⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 computer security.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 5 页
字号:
                            COMPUTER SECURITY                            -----------------                      Notes of the presentation to                  The Institution of Production Engineers                            March 21, 1990 by                     E.A.Bedwell, E.D.P. Specialist                     ORTECH International (NRC/IRAP)                 2395 Speakman Dr., Mississauga L5K 1B3                                       (416) 822-4111, Ext. 261The writer wishes to thank the Institution of Production Engineers andit's President for the invitation to make this presentation, and toexpress sincere appreciation to David Stang, Ph.D., Director of Research,National Computer Security Association, for his contribution both to thispaper and to computer security in general.  And I would be very remiss ifI neglected to mention the professional secretarial assistance provided byJane  Templeman, who makes our whole team tick like the NRC official timeclock - the one that gives the CBC time signal.This document is, hopefully, written softly:  after all, it might beeasier to digest if I have to eat my words.  I do not profess to be "theexpert" in the field of computer security; an expert is someone who knowsmore and more about less and less until s/he knows absolutely everythingabout nothing.  I hope never to stop learning, which means (thankfully)I'll never be an expert.               INDEX                                             PAGE               -----                                             ----          1.   Definition/Scope of "COMPUTER SECURITY"            2          2.   Why Should You Be Concerned?                       2          3.   Types of Security Breaches                         3          4.   Reasons for Exposure                               7          5.   General Security Rules (all computer systems)      8          6.   Viruses:                                           9                         6.1  History                             9                         6.2  Effect                             10                         6.3  Why do people do it?               10                         6.4  Symptoms                           10                         6.5  Concerns                           11                         6.6  Known Virus Software (1)           11                         6.7  Quick Guide to Virus Names (1)     12                         6.8  Table of Virus Effects             16                         6.9  Virus Detector/Antidote software   19                         6.10  Trojan Horses                     20          7.   PC Rules of Thumb                                 22          8.   Easy Tricks for PC Security                       23          9.   So You're Infected (Cure)                         24          10.  Summary:  What Can You Do?                        25          11.  Security Policy:  Points for Consideration        26          12.  To run SCAN (included on this diskette)           29(1)  David Stang, Ph.D, "Network Security in the Federal Government,",     January, 1990, p.168-169 (updated by E.A.Bedwell, March, 1990)                                    - 2 -Tonight's topic is "Computer Security," a subject near and dear to myheart after catching fraud a few times, and cracking system security afew times.  The only unfortunate part of this evening is that I haveenough material to cover an intensive 2 or 3 day seminar and I only havesomething over an hour, so in addition to extensive notes from thispresentation, I've put an article on viruses, and a PC virus detectorprogram on diskette for you.1.   SCOPE OF COMPUTER SECURITYComputer security relates to any potential loss of information or yourability to operate, regardless of the source of the problem.  Of course,all the publicity about computer security is going to the virussituation.  I don't want to dissuade anyone from their concerns aboutviruses, because it's definitely a growing problem, and if you get hit,you'll be sorry you ever laid eyes on a computer.  But, current estimatesindicate that viruses represent only 3% of all the computer problems nowoccurring.  Of course, if you're one of the 3%, like CNIB or Barclay'sBank Canada were last fall, you'll feel like you're the only one onearth.  The difference between viruses and other computer security issuesis apparently one of control:  I hope to convince you that you have asmuch control over viruses and as little control over the other 97% ofproblems as to make them equal threats to the safety of your computer.I'm going to get to viruses later, their prevention, detection and cure,but I'd like first like to cover the other major problems that affectcomputer security - the other 97% - and I'd like to start with reasonswhy you should be concerned about security.2.   WHY SHOULD YOU BE CONCERNED?Your data is a valuable asset, just like premises, equipment, rawmaterials and inventory.  Because so much of modern business depends oncomputers - financial systems, engineering design, medical diagnosis,production and safety control - the destructive potential is greaterevery year.  There has been more than one company that's suffered greatlosses, and even gone under because of the loss of things like theiraccounts receivable records:  no one is going to pay you if you don'tsend them a bill, and if they get word of your inability to invoice them,their darned unlikely to volunteer payment - so you're in a financialmess.  The same goes for your design information, production data, theconsequences if safety control systems malfunction, or even the simpleloss of your customer list.Another reason why you should be concerned is, too often, people don'tthink about computer security until it's too late.  There's a saying inmy industry that, "He who laughs last probably made a backup."  Anothersaying is, "Experience is something you don't get until just after youneeded it the most."  Well, if it means the life of your company, or theloss of potentially millions of dollars, or even just the information onyour home computer, it might be wise to get at least some basic knowledgebefore the disaster strikes.                                  - 3 -3.   TYPES OF SECURITY BREACHESNow that the 'why' is out of the way, let's break down the 97% ofproblems.  These are not in a specific order, but just as they came tome.  Nor have I attempted to attach percentages to each type of risk,because very few computer crimes are actually reported, so any figuresthat anyone could estimate would not be realistic:FRAUD/THEFTBy far the biggest problem is fraud or theft.  Some examples of this are:     CHAOS - 1987 - Hamburg  ->  NASA data bank info sold to USSR     Foreign exchange              }    famous because of big $     Electronic Funds Transfer     }    amounts, and because of the     Insider Trading               }    publicity they've received     Most common:  Cookie jar technique - e.g., interest, income tax                   (aka 'Salami' technique - take a little and no one                   will notice)Specific examples I've caught were in Payroll (no crash on < or =),Accounts Payable (dummy companies), Purchasing (failed reasonablenesstest), and Accounts Receivable (failed balance routine).  These were allthefts of money.Another example of theft which is very interesting is the 28-year-oldCanadian who was arrested at UNISYS in Pittsburgh on Dec. 13/89 - what heis alleged to have stolen was NCR's trade secrets - to the tune ofUS$68M, which comes under a different Canadian law from monetary theft.MALICIOUS DAMAGE / VANDALISMThe next major type of computer security breach is the disgruntledemployee syndrome.  Their favourite is the logic bomb or time bomb:  on acertain date or condition after they leave the company, something's goingto happen, such as at the health centre in LA where all prescriptionssuddenly multiplied by 2.  That's really serious, even compared to thelogic bomb that superzaps all your files off the face of the earth,because someone could die.  At least with a superzap, you can recover ifyou've been backing up and have a disaster recovery plan in effect.  Purephysical vandalism occurs more often at educational institutions, but isstill a serious threat.  I wouldn't let me near your machine if I wasangry with you - my vandalism would be difficult to detect (and expensiveto repair).  A simple application of a magnetized screwdriver ......LACK OF SECURITY PLANNING IN SYSTEM DESIGN STAGEOne of the biggest logic bombs that's going to occur is on January 1/2000.Do you know how many computer systems use a 2 digit number for the year? Do you know how much work it's going to be to adapt systems to recognize00 as being greater than 99?  My grandmother was born in 1886, and mostsystems show her birth year as 99.  If she lives to the year 1999, Iwonder if they'll start sending her the baby bonus.  This time bomb is notmalicious damage, it's pure lack of planning at the system design stage.                                   - 4 -(Lack of Security Planning - continued)Things like balance checks and reasonableness tests are not built into thesystem from the beginning, and it's not easy to put them in later.  Usersmust participate at the system design stage, because only they know what'sreasonable and what can be balanced.  Don't expect a computer technicianto know everything there is to know about your job.DISTORTED SENSE OF HUMOURThen there's the practical joker - the one who thinks it's funny to breakinto the system to see what he can change, or create some dumb message toappear on your screen.  That's what happened at IBM when the infamousChristmas tree appeared 2 years ago (1987).  The joke was three-fold  -first it analyzed your electronic mail distribution lists and reproduceditself to send to everyone you normally send messages to - this cloggedthe system up with people reading more messages than normal.  The secondpart was a little more technical - everyone who read the message caused aseparate load of the offending program to take up space in memory, unlikemost systems where two or more people who are doing the same thing aresharing one load of the software.  This clogged memory up so that nothingelse could run.  There was one more part to this:  there were delay timersbuilt into the program so it deliberately ran very slowly.  The result wasthat the largest computer network in the world was shut down for 4 hours. Someone must have had a great need for a power trip.MISTAKENext, there's fumble fingers:  you know, the one who keys the formula inas 600 grams instead of 60 grams, or the estimated production time of 2hours instead of 2 days.  Or the one who almost took me into court whenhe blamed "the computer" for a mistake.  Without going into details aboutthat incident, I can say that going through the grilling by severallawyers in a preliminary investigation was not the high point of mycareer.  What saved the situation (for me and the organization) was audittrailing:  every time a transaction was entered, the system recorded theterminal i.d., the user i.d., the date and the time.  It also saved a copyof the record as it existed prior to the transaction taking place.  A morecommon mistake, though, is to unlatch a diskette door before the lightgoes out.  Few people realize that the FAT (file attributes table) is thelast thing written on a disk, and you can corrupt the FAT by removing thedisk too early."EVERYONE DOES IT" SYNDROMEThen there's everyone's favourite:  copying software.  Believe it or not,in Canada, that falls under the Copyright law, not under theft, but ithas been successfully prosecuted.  Even if you reverse engineer it andmake some minor changes, it will come under the "look and feel" test ofthe Copyright law - if it looks and feels the same as the original, youcan be prosecuted.  Copying software is illegal, and your company as theregistered owner could be held liable if it is detected.                                  - 5 -ILLEGAL ACCESSMany major computer crimes are perpetrated by illegal access:  the 14-year old who broke into NASA from his basement computer room is just oneexample.  There is password software on all larger machines, and it's notdifficult to put it on PCs.  On the larger machines, one of the majorproblems is not changing the standard passwords that are set when themachine is delivered:  the standard user-level password may be USER, thestandard operator password may be OPERATOR, and the standard field repairperson's password may be REPAIR, and so on.  Guess how I've crackedsecurity a couple of times.  In a 1988 article by Dr. Cliff Stoll in"Computers and Security,", he reported that in 10 months of systematictesting on computers attached to the US Defense Data Network (Milnet),access was gained in 13% of the attempts simply by guessing at passwords!There should be some rules applied to passwords:  not less than 7 or 8characters,  must be changed at least every 60 days,  don't use commonthings like names (another way I've broken security), don't share itunder any circumstances and, for heaven's sake, don't post it on thefront of your machine or leave it where someone can find it.  It's yourpersonal PIN - just like the money machine - and the information you'redealing with is worth money.  Some of the most difficult passwords tobreak (take it from me) are "two words reversed" (e.g., boardwall,hornshoe, cuptea), or foreign language words (e.g., coupdegrace,millegrazie, caliente).  Nonsense is good, too:  geebleurql is nice. If you're installing password security on a PC, consider whether youshould have it so tight that there is no recourse to the DOS level or noability to boot from the A: drive.  You'd need really good passwordsoftware (or a good technician on staff) if you have both of thesefacilities - otherwise you can lock yourself out - but it's my preference(especially for the guy who's wiped his root directory twice).PHYSICAL SECURITYFinally, another area that affects computer security or your ability tocarry on computer operations, and one that is often overlooked, is simplephysical security:  keys, thermal shock, vibration, dirt, water, fire,visibility of information, steady power supply, discharge of staticelectricity, magnetic fields, are all relevant to security.  We have oneman in our network who should have (a) cabling bolted to his computer andthe floor, (b) a key to his unit, and (c) dust protectors (as well aspassword access only without recourse to the DOS level).  When it comes to thermal shock, if you work in an area where the heat isreduced on winter weekends, I strongly recommend you leave your unitrunning over the weekend - just lock the keyboard.  If the airconditioning is shut down, turn your unit off, and don't turn it on untilthe temperature is  23C or less.  And please don't leave your machinesitting in the sun, or in front of an open window to attract dust.  Theinternal temperature raises within 20 mins. or so to >30C, and the effectsof thermal shock are such that it can, first, rock memory chips out oftheir sockets, and, worse, misalign the read heads on your disk drive sothat nothing can be read.                                  - 6 -(Physical Security - continued)Vibration, too, is a source of problems, especially for drives.  The readheads actually float over the surface of drives, not on them the way arecord player needle does, and the space tolerance between is measured inAngstroms (metric version of microinches).  Vibration can cause the headto hit the drive, and you can say goodbye to whatever was written there.If you're in a particularly sensitive field, and your information is whatmight be called top secret to your company, you might also want to lookat two protection devices:  one is encryption, and the other is Tempesthardware or shielding.  Encryption involves translating your data usingalgorithms to something unreadable, and de-coding it when you need it.  Ituses a "key" to choose the algorithm - dont' lose the key!  It comes in afew forms:  software controlled encryption, hardware based encryption, ora combination of the two.  Most encryptors work with standard algorithms,but defense departments and other high-security installations preferrandom algorithms.    Tempest hardware, or shielding, protects againstsniffing of signals. ( Signal emanation surveillance is called"sniffing.")  I don't have a computer here to demonstrate this, but ifyou take an old battery-operated transistor radio and set the dial to thebottom of the AM band around 520, try passing it within a foot of yourcomputer.  Your ear might not pick up the individual signals, but I assureyou there's equipment that does.  That's why the US Army was blasting rockmusic around the Vatican Embassy when Noriega was there - to mask signals.More important to the average user, though, is avoidance of electro-magnetic fields (such as ringing phones near a disk or disk drive), andhaving an automatic disk head 'parker' that moves the heads to a safe zoneevery few seconds.  That way, something like a brief power failure is lesslikely to cause a "head crash" on the disk.Simple visibility of information is a risk.  Recently I went to a bankwith a court order in hand to give me access to an account.  The clerksimply turned the terminal toward me and, if I'd wanted to bother, I couldhave had the account numbers of two other people with identical names. There is screen saving software that will blank your screen after aninactivity duration you choose, and personnel should be made consciousthat unauthorized viewing of information is a security risk.  And watchwhat your staff throw out on paper, too.When it comes to fire and water, there are two basic rules that everyonecan follow:  first, don't smoke around the PC, and second, don't feed thePC coffee and donuts.  You might be able to save a keyboard or some partswith a bath in distilled water, possibly followed by drying with a warmhair dryer, but there's no guarantee.  I prefer pure isopropyl alcohol -without the hairdryer so I don't get fried in the process.  Don't blast acomputer with a fire extinguisher if you can avoid it.  If you do have afire or a flood, though, you'd better have a tested disaster recoveryplan, and your backups stored off-site.All of these issues are reasonably within your control:  fraud, theft,disgruntled employees, practical jokers, fumble fingers, software copyingand physical security, at least as much as the infamous viruses that arearound, but let's take a look at why you're at risk.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -