📄 computer security.txt
字号:
- 7 -4. REASONS FOR EXPOSUREConcentration of data in one placeInstantaneous adjustmentAlteration without a traceLack of visible recordsComplexity of the systemNetworkingTechnical persons can befuddleGeneral ignorance by non-techie and managementDetection problemsLack of trainingSecurity checks in programs not specifiedSystems not documentedLimited staff resource for programming/managementNo separation of dutiesPossibility of enormous losses remaining undetectedReluctance to report - Embarrassment Lack of sufficient evidence to prosecute Cost to prosecute outweighs recovery Company policy ("Press would have a field day") - 8 -5. GENERAL SECURITY RULES (All Systems, big and small)Disaster Recovery } Backup Backup Backup Plan } Restore (test it to make sure it works)Store your backup off-site (not in your car!)Physical security Password for access control (don't stick your password on the front of your machine!)Access to menu only - not to system control levelReasonableness testsBalance checks (rounding: up, down, (out?); cross-calculationsAudit trails - all records (terminal i.d., user i.d., date and time stamping, history record retention)Fall-through coding (if it doesn't meet a condition, does it go to limbo)Payroll/Accounts payable: don't pay the same # twiceFault tolerance level supported (user friendly/hostile - balance between fault tolerance & productivity)Call back or no answer on dial-up systemsUPS (Uninterrupted Power Supply, or allowance for graceful degradation) - or at least an automatic head parkerLogical view rights (your user 'privileges' allows access only to the data you need to see, e.g., accounting clerks don't need to see production formulae)Multi-user environment: protection against deadly embraceAutomatic logoff on inactivity timer / Screen saverPolicy statement re purchasing/use/theft/illegal software, etc.Encryption (?) - don't lose the key!Shielding ("Tempest" hardware for secure systems)Educate users - 9 -6. VIRUSESAs in medicine, a virus needs an 'organism' to which it may attach itself,and a virus is 'contagious'. In the case of computers, a virus is usually a destructive piece of codewhich attaches to a working program, such as your word processor,spreadsheet or CAD/CAM software. Viruses are usually written to detectany load of a computer file that has an extension of .EXE, .COM, .OVL,.BIN - such extensions representing executable programs. Often, thevirus loads itself into memory, then loads the program you just called, sothe virus is sitting at the front. Then when you exit the program, thevirus code calls for the re-writing of the program back onto the disk -with the virus still sitting at the front. Other viruses simply gostraight into your boot sector, so they get loaded every time you turn onyour machine. Some do both. However they 'hide', and whatever they attach to, they got to your machineon an infected diskette. If you are infected and then copy your softwareto use on another machine, guess what happens? Right! That's where the'contagious' element comes in.In 1989, more viruses were discovered than in all previous years. Therewere over 110 at the end of the year, and 7 were discovered in Decemberalone. Sources have been from as far away as Pakistan and Bulgaria.Only .004% have reported infections, but most are not reported. Considerthis: if only 1% were infected, that would be 1/2 million units in theU.S. alone. At a cost ranging from $300 to $3,000 per unit to recover,the problem starts to impact the economy as well as the productivity ofstaff at your organization. It cost one Texas company US$10M to shutdown their 3,000-unit network for 4 days to find 35 infected units.One of the major problems with viruses is that 90% of the users whorecover are re-infected within 30 days. One person at my organizationwas re-infected 7 times in 2 months! Most reinfections occur for one oftwo reasons (not necessarily in this order): your back-up was infected,or it was a virus that hid in the boot sector on track 0, and track 0 isnot re-written by the standard "FORMAT" command (only a low-level formatwill get rid of a track 0 virus). Be careful of some new software aswell: there has been more than one instance of shrink-wrapped softwarebeing infected (software companies have disgruntled employees, too, itseems).6.1 HISTORY1959 - Scientific American article about 'worms'1963 - caught my first two frauds (Payroll & Accounts Payable)1970 - Palo Alto lab - worm which directed activities1982 - Anonymous Apple II worm1984 - Scientific American CoreWare Series: held contest to find the most clever/difficult to detect 'bug'1987 - Apparent change from intellectual exercise to dangerous activity. - 10 -6.2 EFFECTMassive destruction: Reformatting Programs erased Data file(s) modified/erasedPartial/Selective destruction: Modification of data/disk space File allocation tables altered Bad sectors created If match with event, alter or deleteRandom havoc: Altering keystroke values Directories wiped out Disk assignments modified Data written to wrong diskAnnoyance: Message Execution of RAM resident programs suppressed System suspension6.3 WHY DO PEOPLE DO IT?Financial gainPublicityIntellectual exerciseTerrorism/Fanaticism/VandalismRevengeJust plain wierd6.4 SYMPTOMSChange in file size (Usually on .COM, .EXE .OVL, .BIN, .SYS or .BAT files)Change in update time or dateCommon update time or dateDecrease in available disk or memory spaceUnexpected disk accessPrinting and access problemsUnexpected system crashes - 11 -6.5 CONCERNSVariety: Virus vs Bug vs Worm vs Trojan Horse vs Superzapper vs Trap Doors vs Piggybacking vs Impersonation vs Wiretapping vs EmulationStrains / Complexity / Growing SophisticationBulletin board use and free softwareLargest threats from taking computer work homeKids using same machine at homeNetworked mainframe systemsTravel/airline computers (AA wiped out early 1989)Work message systems (E-Mail)POS terminalsBanking / Credit Cards / Money MachinesIncome Tax recordsHealth records ************************************************************** * Global disaster may be on the way * * No specific laws to deal with malicious programming * * No single national centre to gather data on infections * **************************************************************6.6 KNOWN VIRUS SOFTWARE12 viruses (and their strains) account for 90% of all PC infections: _ |_| Pakistani Brain |_| Jerusalem |_| Alameda |_| Cascade (1701/1704) |_| Ping Pong |_| Stoned |_| Lehigh |_| Den Zuk |_| Datacrime (1280/1168) |_| Fu Manchu |_| Vienna (DOS 62) |_| April First - 12 -6.7 QUICK GUIDE TO VIRUS NAMES (Cross referenced)Name Synonym-1 Synonym-2 Synonym-3 Synonym-41168 Datacrime-B1184 Datacrime II1280 Datacrime Columbus Day October 12th Friday 13th1536 Zero Bug1701/1704 Cascade Falling Letters Falling Tears Autumn Leaves1704 Cascade1704 Cascade-B1704 Cascade-C1704 Cascade-D1704 Format 1704 Blackjack Falling Letters1704 Blackjack 1704 Format Falling Letters1808 Jerusalem Black Box/Hole Israeli PLO 1808/18131813 Jerusalem Black Box/Hole Israeli PLO 1808/18132086 Fu Manchu29303066 Traceback3551 Syslock3555123nhalf405500 Virus Golden Gate512 Virus Friday 13th COM virus648 Vienna DOS 62 DOS 68 AustrianAIDS VGA2CGA TauntAIDS Info DiskAlabamaAlameda Virus Yale Merritt Peking SeoulAlameda-B Sacramento Yale CAlameda-CAmstradAntiApple II GS LodeRunnerApril 1st SURIV01 SURIV02April 1st-BAsharAustrian 648 Vienna DOS 62 DOS 68Australian Stoned New Zealand MarijuanaAutumn Leaves Cascade 1701/1704 Falling Letters Falling TearsBasit virus Brain Pakistani Brain LehoreBlack Box Jerusalem Israeli Black Hole 1808/1803 PLOBlack Hole Jerusalem Black Box Israeli 1808/1813 PLOBlack Hole RussianBlackjack 1704 1704 Format Falling LettersBouncing Ball Vera Cruz Ping Pong Bouncing Dot Italian virusBouncing Dot Italian virus Bouncing Ball Vera Cruz Ping PongBrain-B Brain-HD Harddisk Brain Houston virusBrain-CBrain-HD Harddisk Brain Houston virus Brain-B
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -