home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
network
/
nia24
< prev
next >
Wrap
Text File
|
1992-09-26
|
22KB
|
433 lines
ZDDDDDDDDDDDDDDDDDD? IMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM; ZDDDDDDDDDDDDDDDDDD?
3 Founded By: 3 : Network Information Access : 3 Mother Earth BBS 3
3 Guardian Of Time 3D: 17APR90 :D3 NUP:> DECnet 3
3 Judge Dredd 3 : Judge Dredd : 3Text File Archives3
@DDDDDDDDBDDDDDDDDDY : File 24 : @DDDDDDDDDBDDDDDDDDY
3 HMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM< 3
3 IMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM; 3
@DDDDDDDDDDD6 Computer Viruses & Threats II GDDDDDDDDDDDY
HMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM<
$_Virus Prevention in General
To provide general protection from attacks by computer viruses,
unauthorized users, and related threats, users and managers need
to eliminate or reduce vulnerabilities. A general summary of the
vulnerabilities that computer viruses and related threats are
most likely to exploit is as follows:
- lack of user awareness - users copy and share infected
software, fail to detect signs of virus activity, do not
understand proper security techniques
- absence of or inadequate security controls - personal
computers generally lack software and hardware security
mechanisms that help to prevent and detect unauthorized
use, existing controls on multi-user systems can
sometimes be surmounted by knowledgeable users
- ineffective use of existing security controls - using
easily guessed passwords, failing to use access controls,
granting users more access to resources than necessary
- bugs and loopholes in system software - enabling
knowledgeable users to break into systems or exceed their
authorized privileges
- unauthorized use - unauthorized users can break in to
systems, authorized users can exceed levels of privilege
and misuse systems
- susceptibility of networks to misuse - networks can
provide anonymous access to systems, many are in general
only as secure as the systems which use them
As can be seen from this summary, virus prevention requires that
many diverse vulnerabilities be addressed. Some of the
vulnerabilities can be improved upon significantly, such as
security controls that can be added or improved, while others are
somewhat inherent in computing, such as the risk that users will
not use security controls or follow policies, or the risk of
unauthorized use of computers and networks. Thus, it may not be
possible to completely protect systems from all virus-like
attacks. However, to attain a realistic degree of protection,
all areas of vulnerability must be addressed; improving upon some
areas at the expense of others will still leave significant holes
in security.
To adequately address all areas of vulnerability, the active
involvement of individual users, the management structure, and
the organization in a virus prevention program is essential.
Such a program, whether formal or informal, depends on the mutual
cooperation of the three groups to identify vulnerabilities, to
take steps to correct them, and to monitor the results.
A virus prevention program must be initially based upon effective
system computer administration that restricts access to
authorized users, ensures that hardware and software are
regularly monitored and maintained, makes backups regularly, and
maintains contingency procedures for potential problems. Sites
that do not maintain a basic computer administration program need
to put one into place, regardless of their size or the types of
computers used. Many system vendors supply system administration
manuals that describe the aspects of a basic program.
Once a basic administration program is in place, management and
users need to incorporate virus prevention measures that will
help to deter attacks by viruses and related threats, detect when
they occur, contain the attacks to limit damage, and recover in a
reasonable amount of time without loss of data. To accomplish
these aims, attention needs to be focused on the following areas:
- educating users about malicious software in general, the
risks that it poses, how to use control measures,
policies, and procedures to protect themselves and the
organization
- software management policies and procedures that address
public-domain software, and the use and maintenance of
software in general
- use of technical controls that help to prevent and deter
attacks by malicious software and unauthorized users
- monitoring of user and software activity to detect signs
of attacks, to detect policy violations, and to monitor
the overall effectiveness of policies, procedures, and
controls
- contingency policies and procedures for containing and
recovering from attacks
General guidance in each of these areas is explained in the
following sections.
$_Education
Education is one of the primary methods by which systems and
organizations can achieve greater protection from incidents of
malicious software and unauthorized use. In situations where
technical controls do not provide complete protection (i.e., most
computers), it is ultimately people and their willingness to
adhere to security policies that will determine whether systems
and organizations are protected. By educating users about the
general nature of computer viruses and related threats, an
organization can improve its ability to deter, detect, contain
Users should be educated about the following:
- how malicious software operates, methods by which it is
planted and spread, the vulnerabilities exploited by
malicious software and unauthorized users
- general security policies and procedures and how to use
them
- the policies to follow regarding the backup, storage, and
use of software, especially public-domain software and
shareware
- how to use the technical controls they have at their
disposal to protect themselves
- how to monitor their systems and software to detect signs
of abnormal activity, what to do or whom to contact for
more information
- contingency procedures for containing and recovering from
potential incidents
User education, while perhaps expensive in terms of time and
resources required, is ultimately a cost-effective measure for
protecting against incidents of malicious software and
unauthorized use. Users who are better acquainted with the
destructive potential of malicious software and the methods by
which it can attack systems may in turn be prompted to take
measures to protect themselves. The purpose of security policies
and procedures will be more clear, thus users may be more willing
to actively use them. By educating users how to detect abnormal
system activity and the resultant steps to follow for containing
and recovering from potential incidents, organizations will save
money and time if and when actual incidents occur.
$_Software Management
As shown by examples in File 1, one of the prime methods by
which malicious software is initially copied onto systems is by
unsuspecting users. When users download programs from sources
such as software bulletin boards, or public directories on
systems or network servers, or in general use and share software
that has not been obtained from a reputable source, users are in
danger of spreading malicious software. To prevent users from
potentially spreading malicious software, managers need to
- ensure that users understand the nature of malicious
software, how it is generally spread, and the technical
controls to use to protect themselves
- develop policies for the downloading and use of public-
domain and shareware software
- create some mechanism for validating such software prior
to allowing users to copy and use it
- minimize the exchange of executable software within an
organization as much as possible
- do not create software repositories on LAN servers or in
multi-user system directories unless technical controls
exist to prevent users from freely uploading or
downloading the software
The role of education is important, as users who do not
understand the risks yet who are asked to follow necessarily
restrictive policies may share and copy software anyway. Where
technical controls cannot prevent placing new software onto a
system, users are then primarily responsible for the success or
failure of whatever policies are developed.
A policy that prohibits any copying or use of public-domain
software may be overly restrictive, as some public domain
programs have proved to be useful. A less restrictive policy
would allow some copying, however a user might first require
permission from the appropriate manager. A special system should
be used from which to perform the copy and then to test the
software. This type of system, called an isolated system, should
be configured so that there is no risk of spreading a potentially
malicious program to other areas of an organization. The system
should not be used by other users, should not connect to
networks, and should not contain any valuable data. An isolated
system should also be used to test internally developed software
and updates to vendor software.
Other policies for managing vendor software should be developed.
These policies should control how and where software is
purchased, and should govern where the software is installed and
how it is to be used. The following policies and procedures are
suggested:
- purchase vendor software only from reputable sources
- maintain the software properly and update it as necessary
- don't use pirated software, as it may have been modified
- keep records of where software is installed readily
available for contingency purposes
- ensure that vendors can be contacted quickly if problems
occur
- store the original disks or tapes from the vendor in a
secure location
$_Technical Controls
Technical controls are the mechanisms used to protect the
security and integrity of systems and associated data. The use
of technical controls can help to prevent occurrences of viruses
and related threats by deterring them or making it more difficult
for them to gain access to systems and data. Examples of
technical controls include user authentication mechanisms such as
passwords, mechanisms which provide selective levels of access to
files and directories (read-only, no access, access to certain
users, etc.), and write-protection mechanisms on tapes and
diskettes.
The different types of technical controls and the degree to which
they can provide protection and deterrence varies from system to
system, thus the use of specific types of controls is discussed
in the following files. However, the following general points are
important to note:
- technical controls should be used as available to
restrict system access to authorized users only
- in the multi-user environment, technical controls should
be used to limit users' privileges to the minimum
practical level; they should work automatically and need
not be initiated by users
- users and system managers must be educated as to how and
when to use technical controls
- where technical controls are weak or non-existent (i.e.,
personal computers), they should be supplemented with
alternative physical controls or add-on control
mechanisms
Managers need to determine which technical controls are available
on their systems, and then the degree to which they should be
used and whether additional add-on controls are necessary. One
way to answer these questions is to first categorize the
different classes of data being processed by a system or systems,
and then to rank the categories according to criteria such as
sensitivity to the organization and vulnerability of the system
to attack. The rankings should then help determine the degree to
which the controls should be applied and whether additional
controls are necessary. Ideally, those systems with the most
effective controls should be used to process the most sensitive
data, and vice-versa. As an example, a personal computer which
processes sensitive employee information should require add-on
user authentication mechanisms, whereas a personal computer used
for general word processing may not need additional controls.
It is important to note that technical controls do not generally
provide complete protection against viruses and related threats.
They may be cracked by determined users who are knowledgeable of
hidden bugs and weaknesses, and they may be surmounted through
the use of Trojan horse programs, as shown by examples in File
1. An inherent weakness in technical controls is that, while
deterring users and software from objects to which they do not
have access, they may be totally ineffective against attacks
which target objects that are accessible. For example, technical
controls may not prevent an authorized user from destroying files
to which the user has authorized access. Most importantly, when
technical controls are not used properly, they may increase a
system's degree of vulnerability. It is generally agreed that
fully effective technical controls will not be widely available
for some time. Because of the immediate nature of the computer
virus threat, technical controls must be supplemented by less
technically-oriented control measures such as described in this
chapter.
$_General Monitoring
An important aspect of computer viruses and related threats is
that they potentially can cause extensive damage within a very
small amount of time, such as minutes or seconds. Through proper
monitoring of software, system activity, and in some cases user
activity, managers can increase their chances that they will
detect early signs of malicious software and unauthorized
activity. Once the presence is noted or suspected, managers can
then use contingency procedures to contain the activity and
recover from whatever damage has been caused. An additional
benefit of general monitoring is that over time, it can aid in
determining the necessary level or degree of security by
indicating whether security policies, procedures, and controls
are working as planned.
Monitoring is a combination of continual system and system
management activity. Its effectiveness depends on cooperation
between management and users. The following items are necessary
for effective monitoring:
- user education - users must know, specific to their
computing environment, what constitutes normal and
abnormal system activity and whom to contact for further
information - this is especially important for users of
personal computers, which generally lack automated
methods for monitoring
- automated system monitoring tools - generally on multi-
user systems, to automate logging or accounting of user
and software accesses to accounts, files, and other
system objects - can sometimes be tuned to record only
certain types of accesses such as "illegal" accesses
- anti-viral software - generally on personal computers,
these tools alert users of certain types of system access
that are indicative of "typical" malicious software
- system-sweep programs - programs to automatically check
files for changes in size, date, or content
- network monitoring tools - as with system monitoring
tools, to record network accesses or attempts to access
The statistics gained from monitoring activities should be used
as input for periodic reviews of security programs. The reviews
should evaluate the effectiveness of general system management,
and associated security policies, procedures, and controls. The
statistics will indicate the need for changes and will help to
fine tune the program so that security is distributed to where it
is most necessary. The reviews should also incorporate users'
suggestions, and to ensure that the program is not overly
restrictive, their criticisms.
$_Contingency Planning
The purpose of contingency planning with regard to computer
viruses and related threats is to be able to contain and recover
completely from actual attacks. In many ways, effective system
management that includes user education, use of technical
controls, software management, and monitoring activities, is a
form of contingency planning, generally because a well-run,
organized system or facility is better able to withstand the
disruption that could result from a computer virus attack. In
addition to effective system management activities, managers need
to consider other contingency procedures that specifically take
into account the nature of computer viruses and related threats.
Possibly the most important contingency planning activity
involves the use of backups. The ability to recover from a virus
attack depends upon maintaining regular, frequent backups of all
system data. Each backup should be checked to ensure that the
backup media has not been corrupted. Backup media could easily
be corrupted because of defects, because the backup procedure was
incorrect, or perhaps because the backup software itself has been
attacked and modified to corrupt backups as they are made.
Contingency procedures for restoring from backups after a virus
attack are equally important. Backups may contain copies of
malicious software that have been hiding in the system.
Restoring the malicious software to a system that has been
attacked could cause a recurrence of the problem. To avoid this
possibility, software should be restored only from its original
media: the tapes or diskettes from the vendor. In some cases,
this may involve reconfiguring the software, therefore managers
must maintain copies of configuration information for system and
application software. Because data is not directly executable,
it can be restored from routine backups. However, data that has
been damaged may need to be restored manually or from older
backups. Command files such as batch procedures and files
executed when systems boot or when user log on should be
inspected to ensure that they have not been damaged or modified.
Thus, managers will need to retain successive versions of
backups, and search through them when restoring damaged data and
command files.
Other contingency procedures for containing virus attacks need to
be developed. The following are suggested; they are discussed in
more detail in following files:
- ensure that accurate records are kept of each system's
configuration, including the system's location, the
software it runs, the system's network and modem
connections, and the name of the system's manager or
responsible individual
- create a group of skilled users to deal with virus
incidents and ensure that users can quickly contact this
group if they suspect signs of viral activity
- maintain a security distribution list at each site with
appropriate telephone numbers of managers to contact when
problems occur
- isolate critical systems from networks and other sources
of infection
- place outside network connections on systems with the
best protections, use central gateways to facilitate
rapid disconnects
-JUDGE DREDD/NIA
[OTHER WORLD BBS]
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+