home *** CD-ROM | disk | FTP | other *** search
- ┌──────────────────┐ ╔═══════════════════════════════╗ ┌──────────────────┐
- │ Founded By: │ ║ Network Information Access ║ │ Mother Earth BBS │
- │ Guardian Of Time │─║ 17APR90 ║─│ NUP:> DECnet │
- │ Judge Dredd │ ║ Judge Dredd ║ │Text File Archives│
- └────────┬─────────┘ ║ File 24 ║ └─────────┬────────┘
- │ ╚═══════════════════════════════╝ │
- │ ╔═══════════════════════════════╗ │
- └───────────╢ Computer Viruses & Threats II ╟───────────┘
- ╚═══════════════════════════════╝
-
- $_Virus Prevention in General
-
-
- To provide general protection from attacks by computer viruses,
- unauthorized users, and related threats, users and managers need
- to eliminate or reduce vulnerabilities. A general summary of the
- vulnerabilities that computer viruses and related threats are
- most likely to exploit is as follows:
-
- - lack of user awareness - users copy and share infected
- software, fail to detect signs of virus activity, do not
- understand proper security techniques
-
- - absence of or inadequate security controls - personal
- computers generally lack software and hardware security
- mechanisms that help to prevent and detect unauthorized
- use, existing controls on multi-user systems can
- sometimes be surmounted by knowledgeable users
-
- - ineffective use of existing security controls - using
- easily guessed passwords, failing to use access controls,
- granting users more access to resources than necessary
-
- - bugs and loopholes in system software - enabling
- knowledgeable users to break into systems or exceed their
- authorized privileges
-
- - unauthorized use - unauthorized users can break in to
- systems, authorized users can exceed levels of privilege
- and misuse systems
-
- - susceptibility of networks to misuse - networks can
- provide anonymous access to systems, many are in general
- only as secure as the systems which use them
-
- As can be seen from this summary, virus prevention requires that
- many diverse vulnerabilities be addressed. Some of the
- vulnerabilities can be improved upon significantly, such as
- security controls that can be added or improved, while others are
- somewhat inherent in computing, such as the risk that users will
- not use security controls or follow policies, or the risk of
- unauthorized use of computers and networks. Thus, it may not be
- possible to completely protect systems from all virus-like
- attacks. However, to attain a realistic degree of protection,
- all areas of vulnerability must be addressed; improving upon some
- areas at the expense of others will still leave significant holes
- in security.
-
-
- To adequately address all areas of vulnerability, the active
- involvement of individual users, the management structure, and
- the organization in a virus prevention program is essential.
- Such a program, whether formal or informal, depends on the mutual
- cooperation of the three groups to identify vulnerabilities, to
- take steps to correct them, and to monitor the results.
-
- A virus prevention program must be initially based upon effective
- system computer administration that restricts access to
- authorized users, ensures that hardware and software are
- regularly monitored and maintained, makes backups regularly, and
- maintains contingency procedures for potential problems. Sites
- that do not maintain a basic computer administration program need
- to put one into place, regardless of their size or the types of
- computers used. Many system vendors supply system administration
- manuals that describe the aspects of a basic program.
-
- Once a basic administration program is in place, management and
- users need to incorporate virus prevention measures that will
- help to deter attacks by viruses and related threats, detect when
- they occur, contain the attacks to limit damage, and recover in a
- reasonable amount of time without loss of data. To accomplish
- these aims, attention needs to be focused on the following areas:
-
- - educating users about malicious software in general, the
- risks that it poses, how to use control measures,
- policies, and procedures to protect themselves and the
- organization
-
- - software management policies and procedures that address
- public-domain software, and the use and maintenance of
- software in general
-
- - use of technical controls that help to prevent and deter
- attacks by malicious software and unauthorized users
-
- - monitoring of user and software activity to detect signs
- of attacks, to detect policy violations, and to monitor
- the overall effectiveness of policies, procedures, and
- controls
-
- - contingency policies and procedures for containing and
- recovering from attacks
-
- General guidance in each of these areas is explained in the
- following sections.
-
-
- $_Education
-
-
- Education is one of the primary methods by which systems and
- organizations can achieve greater protection from incidents of
- malicious software and unauthorized use. In situations where
- technical controls do not provide complete protection (i.e., most
- computers), it is ultimately people and their willingness to
- adhere to security policies that will determine whether systems
- and organizations are protected. By educating users about the
- general nature of computer viruses and related threats, an
- organization can improve its ability to deter, detect, contain
-