful or apparently useful program
or command procedure containing hidden code that, when invoked,
performs some unwanted function. An author of a Trojan horse
program might first create or gain access to the source code of a
useful program that is attractive to other users, and then add
code so that the program performs some harmful function in
addition to its useful function. A simple example of a Trojan
horse program might be a calculator program that performs
functions similar to that of a pocket calculator. When a user
invokes the program, it appears to be performing calculations and
nothing more, however it may also be quietly deleting the user's
files, or performing any number of harmful actions. An example
of an even simpler Trojan horse program is one that performs only
a harmful function, such as a program that does nothing but
delete files. However, it may appear to be a useful program by
having a name such as CALCULATOR or something similar to promote
acceptability.
Trojan horse programs can be used to accomplish functions
indirectly that an unauthorized user could not accomplish
____________________
1 named after the use of a hollow wooden horse filled with
enemy soldiers used to gain entry into the city of Troy in
ancient Greece.
2-1
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 2
directly. For example, a user of a multi-user system who wishes
to gain access to other users' files could create a Trojan horse
program to circumvent the users' file security mechanisms. The
Trojan horse program, when run, changes the invoking user's file
permissions so that the files are readable by any user. The
author could then induce users to run this program by placing it
in a common directory and naming it such that users will think
the program is a useful utility. After a user runs the program,
the author can then access the information in the user's files,
which in this example could be important work or personal
information. Affected users may not notice the changes for long
periods of time unless they are very observant.
An example of a Trojan horse program that would be very difficult
to detect would be a compiler on a multi-user system that has
been modified to insert additional code into certain programs as
they are compiled, such as a login program. The code creates a
trap door in the login program which permits the Trojan horse's
author to log onto the system using a special password. Whenever
the login program is recompiled, the compiler will always insert
the trap door code into the program, thus the Trojan horse code
can never be discovered by reading the login program's source
code. For more information on this example, see [THOMPSON84].
Trojan horse programs are introduced into systems in two ways:
they are initially planted, and unsuspecting users copy and run
them. They are planted in software repositories that many people
can access, such as on personal computer network servers,
publicly-accessible directories in a multi-user environment, and
software bulletin boards. Users are then essentially duped into
copying Trojan horse programs to their own systems or
directories. If a Trojan horse program performs a useful
function and causes no immediate or obvious damage, a user may
continue to spread it by sharing the program with other friends
and co-workers. The compiler that copies hidden code to a login
program might be an example of a deliberately planted Trojan
horse that could be planted by an authorized user of a system,
such as a user assigned to maintain compilers and software tools.
2-2
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 2
2.2 Computer Viruses
Computer viruses, like Trojan horses, are programs that contain
hidden code which performs some usually unwanted function.
Whereas the hidden code in a Trojan horse program has been
deliberately placed by the program's author, the hidden code in a
computer virus program has been added by another program, that
program itself being a computer virus or Trojan horse. Thus,
computer viruses are programs that copy their hidden code to
other programs, thereby infecting them. Once infected, a program
may continue to infect even more programs. In due time, a
computer could be completely overrun as the viruses spread in a
geometric manner.
An example illustrating how a computer virus works might be an
operating system program for a personal computer, in which an
infected version of the operating system exists on a diskette
that contains an attractive game. For the game to operate, the
diskette must be used to boot the computer, regardless of whether
the computer contains a hard disk with its own copy of the
(uninfected) operating system program. When the computer is
booted using the diskette, the infected program is loaded into
memory and begins to run. It immediately searches for other
copies of the operating system program, and finds one on the hard
disk. It then copies its hidden code to the program on the hard
disk. This happens so quickly that the user may not notice the
slight delay before his game is run. Later, when the computer is
booted using the hard disk, the newly infected version of the
operating system will be loaded into memory. It will in turn
look for copies to infect. However, it may also perform any
number of very destructive actions, such as deleting or
scrambling all the files on the disk.
A computer virus exhibits three characteristics: a replication
mechanism, an activation mechanism, and an objective. The
replication mechanism performs the following functions:
2-3
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 2
o searches for other programs to infect
o when it finds a program, possibly determines whether
the program has been previously infected by checking a
flag
o inserts the hidden instructions somewhere in the
program
o modifies the execution sequence of the program's
instructions such that the hidden code will be
executed whenever the program is invoked
o possibly creates a flag to indicate that the program
has been infected
The flag may be necessary because without it, programs could be
repeatedly infected and grow noticeably large. The replication
mechanism could also perform other functions to help disguise
that the file has been infected, such as resetting the program
file's modification date to its previous value, and storing the
hidden code within the program so that the program's size remains
the same.
The activation mechanism checks for the occurrence of some event.
When the event occurs, the computer virus executes its objective,
which is generally some unwanted, harmful action. If the
activation mechanism checks for a specific date or time before
executing its objective, it is said to contain a time bomb. If
it checks for a certain action, such as if an infected program
has been executed a preset number of times, it is said to contain
a logic bomb. There may be any number of variations, or there
may be no activation mechanism other than the initial execution
of the infected program.
As mentioned, the objective is usually some unwanted, possibly
destructive event. Previous examples of computer viruses have
varied widely in their objectives, with some causing irritating
but harmless displays to appear, whereas others have erased or
modified files or caused system hardware to behave differently.
2-4
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 2
Generally, the objective consists of whatever actions the author
has designed into the virus.
As with Trojan horse programs, computer viruses can be introduced
into systems deliberately and by unsuspecting users. For
example, a Trojan horse program whose purpose is to infect other
programs could be planted on a software bulletin board that
permits users to upload and download programs. When a user
downloads the program and then executes it, the program proceeds
to infect other programs in the user's system. If the computer
virus hides itself well, the user may continue to spread it by
copying the infected program to other disks, by backing it up,
and by sharing it with other users. Other examples of how
computer viruses are introduced include situations where
authorized users of systems deliberately plant viruses, often
with a time bomb mechanism. The virus may then activate itself
at some later point in time, perhaps when the user is not logged
onto the system or perhaps after the user has left the
organization. For more information on computer viruses, see
[DENNING88]
2.3 Network Worms
Network worm programs use network connections to spread from
system to system, thus network worms attack systems that are
linked via communications lines. Once active within a system, a
network worm can behave as a computer virus, or it could implant
Trojan horse programs or perform any number of disruptive or
destructive actions. In a sense, network worms are like computer
viruses with the ability to infect other systems as well as other
programs. Some people use the term virus to include both cases.
To replicate themselves, network worms use some sort of network
vehicle, depending on the type of network and systems. Examples
of network vehicles include (a) a network mail facility, in which
a worm can mail a copy of itself to other systems, or (b), a
remote execution capability, in which a worm can execute a copy
of itself on another system, or (c) a remote login capability,
2-5
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 2
whereby a worm can log into a remote system as a user and then
use commands to copy itself from one system to the other. The
new copy of the network worm is then run on the remote system,
where it may continue to spread to more systems in a like manner.
Depending on the size of a network, a network worm can spread to
many systems in a relatively short amount of time, thus the
damage it can cause to one system is multiplied by the number of
systems to which it can spread.
A network worm exhibits the same characteristics as a computer
virus: a replication mechanism, possibly an activation mechanism,
and an objective. The replication mechanism generally performs
the following functions:
o searches for other systems to infect by examining host
tables or similar repositories of remote system
addresses
o establishes a connection with a remote system,
possibly by logging in as a user or using a mail
facility or remote execution capability
o copies itself to the remote system and causes the copy
to be run
The network worm may also attempt to determine whether a system
has previously been infected before copying itself to the system.
In a multi-tasking computer, it may also disguise its presence by
naming itself as a system process or using some other name that
may not be noticed by a system operator.
The activation mechanism might use a time bomb or logic bomb or
any number of variations to activate itself. Its objective, like
all malicious software, is whatever the author has designed into
it. Some network worms have been designed for a useful purpose,
such as to perform general "house-cleaning" on networked systems,
or to use extra machine cycles on each networked system to
perform large amounts of computations not practical on one
system. A network worm with a harmful objective could perform a
wide range of destructive functions, such as deleting files on
2-6
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 2
each affected computer, or by implanting Trojan horse programs or
computer viruses.
Two examples of actual network worms are presented here. The
first involved a Trojan horse program that displayed a Christmas
tree and a message of good cheer (this happened during the
Christmas season). When a user executed this program, it
examined network information files which listed the other
personal computers that could receive mail from this user. The
program then mailed itself to those systems. Users who received
this message were invited to run the Christmas tree program
themselves, which they did. The network worm thus continued to
spread to other systems until the network was nearly saturated
with traffic. The network worm did not cause any destructive
action other than disrupting communications and causing a loss in
productivity [BUNZEL88].
The second example concerns the incident whereby a network worm
used the collection of networks known as the Internet to spread
itself to several thousands of computers located throughout the
United States. This worm spread itself automatically, employing
somewhat sophisticated techniques for bypassing the systems'
security mechanisms. The worm's replication mechanism accessed
the systems by using one of three methods:
o it employed password cracking, in which it attempted
to log into systems using usernames for passwords, as
well as using words from an on-line dictionary
o it exploited a trap door mechanism in mail programs
which permitted it to send commands to a remote
system's command interpreter
o it exploited a bug in a network information program
which permitted it to access a remote system's command
interpreter
By using a combination of these methods, the network worm was
able to copy itself to different brands of computers which used
similar versions of a widely-used operating system. Many system
managers were unable to detect its presence in their systems,
2-7
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 2
thus it spread very quickly, affecting several thousands of
computers within two days. Recovery efforts were hampered
because many sites disconnected from the network to prevent
further infections, thus preventing those sites from receiving
network mail that explained how to correct the problems.
It was unclear what the network worm's objective was, as it did
not destroy information, steal passwords, or plant viruses or
Trojan horses. The potential for destruction was very high, as
the worm could have contained code to effect many forms of
damage, such as to destroy all files on each system. For more
information, see [DENNING89] and [SPAFFORD88].
2.4 Other Related Software Threats
The number of variations of Trojan horses, computer viruses, and
network worms is apparently endless. Some have names, such as a
rabbit, whose objective is to spread wildly within or among other
systems and disrupt network traffic, or a bacterium, whose
objective is to replicate within a system and eat up processor
time until computer throughput is halted [DENNING88]. It is
likely that many new forms will be created, employing more
sophisticated techniques for spreading and causing damage.
2.5 The Threat of Unauthorized Use
In that computer viruses and related forms of malicious software
are intriguing issues in themselves, it is important not to
overlook that they are created by people, and are fundamentally a
people problem. In essence, examples of malicious software are
tools that people use to extend and enhance their ability to
create mischief and various other forms of damage. Such software
can do things that the interactive user often cannot directly
effect, such as working with great speed, or maintaining
anonymity, or doing things that require programmatic system
calls. But in general, malicious software exploits the same
vulnerabilities as can knowledgeable users. Thus, any steps
2-8
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 2
taken to reduce the likelihood of attack by malicious software
should address the likelihood of unauthorized use by computer
users.
2-9
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 2
2-10
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 3
3. Virus Prevention in General
To provide general protection from attacks by computer viruses,
unauthorized users, and related threats, users and managers need
to eliminate or reduce vulnerabilities. A general summary of the
vulnerabilities that computer viruses and related threats are
most likely to exploit is as follows:
o lack of user awareness - users copy and share infected
software, fail to detect signs of virus activity, do not
understand proper security techniques
o absence of or inadequate security controls - personal
computers generally lack software and hardware security
mechanisms that help to prevent and detect unauthorized
use, existing controls on multi-user systems can
sometimes be surmounted by knowledgeable users
o ineffective use of existing security controls - using
easily guessed passwords, failing to use access controls,
granting users more access to resources than necessary
o bugs and loopholes in system software - enabling
knowledgeable users to break into systems or exceed their
authorized privileges
o unauthorized use - unauthorized users can break in to
systems, authorized users can exceed levels of privilege
and misuse systems
o susceptibility of networks to misuse - networks can
provide anonymous access to systems, many are in general
only as secure as the systems which use them
As can be seen from this summary, virus prevention requires that
many diverse vulnerabilities be addressed. Some of the
vulnerabilities can be improved upon significantly, such as
security controls that can be added or improved, while others are
somewhat inherent in computing, such as the risk that users will
not use security controls or follow policies, or the risk of
unauthorized use of computers and networks. Thus, it may not be
3-1
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 3
possible to completely protect systems from all virus-like
attacks. However, to attain a realistic degree of protection,
all areas of vulnerability must be addressed; improving upon some
areas at the expense of others will still leave significant holes
in security.
To adequately address all areas of vulnerability, the active
involvement of individual users, the management structure, and
the organization in a virus prevention program is essential.
Such a program, whether formal or informal, depends on the mutual
cooperation of the three groups to identify vulnerabilities, to
take steps to correct them, and to monitor the results.
A virus prevention program must be initially based upon effective
system computer administration that restricts access to
authorized users, ensures that hardware and software are
regularly monitored and maintained, makes backups regularly, and
maintains contingency procedures for potential problems. Sites
that do not maintain a basic computer administration program need
to put one into place, regardless of their size or the types of
computers used. Many system vendors supply system administration
manuals that describe the aspects of a basic program, and one can
consult documents such as [FIPS73], or [NBS120].
Once a basic administration program is in place, management and
users need to incorporate virus prevention measures that will
help to deter attacks by viruses and related threats, detect when
they occur, contain the attacks to limit damage, and recover in a
reasonable amount of time without loss of data. To accomplish
these aims, attention needs to be focused on the following areas:
o educating users about malicious software in general, the
risks that it poses, how to use control measures,
policies, and procedures to protect themselves and the
organization
o software management policies and procedures that address
public-domain software, and the use and maintenance of
software in general
3-2
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 3
o use of technical controls that help to prevent and deter
attacks by malicious software and unauthorized users
o monitoring of user and software activity to detect signs
of attacks, to detect policy violations, and to monitor
the overall effectiveness of policies, procedures, and
controls
o contingency policies and procedures for containing and
recovering from attacks
General guidance in each of these areas is explained in the
following sections.
3.1 User Education
Education is one of the primary methods by which systems and
organizations can achieve greater protection from incidents of
malicious software and unauthorized use. In situations where
technical controls do not provide complete protection (i.e., most
computers), it is ultimately people and their willingness to
adhere to security policies that will determine whether systems
and organizations are protected. By educating users about the
general nature of computer viruses and related threats, an
organization can improve its ability to deter, detect, contain
and recover from potential incidents.
Users should be educated about the following:
o how malicious software operates, methods by which it is
planted and spread, the vulnerabilities exploited by
malicious software and unauthorized users
o general security policies and procedures and how to use
them
o the policies to follow regarding the backup, storage, and
use of software, especially public-domain software and
shareware
o how to use the technical controls they have at their
disposal to protect themselves
3-3
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 3
o how to monitor their systems and software to detect signs
of abnormal activity, what to do or whom to contact for
more information
o contingency procedures for containing and recovering from
potential incidents
User education, while perhaps expensive in terms of time and
resources required, is ultimately a cost-effective measure for
protecting against incidents of malicious software and
unauthorized use. Users who are better acquainted with the
destructive potential of malicious software and the methods by
which it can attack systems may in turn be prompted to take
measures to protect themselves. The purpose of security policies
and procedures will be more clear, thus users may be more willing
to actively use them. By educating users how to detect abnormal
system activity and the resultant steps to follow for containing
and recovering from potential incidents, organizations will save
money and time if and when actual incidents occur.
3.2 Software Management
As shown by examples in Chapter 2, one of the prime methods by
which malicious software is initially copied onto systems is by
unsuspecting users. When users download programs from sources
such as software bulletin boards, or public directories on
systems or network servers, or in general use and share software
that has not been obtained from a reputable source, users are in
danger of spreading malicious software. To prevent users from
potentially spreading malicious software, managers need to
o ensure that users understand the nature of malicious
software, how it is generally spread, and the technical
controls to use to protect themselves
o develop policies for the downloading and use of public-
domain and shareware software
o create some mechanism for validating such software prior
to allowing users to copy and use it
3-4
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 3
o minimize the exchange of executable software within an
organization as much as possible
o do not create software repositories on LAN servers or in
multi-user system directories unless technical controls
exist to prevent users from freely uploading or
downloading the software
The role of education is important, as users who do not
understand the risks yet who are asked to follow necessarily
restrictive policies may share and copy software anyway. Where
technical controls cannot prevent placing new software onto a
system, users are then primarily responsible for the success or
failure of whatever policies are developed.
A policy that prohibits any copying or use of public-domain
software may be overly restrictive, as some public domain
programs have proved to be useful. A less restrictive policy
would allow some copying, however a user might first require
permission from the appropriate manager. A special system should
be used from which to perform the copy and then to test the
software. This type of system, called an isolated system, should
be configured so that there is no risk of spreading a potentially
malicious program to other areas of an organization. The system
should not be used by other users, should not connect to
networks, and should not contain any valuable data. An isolated
system should also be used to test internally developed software
and updates to vendor software.
Other policies for managing vendor software should be developed.
These policies should control how and where software is
purchased, and should govern where the software is installed and
how it is to be used. The following policies and procedures are
suggested:
o purchase vendor software only from reputable sources
o maintain the software properly and update it as necessary
o don't use pirated software, as it may have been modified
3-5
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 3
o keep records of where software is installed readily
available for contingency purposes
o ensure that vendors can be contacted quickly if problems
occur
o store the original disks or tapes from the vendor in a
secure location
3.3 Technical Controls
Technical controls are the mechanisms used to protect the
security and integrity of systems and associated data. The use
of technical controls can help to prevent occurrences of viruses
and related threats by deterring them or making it more difficult
for them to gain access to systems and data. Examples of
technical controls include user authentication mechanisms such as
passwords, mechanisms which provide selective levels of access to
files and directories (read-only, no access, access to certain
users, etc.), and write-protection mechanisms on tapes and
diskettes.
The different types of technical controls and the degree to which
they can provide protection and deterrence varies from system to
system, thus the use of specific types of controls is discussed
in Chapters 4 and 5. However, the following general points are
important to note:
o technical controls should be used as available to
restrict system access to authorized users only
o in the multi-user environment, technical controls should
be used to limit users' privileges to the minimum
practical level; they should work automatically and need
not be initiated by users
o users and system managers must be educated as to how and
when to use technical controls
o where technical controls are weak or non-existent (i.e.,
personal computers), they should be supplemented with
3-6
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 3
alternative physical controls or add-on control
mechanisms
Managers need to determine which technical controls are available
on their systems, and then the degree to which they should be
used and whether additional add-on controls are necessary. One
way to answer these questions is to first categorize the
different classes of data being processed by a system or systems,
and then to rank the categories according to criteria such as
sensitivity to the organization and vulnerability of the system
to attack. The rankings should then help determine the degree to
which the controls should be applied and whether additional
controls are necessary. Ideally, those systems with the most
effective controls should be used to process the most sensitive
data, and vice-versa. As an example, a personal computer which
processes sensitive employee information should require add-on
user authentication mechanisms, whereas a personal computer used
for general word processing may not need additional controls.
It is important to note that technical controls do not generally
provide complete protection against viruses and related threats.
They may be cracked by determined users who are knowledgeable of
hidden bugs and weaknesses, and they may be surmounted through
the use of Trojan horse programs, as shown by examples in Chapter
2. An inherent weakness in technical controls is that, while
deterring users and software from objects to which they do not
have access, they may be totally ineffective against attacks
which target objects that are accessible. For example, technical
controls may not prevent an authorized user from destroying files
to which the user has authorized access. Most importantly, when
technical controls are not used properly, they may increase a
system's degree of vulnerability. It is generally agreed that
fully effective technical controls will not be widely available
for some time. Because of the immediate nature of the computer
virus threat, technical controls must be supplemented by less
technically-oriented control measures such as described in this
chapter.
3-7
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 3
3.4 General Monitoring
An important aspect of computer viruses and related threats is
that they potentially can cause extensive damage within a very
small amount of time, such as minutes or seconds. Through proper
monitoring of software, system activity, and in some cases user
activity, managers can increase their chances that they will
detect early signs of malicious software and unauthorized
activity. Once the presence is noted or suspected, managers can
then use contingency procedures to contain the activity and
recover from whatever damage has been caused. An additional
benefit of general monitoring is that over time, it can aid in
determining the necessary level or degree of security by
indicating whether security policies, procedures, and controls
are working as planned.
Monitoring is a combination of continual system and system
management activity. Its effectiveness depends on cooperation
between management and users. The following items are necessary
for effective monitoring:
o user education - users must know, specific to their
computing environment, what constitutes normal and
abnormal system activity and whom to contact for further
information - this is especially important for users of
personal computers, which generally lack automated
methods for monitoring
o automated system monitoring tools - generally on multi-
user systems, to automate logging or accounting of user
and software accesses to accounts, files, and other
system objects - can sometimes be tuned to record only
certain types of accesses such as "illegal" accesses
o anti-viral software - generally on personal computers,
these tools alert users of certain types of system access
that are indicative of "typical" malicious software
o system-sweep programs - programs to automatically check
files for changes in size, date, or content
3-8
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 3
o network monitoring tools - as with system monitoring
tools, to record network accesses or attempts to access
The statistics gained from monitoring activities should be used
as input for periodic reviews of security programs. The reviews
should evaluate the effectiveness of general system management,
and associated security policies, procedures, and controls. The
statistics will indicate the need for changes and will help to
fine tune the program so that security is distributed to where it
is most necessary. The reviews should also incorporate users'
suggestions, and to ensure that the program is not overly
restrictive, their criticisms.
3.5 Contingency Planning
The purpose of contingency planning with regard to computer
viruses and related threats is to be able to contain and recover
completely from actual attacks. In many ways, effective system
management that includes user education, use of technical
controls, software management, and monitoring activities, is a
form of contingency planning, generally because a well-run,
organized system or facility is better able to withstand the
disruption that could result from a computer virus attack. In
addition to effective system management activities, managers need
to consider other contingency procedures that specifically take
into account the nature of computer viruses and related threats.
Possibly the most important contingency planning activity
involves the use of backups. The ability to recover from a virus
attack depends upon maintaining regular, frequent backups of all
system data. Each backup should be checked to ensure that the
backup media has not been corrupted. Backup media could easily
be corrupted because of defects, because the backup procedure was
incorrect, or perhaps because the backup software itself has been
attacked and modified to corrupt backups as they are made.
Contingency procedures for restoring from backups after a virus
attack are equally important. Backups may contain copies of
3-9
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 3
malicious software that have been hiding in the system.
Restoring the malicious software to a system that has been
attacked could cause a recurrence of the problem. To avoid this
possibility, software should be restored only from its original
media: the tapes or diskettes from the vendor. In some cases,
this may involve reconfiguring the software, therefore managers
must maintain copies of configuration information for system and
application software. Because data is not directly executable,
it can be restored from routine backups. However, data that has
been damaged may need to be restored manually or from older
backups. Command files such as batch procedures and files
executed when systems boot or when user log on should be
inspected to ensure that they have not been damaged or modified.
Thus, managers will need to retain successive versions of
backups, and search through them when restoring damaged data and
command files.
Other contingency procedures for containing virus attacks need to
be developed. The following are suggested; they are discussed in
more detail in Chapters 4 and 5:
o ensure that accurate records are kept of each system's
configuration, including the system's location, the
software it runs, the system's network and modem
connections, and the name of the system's manager or
responsible individual
o create a group of skilled users to deal with virus
incidents and ensure that users can quickly contact this
group if they suspect signs of viral activity
o maintain a security distribution list at each site with
appropriate telephone numbers of managers to contact when
problems occur
o isolate critical systems from networks and other sources
of infection
o place outside network connections on systems with the
best protections, use central gateways to facilitate
rapid disconnects
3-10
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 4
4. Virus Prevention for Multi-User Computers
and Associated Networks
Virus prevention in the multi-user computer environment is aided
by the centralized system and user management, and the relative
richness of technical controls. Unlike personal computers, many
multi-user systems possess basic controls for user
authentication, for levels of access to files and directories,
and for protected regions of memory. By themselves, these
controls are not adequate, but combined with other policies and
procedures that specifically target viruses and related threats,
multi-user systems can greatly reduce their vulnerabilities to
exploitation and attack.
However, some relatively powerful multi-user machines are now so
compact as to be able to be located in an office or on a desk-
top. These machines are still fully able to support a small user
population, to connect to major networks, and to perform complex
real-time operations. But due to their size and increased ease
of operation, they are more vulnerable to unauthorized access.
Also, multi-user machines are sometimes managed by untrained
personnel who do not have adequate time to devote to proper
system management and who may not possess a technical background
or understanding of the system's operation. Thus, it is
especially important for organizations who use or are considering
machines of this nature to pay particular attention to the risks
of attack by unauthorized users, viruses, and related software.
The following sections offer guidance and recommendations for
improving the management and reducing the risk of attack for
multi-user computers and associated networks.
4.1 General Policies
Two general policies are suggested here. They are intended for
uniform adoption throughout an organization, i.e., they will not
4-1
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 4
be entirely effective if they are not uniformly followed. These
policies are as follows:
o An organization must assign a dedicated system manager to
operate each multi-user computer. The manager should be
trained, if necessary, to operate the system in a
practical and secure manner. This individual should be
assigned the management duties as part of his job
description; the management duties should not be assigned
"on top" of the individual's other duties, but rather
adequate time should be taken from other duties. System
management is a demanding and time-consuming operation
that can unexpectedly require complete dedication. As
systems are increasingly inter-connected via networks, a
poorly managed system that can be used as a pathway for
unauthorized access to other systems will present a
significant vulnerability to an organization. Thus, the
job of system manager should be assigned carefully, and
adequate time be given so that the job can be performed
completely.
o Management needs to impress upon users the need for their
involvement and cooperation in computer security. A
method for doing this is to create an organizational
security policy. This policy should be a superset of all
other computer-related policy, and should serve to
clearly define what is expected of the user. It should
detail how systems are to be used and what sorts of
computing are permitted and not permitted. Users should
read this policy and agree to it as a prerequisite to
computer use. It would also be helpful to use this
policy to create other policies specific to each multi-
user system.
4.2 Software Management
Effective software management can help to make a system less
vulnerable to attack and can make containment and recovery more
successful. Carefully controlled access to software will prevent
or discourage unauthorized access. If accurate records and
backups are maintained, software restoral can be accomplished
with a minimum of lost time and data. A policy of testing all
new software, especially public-domain software, will help
4-2
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 4
prevent accidental infection of a system by viruses and related
software. Thus, the following policies and procedures are
recommended:
o Use only licensed copies of vendor software, or software
that can be verified to be free of harmful code or other
destructive aspects. Maintain complete information about
the software, such as the vendor address and telephone
number, the license number and version, and update
information. Store the software in a secure, tamper-
proof location.
o Maintain configuration reports of all installed software,
including the operating system. This information will be
necessary if the software must be re-installed later.
o Prevent user access to system software and data. Ensure
that such software is fully protected, and that
appropriate monitoring is done to detect attempts at
unauthorized access.
o Prohibit users from installing software. Users should
first contact the system manager regarding new software.
The software should then be tested on an isolated system
to determine whether the software may contain destructive
elements. The isolated system should be set up so that,
to a practical degree, it replicates the target system,
but does not connect to networks or process sensitive
data. A highly-skilled user knowledgeable about viruses
and related threats should perform the testing and ensure
that the software does not change or delete other
software or data. Do not allow users to directly add any
software to the system, whether from public software
repositories, or other systems, or their home systems.
o Teach users to protect their data from unauthorized
access. Ensure that they know how to use access controls
or file protection mechanisms to prevent others from
reading or modifying their files. As possible, set
default file protections such that when a user creates a
file, the file can be accessed only by that user, and no
others. Each user should not permit others to use his or
her account.
o Do not set-up directories to serve as software
repositories unless technical controls are used to
4-3
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 4
prevent users from writing to the directory. Make sure
that users contact the system manager regarding software
they wish to place in a software repository. It would be
helpful to track where the software is installed by
setting up a process whereby users must first register
their names before they can copy software from the
directory.
o If developing software, control the update process so
that the software is not modified without authorization.
Use a software management and control application to
control access to the software and to automate the
logging of modifications.
o Accept system and application bug fixes or patches only
from highly reliable sources, such as the software
vendor. Do not accept patches from anonymous sources,
such as received via a network. Test the new software on
an isolated system to ensure that the software does not
make an existing problem worse.
4.3 Technical Controls
Many multi-user computers contain basic built-in technical
controls. These include user authentication via passwords,
levels of user privilege, and file access controls. By using
these basic controls effectively, managers can significantly
reduce the risk of attack by preventing or deterring viruses and
related threats from accessing a system.
Perhaps the most important technical control is user
authentication, with the most widely form of user authentication
being a username associated with a password. Every user account
should use a password that is deliberately chosen so that simple
attempts at password cracking cannot occur. An effective
password should not consist of a person's name or a recognizable
word, but rather should consist of alphanumeric characters and/or
strings of words that cannot easily be guessed. The passwords
should be changed at regular intervals, such as every three to
six months. Some systems include or can be modified to include a
password history, to prevent users from reusing old passwords.
4-4
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 4
For more information on effective password practices, see
[FIPS73].
The username/password mechanism can sometimes be modified to
reduce opportunities for password cracking. One method is to
increase the running time of the password encryption to several
seconds. Another method is to cause the user login program to
accept from three to five incorrect password attempts in a row
before disabling the user account for several minutes. Both
methods significantly increase the amount of time a password
cracker would spend when making repeated attempts at guessing a
password. A method for ensuring that passwords are difficult to
crack involves the use of a program that could systematically
guess passwords, and then send warning messages to the system
manager and corresponding users if successful. The program could
attempt passwords that are permutations of each user's name, as
well as using words from an on-line dictionary.
Besides user authentication, access control mechanisms are
perhaps the next most important technical control. Access
control mechanisms permit a system manager to selectively permit
or bar user access to system resources regardless of the user's
level of privilege. For example, a user at a low-level of system
privilege can be granted access to a resource at a higher level
of privilege without raising the user's privilege through the use
of an access control that specifically grants that user access.
Usually, the access control can determine the type of access,
e.g., read or write. Some access controls can send alarm
messages to audit logs or the system manager when unsuccessful
attempts are made to access resources protected by an access
control.
Systems which do not use access controls usually contain another
more basic form that grants access based on user categories.
Usually, there are four: owner, where only the user who "owns" or
creates the resource can access it; group, where anyone in the
same group as the owner can access the resource; world, where all
users can access the resource, and system, which supersedes all
other user privileges. Usually, a file or directory can be set
4-5
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 4
up to allow any combination of the four. Unlike access controls,
this scheme doesn't permit access to resources on a specific user
basis, thus if a user at a low level of privilege requires access
to a system level resource, the user must be granted system
privilege. However, if used carefully, this scheme can
adequately protect users' files from being accessed without
authorization. The most effective mode is to create a unique
group for each user. Some systems may permit a default file
permission mask to be set so that every file created would be
accessible only by the file's owner.
Other technical control guidelines are as follows:
o Do not use the same password on several systems.
Additionally, sets of computers that are mutually
trusting in the sense that login to one constitutes login
to all should be carefully controlled.
o Disable or remove old or unnecessary user accounts.
Whenever users leave an organization or no longer use a
system, change all passwords that the users had knowledge
of.
o Practice a "least privilege" policy, whereby users are
restricted to accessing resources on a need-to-know basis
only. User privileges should be as restricting as
possible without adversely affecting the performance of
their work. To determine what level of access is
required, err first by setting privileges to their most
restrictive, and upgrade them as necessary. If the
system uses access controls, attempt to maintain a user's
system privileges at a low level while using the access
controls to specifically grant access to the required
resources.
o Users are generally able to determine other users' access
to their files and directories, thus instruct users to
carefully maintain their files and directories such that
they are not accessible, or at a minimum, not writable,
by other users. As possible, set default file
protections such that files and directories created by
each user are accessible by only that user.
4-6
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 4
o When using modems, do not provide more access to the
system than is necessary. For example, if only dial-out
service is required, set up the modem or telephone line
so that dial-in service is not possible. If dial-in
service is necessary, use modems that require an
additional passwords or modems that use a call-back
mechanism. These modems may work such that a caller must
first identify himself to the system. If the
identification has been pre-recorded with the system and
therefore valid, the system then calls back at a pre-
recorded telephone number.
o If file encryption mechanisms are available, make them
accessible to users. Users may wish to use encryption as
a further means of protecting the confidentiality of
their files, especially if the system is accessible via
networks or modems.
o Include software so that users can temporarily "lock"
their terminals from accepting keystrokes while they are
away. Use software that automatically disables a user's
account if no activity occurs after a certain interval,
such as 10 - 15 minutes.
4.4 Monitoring
Many multi-user systems provide a mechanism for automatically
recording some aspects of user and system activity. This
monitoring mechanism, if used regularly, can help to detect
evidence of viruses and related threats. Early detection is of
great value, because malicious software potentially can cause
significant damage within a matter of minutes. Once evidence of
an attack has been verified, managers can use contingency
procedures to contain and recover from any resultant damage.
Effective monitoring also requires user involvement, and
therefore, user education. Users must have some guidelines for
what constitutes normal and abnormal system activity. They need
to be aware of such items as whether files have been changed in
content, date, or by access permissions, whether disk space has
become suddenly full, and whether abnormal error messages occur.
4-7
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 4
They need to know whom to contact to report signs of trouble and
then the steps to take to contain any damage.
The following policies and procedures for effective monitoring
are recommended:
o Use the system monitoring/auditing tools that are
available. Follow the procedures recommended by the
system vendor, or start out by enabling the full level or
most detailed level of monitoring. Use tools as
available to help read the logs, and determine what level
of monitoring is adequate, and cut back on the level of
detail as necessary. Be on the guard for excessive
attempts to access accounts or other resources that are
protected. Examine the log regularly, at least weekly if
not more often.
o As a further aid to monitoring, use alarm mechanisms
found in some access controls. These mechanisms send a
message to the audit log whenever an attempt is made to
access a resource protected by an access control.
o If no system monitoring is available, or if the present
mechanism is unwieldy or not sufficient, investigate and
purchase other monitoring tools as available. Some
third-party software companies sell monitoring tools for
major operating systems with capabilities that supersede
those of the vendor's.
o Educate users so that they understand the normal
operating aspects of the system. Ensure that they have
quick access to an individual or group who can answer
their questions and investigate potential virus
incidents.
o Purchase or build system sweep programs to checksum files
at night, and report differences from previous runs. Use
a password checker to monitor whether passwords are being
used effectively.
o Always report, log, and investigate security problems,
even when the problems appear insignificant. Use the log
as input into regular security reviews. Use the reviews
as a means for evaluating the effectiveness of security
policies and procedures.
4-8
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 4
o Enforce some form of sanctions against users who
consistently violate or attempt to violate security
policies and procedures. Use the audit logs as evidence,
and bar the users from system use.
4.5 Contingency Planning
As stressed in Chapter 3, backups are the most important
contingency planning activity. A system manager must plan for
the eventuality of having to restore all software and data from
backup tapes for any number of reasons, such as disk drive
failure or upgrades. It has been shown that viruses and related
threats could potentially and unexpectedly destroy all system
information or render it useless, thus managers should pay
particular attention to the effectiveness of their backup
policies. Backup policies will vary from system to system,
however they should be performed daily, with a minimum of several
months backup history. Backup tapes should be verified to be
accurate, and should be stored off-site in a secured location.
Viruses and related software threats could go undetected in a
system for months to years, and thus could be backed up along
with normal system data. If such a program would suddenly
trigger and cause damage, it may require much searching through
old backups to determine when the program first appeared or was
infected. Therefore the safest policy is to restore programs,
i.e., executable and command files, from their original vendor
media only. Only system data that is non-executable should be
restored from regular backups. Of course, in the case of command
files or batch procedures that are developed or modified in the
course of daily system activity, these may need to be inspected
manually to ensure that they have not been modified or damaged.
Other recommended contingency planning activities are as follows:
o Create a security distribution list for hand-out to each
user. The list should include the system manager's name
and number, and other similar information for individuals
4-9
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 4
who can answer users' questions about suspicious or
unusual system activity. The list should indicate when
to contact these individuals, and where to reach them in
emergencies.
o Coordinate with other system managers, especially if
their computers are connected to the same network.
Ensure that all can be contacted quickly in the event of
a network emergency by using some mechanism other than
the network.
o Besides observing physical security for the system as
well as its software and backup media, locate terminals
in offices that can be locked or in other secure areas.
o If users are accessing the system via personal computers
and terminal emulation software, keep a record of where
the personal computers are located and their network or
port address for monitoring purposes. Control carefully
whether such users are uploading software to the system.
o Exercise caution when accepting system patches. Do not
accept patches that arrive over a network unless there is
a high degree of certainty as to their validity. It is
best to accept patches only from the appropriate software
vendor.
4.6 Associated Network Concerns
Multi-user computers are more often associated with relatively
large networks than very localized local area networks or
personal computer networks that may use dedicated network
servers. The viewpoint taken here is that wide area network and
large local area network security is essentially a collective
function of the systems connected to the network, i.e., it is not
practical for a controlling system to monitor all network traffic
and differentiate between authorized and unauthorized use. A
system manager should generally assume that network connections
pose inherent risks of unauthorized access to the system in the
forms of unauthorized users and malicious software. Thus, a
system manager needs to protect the system from network-borne
threats and likewise exercise responsibility by ensuring that his
4-10
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 4
system is not a source of such threats, while at the same time
making network connections available to users as necessary. The
accomplishment of these aims will require the use of technical
controls to restrict certain types of access, monitoring to
detect violations, and a certain amount of trust that users will
use the controls and follow the policies.
Some guidelines for using networks in a more secure manner are as
follows:
o Assume that network connections elevate the risk of
unauthorized access. Place network connections on system
which provide adequate controls, such as strong user
authentication and access control mechanisms. Avoid
placing network connections on system which process
sensitive data.
o If the system permits, require an additional password or
form of authentication for accounts accessed from network
ports. If possible, do not permit access to system
manager accounts from network ports.
o If anonymous or guest accounts are used, place
restrictions on the types of commands that can be
executed from the account. Don't permit access to
software tools, commands that can increase privileges,
and so forth.
o As possible, monitor usage of the network. Check if
network connections are made at odd hours, such as during
the night, or if repeated attempts are made to log in to
the system from a network port.
o When more than one computer is connected to the same
network, arrange the connections so that one machine
serves as a central gateway for the other machines. This
will allow a rapid disconnect from the network in case of
an attack.
o Ensure that users are fully educated in network usage.
Make them aware of the additional risks involved in
network access. Instruct them to be on the alert for any
signs of tampering, and to contact an appropriate person
if they detect any suspicious activity. Create a policy
for responsible network usage that details what sort of
4-11
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 4
computing activity will and will not be tolerated. Have
users read the policy as a prerequisite to network use.
o Warn users to be suspicious of any messages that are
received from unidentified or unknown sources.
o Don't advertise a system to network users by printing
more information than necessary on a welcome banner. For
example, don't include messages such as "Welcome to the
Payroll Accounting System" that may cause the system to
be more attractive to unauthorized users.
o Don't network to outside organizations without a mutual
review of security practices
4-12
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 5
5. Virus Prevention for Personal Computers
and Associated Networks
Virus prevention in the personal computer environment differs
from that of the multi-user computer environment mainly in the
following two respects: the relative lack of technical controls,
and the resultant emphasis this places on less-technically
oriented means of protection which necessitates more reliance on
user involvement. Personal computers typically do not provide
technical controls for such things as user authorization, access
controls, or memory protection that differentiates between system
memory and memory used by user applications. Because of the lack
of controls and the resultant freedom with which users can share
and modify software, personal computers are more prone to attack
by viruses, unauthorized users, and related threats.
Virus prevention in the personal computer environment must rely
on continual user awareness to adequately detect potential
threats and then to contain and recover from the damage.
Personal computer users are in essence personal computer
managers, and must practice their management as a part of their
general computing. Personal computers generally do not contain
auditing features, thus a user needs to be aware at all times of
the computer's performance, i.e., what it is doing, or what is
normal or abnormal activity. Ultimately, personal computer users
need to understand some of the technical aspects of their
computers in order to protect, deter, contain, and recover. Not
all personal computer users are technically oriented, thus this
poses some problems and places even more emphasis on user
education and involvement in virus prevention.
Because of the dependance on user involvement, policies for the
personal computer environment are more difficult to implement
than in the multi-user computer environment. However,
emphasizing these policies as part of a user education program
will help to ingrain them in users' behavior. Users should be
shown via examples what can happen if they don't follow the
policies. An example where users share infected software and
5-1
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 5
then spread the software throughout an organization would serve
to effectively illustrate the point, thus making the purpose of
the policy more clear and more likely to be followed. Another
effective method for increasing user cooperation is to create a
list of effective personal computer management practices specific
to each personal computing environment. Creating such a list
would save users the problem of determining how best to enact the
policies, and would serve as a convenient checklist that users
could reference as necessary.
It will likely be years before personal computers incorporate
strong technical controls in their architectures. In the
meantime, managers and users must be actively involved in
protecting their computers from viruses and related threats. The
following sections provide guidance to help achieve that aim.
5.1 General Policies
Two general policies are suggested here. The first requires that
management make firm, unambiguous decisions as to how users
should operate personal computers, and state that policy in
writing. This policy will be a general re-statement of all other
policies affecting personal computer use. It is important that
users read this policy and agree to its conditions as a
prerequisite to personal computer use. The purposes of the
policy are to (1) ensure that users are aware of all policies,
and (2) impress upon users the need for their active involvement
in computer security.
The second policy is that every personal computer should have an
"owner" or "system manager" who is responsible for the
maintenance and security of the computer, and for following all
policies and procedures associated with the use of the computer.
It would be preferable that the primary user of the computer fill
this role. It would not be too extreme to make this
responsibility a part of the user's job description. This policy
will require that resources be spent on educating users so that
they can adequately follow all policies and procedures.
5-2
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 5
5.2 Software Management
Due to the wide variety of software available for many types of
personal computers, it is especially important that software be
carefully controlled. The following policies are suggested:
o Use only licensed copies of vendor software for personal
computers. Ensure that the license numbers are logged,
that warranty information is completed, and that updates
or update notices will be mailed to the appropriate
users. Ensure that software versions are uniform on all
personal computers. Purchase software from known,
reputable sources - do not purchase software that is
priced suspiciously low and do not use pirated software,
even on a trial basis. As possible, buy software with
built-in security features.
o Do not install software that is not clearly needed. For
example, software tools such as compilers or debuggers
should not be installed on machines where they are not
needed.
o Store the original copies of vendor software in a secure
location for use when restoring the software.
o Develop a clear policy for use of public-domain software
and shareware. It is recommended that the policy
prohibit indiscriminate downloading from software
bulletin boards. A special isolated system should be
configured to perform the downloading, as well as for
testing downloaded and other software or shareware. The
operation of the system should be managed by a
technically skilled user who can use anti-virus software
and other techniques to test new software before it is
released for use by other users.
o Maintain an easily-updated database of installed
software. For each type of software, the database should
list the computers where the software is installed, the
license numbers, software version number, the vendor
contact information, and the responsible person for each
computer listed. This database should be used to quickly
identify users, machines, and software when problems or
5-3
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 5
emergencies arise, such as when a particular type of
software is discovered to contain a virus or other
harmful aspects.
o Minimize software sharing within the organization. Do
not permit software to be placed on computers unless the
proper manager is notified and the software database is
updated. If computer networks permit software to be
mailed or otherwise transferred among machines, prohibit
this as a policy. Instruct users not to run software
that has been mailed to them.
o If using software repositories on LAN servers, set up the
server directory such that users can copy from the
directory, but not add software to the directory. Assign
a user to manage the repository; all updates to the
repository should be cleared through this individual.
The software should be tested on an isolated system as
described earlier.
o If developing software, consider the use of software
management and control programs that automate record
keeping for software updates, and that provide a degree
of protection against unauthorized modifications to the
software under development.
o Prohibit users from using software or disks from their
home systems. A home system that is used to access
software bulletin boards or that uses shared copies of
software could be infected with viruses or other
malicious software.
5.3 Technical Controls
As stated earlier, personal computers suffer from a relative lack
of technical controls. There are usually no mechanisms for user
authentication and for preventing users or software from
modifying system and application software. Generally, all
software and hardware is accessible by the personal computer
user, thus the potential for misuse is substantially greater than
in the multi-user computer environment.
5-4
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 5
However, some technical controls can be added to personal
computers, e.g., user authentication devices. The technical
controls that do not exist can be simulated by other controls,
such as a lock on an office door to substitute for a user
authentication device, or anti-virus software to take the place
of system auditing software. Lastly, some of the personal
computer's accessibility can be reduced, such as by the removal
of floppy diskette drives or by the use of diskless computers
that must download their software from a LAN server. The
following items are suggested:
o Where technical controls exist, use them. If basic file
access controls are available to make files read-only,
make sure that operating system files and other
executable files are marked as read-only. Use write-
protect tabs on floppy diskettes and tapes. If LAN
access requires a password, ensure that passwords are
used carefully - follow the guidelines for password
usage presented in Chapter 4 or see [FIPS73].
o Use new cost-effective forms of user identification such
as magnetic access cards. Or, setup other software such
as password mechanism that at a minimum deters
unauthorized users.
o If using a LAN, consider downloading the personal
computer's operating system and other applications from a
read-only directory on the LAN server (instead of the
personal computer's hard disk). If the LAN server is
well protected, this arrangement would significantly
reduce chances of the software becoming infected, and
would simplify software management.
o Consider booting personal computers from write-protected
floppy diskettes (instead of the computer's hard disk).
Use a unique diskette per computer, and keep the diskette
secured when not in use.
o Do not leave a personal computer running but unattended.
Lock the computer with a hardware lock (if possible), or
purchase vendor add-on software to "lock" the keyboard
using a password mechanism. Alternatively, turn off the
computer and lock the office door. Shut down and lock
the computer at the end of the day.
5-5
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 5
o When using modems connected to personal computers, do not
provide more access to the computer than necessary. If
only dial-out service is required, configure the modem so
that it won't answer calls. If dial-in service is
necessary, consider purchasing modems that require a
password or that use a call-back mechanism to force a
caller to call from a telephone number that is known to
the modem.
o Consider using "limited-use" systems, whereby the
capabilities of a system are restricted to only what is
absolutely required. For example, users who run only a
certain application (such as word-processor) may not
require the flexibility of a personal computer. At the
minimum, do not install applications or network
connections where they are not needed.
5.4 Monitoring
Personal computer operating systems typically do not provide any
software or user monitoring/auditing features. Monitoring, then,
is largely a user function whereby the user must be aware of what
the computer is doing, such as when the computer is accessing the
disk or the general speed of its response to commands, and then
must decide whether the activity is normal or abnormal. Anti-
viral software can be added to the operating system and run in
such a way that the software flags or in some way alerts a user
when suspicious activity occurs, such as when critical files or
memory regions are written.
Effective monitoring depends on user education. Users must know
what constitutes normal and abnormal activity on their personal
computers. They need to have a reporting structure available so
that they can alert an informed individual to determine whether
there is indeed a problem. They need to know the steps to take
to contain the damage, and how to recover. Thus, the following
policies and procedures are recommended:
o Form a team of skilled technical people to investigate
problems reported by users. This same group could be
responsible for other aspects of virus prevention, such
5-6
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 5
as testing new software and handling the containment and
recovery from virus-related incidents. Ensure that users
have quick access to this group, e.g., via a telephone
number.
o Educate users so that they are familiar with how their
computers function. Show them how to use such items as
anti-viral software. Acquaint them with how their
computers boot, what files are loaded, whether start-up
batch files are executed, and so forth.
o Users need to watch for changes in patterns of system
activity. They need to watch for program loads that
suddenly take longer, whether disk accesses seem
excessive for simple tasks, do unusual error messages
occur, do access lights for disks turn on when no disk
activity should occur, is less memory available than
usual, do files disappear mysteriously, is there less
disk space than normal?
o Users also need to examine whether important files have
changed in size, date, or content. Such files would
include the operating system, regularly-run applications,
and other batch files. System sweep programs may be
purchased or built to perform checksums on selected
files, and then to report whether changes have occurred
since the last time the program was run.
o Purchase virus prevention software as applicable. At a
minimum, use anti-viral software to test new software
before releasing it to other users. However, do not
download or use pirated copies of anti-viral software.
o Always report, log, and investigate security problems,
even when the problems appear insignificant. Then use
the log as input into regular security reviews. Use the
reviews as a means for evaluating the effectiveness of
security policies and procedures.
5.5 Contingency Planning
As described in Chapter 3, backups are the single most important
contingency procedure. It is especially important to emphasize
regular backups for personal computers, due to their greater
5-7
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 5
susceptibility to misuse and due to the usual requirement of
direct user involvement in the backup procedure, unlike that of
multi-user computers. Because of the second factor, where users
must directly copy files to one or more floppy diskettes,
personal computer backups are sometimes ignored or not done
completely. To help ensure that backups are done regularly,
external backup mechanisms that use a high-density tape cartridge
can be purchased and a user assigned to run the backup procedure
on a regular basis. Additionally, some personal computer
networks contain a personal computer backup feature, where a
computer can directly access a network server's backup mechanism,
sometimes in an off-line mode at a selected time. If neither of
these mechanisms are available, then users must be supplied with
an adequate number of diskettes to make complete backups and to
maintain a reasonable amount of backup history, with a minimum of
several weeks.
Users should maintain the original installation media for
software applications and store it in a secure area, such as a
locked cabinet, container, or desk. If a user needs to restore
software, the user should use only the original media; the user
should not use any other type of backup or a copy belonging to
another user, as they could be infected or damaged by some form
of malicious software.
The effectiveness of a backup policy can be judged by whether a
user is able to recover with a minimum loss of data from a
situation whereby the user would have to format the computer's
disk and reload all software. Several incidents of malicious
software have required that users go to this length to recover -
see [MACAFEE89].
Other important contingency procedures are described below:
o Maintain a database of personal computer information.
Each record should include items such as the computer's
configuration, i.e., network connections, disks, modems,
etc., the computer's location, how it is used, the
software it runs, and the name of the computer's primary
user/manager. Maintain this database to facilitate rapid
5-8
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 5
communication and identification when security problems
arise.
o Create a security distribution list for each user. The
list should include names of people to contact who can
help identify the cause of unusual computer activity, and
other appropriate security personnel to contact when
actual problems arise.
o Create a group of skilled users who can respond to users'
inquiries regarding virus detection. This group should
be able to determine when a computer has been attacked,
and how best to contain and recover from the problem.
o Set up some means of distributing information rapidly to
all affected users in the event of an emergency. This
should not rely upon a computer network, as the network
could actually be attacked, but could use other means
such as telephone mail or a general announcement
mechanism.
o Observe physical security for personal computers. Locate
them in offices that can be locked. Do not store
software and backups in unsecured cabinets.
5.6 Associated Network Concerns
Personal computer networks offer many advantages to users,
however they must be managed carefully so that they do not
increase vulnerability to viruses and related threats. Used
incorrectly, they can become an additional pathway to
unauthorized access to systems, and can be used to plant
malicious software such as network worms. This section does not
provide specific management guidance, as there are many different
types of personal computer networks with widely varying degrees
of similarity. However, some general suggestions for improving
basic management are listed below:
o Assign a network administrator, and make the required
duties part of the administrator's job description.
Personal computer networks are becoming increasingly
complex to administer, thus the administration should not
5-9
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 5
be left to an individual who cannot dedicate time as
necessary.
o Protect the network server(s) by locating them in secure
areas. Make sure that physical access is restricted
during off-hours. If possible, lock or remove a server's
keyboard to prevent tampering.
o Do not provide for more than one administrator account,
i.e., do not give other users administrator privileges.
Similar to the problem of multiple system manager
accounts on multi-user systems, this situation makes it
more likely that a password will become known, and makes
overall management more difficult to control. Users
should coordinate their requests through a single network
administrator.
o Do not permit users to connect personal computers to the
network cable without permission. The administrator
should keep an updated diagram of the network's topology,
complete with corresponding network addresses and users.
o Use the network monitoring tools that are available.
Track network usage and access to resources, and pinpoint
unauthorized access attempts. Take appropriate action
when violations consistently occur, such as requiring the
user in question to attend a network user class or
disabling the user's network account.
o Ensure that users know how to properly use the network.
Show them how to use all security features. Ensure that
users know how to use passwords and access controls
effectively - see [FIPS73] for information on password
usage. Show them the difference between normal and
abnormal network activity or response. Encourage users
to contact the administrator if they detect unusual
activity. Log and investigate all problems.
o Do not give users more access to network resources than
they require. If using shared directories, make them
read-only if write permission is not required, or use a
password. Encourage users to do the same with their
shared directories.
o Do not set up directories for software repository unless
(1) someone can first verify whether the software is not
5-10
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 5
infected, and (2) users are not permitted to write to the
directory without prior approval.
o Backup the network server(s) regularly. If possible or
practical, backup personal computers using the network
server backup mechanism.
o Disable the network mail facility from transferring
executable files, if possible. This will prevent
software from being indiscriminately shared, and may
prevent network worm programs from accessing personal
computers.
o For network guest or anonymous accounts, limit the types
of commands that can be executed.
o Warn network users to be suspicious of any messages or
programs that are received from unidentified sources -
network users should have a critical and suspicious
attitude towards anything received from an unknown
source.
o Always remove old accounts or change passwords. Change
important passwords immediately when users leave the
organization or no longer require access to the network.
5-11
COMPUTER VIRUSES AND RELATED THREATS
CHAPTER 5
5-12
COMPUTER VIRUSES AND RELATED THREATS
APPENDIX A
References
BUNZEL88 Bunzel, Rick; Flu Season; Connect, Summer 1988.
DENNING88 Denning, Peter J.; Computer Viruses; American
Scientist, Vol 76, May-June, 1988.
DENNING89 Denning, Peter J.; The Internet Worm; American
Scientist, Vol 77, March-April, 1989.
FIPS73 Federal Information Processing Standards
Publication 73, Guidelines for Security of
Computer Applications; National Bureau of
Standards, June, 1980.
FIPS112 Federal Information Processing Standards
Publication 112, Password Usage; National Bureau
of Standards, May, 1985.
MACAFEE89 McAfee, John; The Virus Cure; Datamation, Feb 15,
1989.
NBS120 NBS Special Publication 500-120; Security of
Personal Computer Systems: A Management Guide;
National Bureau of Standards, Jan 1985.
SPAFFORD88 Spafford, Eugene H.; The Internet Worm Program: An
Analysis; Purdue Technical Report CSD-TR-823, Nov
28, 1988.
THOMPSON84 Thompson, Ken; Reflections on Trusting Trust
(Deliberate Software Bugs); Communications of the
ACM, Vol 27, Aug 1984.
A-1
COMPUTER VIRUSES AND RELATED THREATS
APPENDIX A
A-2
COMPUTER VIRUSES AND RELATED THREATS
APPENDIX B
Suggested Reading
In addition to the references listed in Appendix A, the following
documents are suggested reading for specific and general
information on computer viruses and related forms, and other
related security information.
Brenner, Aaron; LAN Security; LAN Magazine, Aug 1989.
Cohen, Fred; Computer Viruses, Theory and Experiments; 7th
Security Conference, DOD/NBS Sept 1984.
Computer Viruses - Proceedings of an Invitational Symposium, Oct
10/11, 1988;
Deloitte, Haskins, and Sells; 1989
Dvorak, John; Virus Wars: A Serious Warning; PC Magazine; Feb 29,
1988.
Federal Information Processing Standards Publication 83,
Guideline on User Authentication Techniques for Computer Network
Access Control; National Bureau of Standards, Sept, 1980.
Federal Information Processing Standards Publication 87,
Guidelines for ADP Contingency Planning; National Bureau of
Standards, March, 1981.
Fiedler, David and Hunter, Bruce M.; Unix System Administration;
Hayden Books, 1987
Fitzgerald, Jerry; Business Data Communications: Basic Concepts,
Security, and Design; John Wiley and Sons, Inc., 1984
Gasser, Morrie; Building a Secure Computer System; Van Nostrand
Reinhold, New York, 1988.
B-1
COMPUTER VIRUSES AND RELATED THREATS
APPENDIX B
Grampp, F. T. and Morris, R. H.; UNIX Operating System Security;
AT&T Bell Laboratories Technical Journal, Oct 1984.
Highland, Harold J.; From the Editor -- Computer Viruses;
Computers & Security; Aug 1987.
Longley, Dennis and Shain, Michael; Data and Computer Security
NBS Special Publication 500-120; Security of Personal Computer
Systems: A Management Guide; National Bureau of Standards, Jan
1985.
Parker, T.; Public domain software review: Trojans revisited,
CROBOTS, and ATC; Computer Language; April 1987.
Schnaidt, Patricia; Fasten Your Safety Belt; LAN Magazine, Oct
1987.
Shoch, J. F. and Hupp, J. A.; The Worm Programs: Early Experience
with a Distributed Computation; Comm of ACM, Mar 1982.
White, Stephen and Chess, David; Coping with Computer Viruses and
Related Problems; IBM Research Report RC 14405 (#64367), Jan
1989.
Witten, I. H.; Computer (In)security: infiltrating open systems;
Abacus (USA) Summer 1987.
B-2
-------------END OF FORWARDED MESSAGE(S)-------------
Comment: I got the above from one of the authors, John P. Wack. He has
okayed my idea of making it available from the NIC. Action: SCC