⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 computer security.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 5 页
字号:
                                  - 7 -4.   REASONS FOR EXPOSUREConcentration of data in one placeInstantaneous adjustmentAlteration without a traceLack of visible recordsComplexity of the systemNetworkingTechnical persons can befuddleGeneral ignorance by non-techie and managementDetection problemsLack of trainingSecurity checks in programs not specifiedSystems not documentedLimited staff resource for programming/managementNo separation of dutiesPossibility of enormous losses remaining undetectedReluctance to report -   Embarrassment                         Lack of sufficient evidence to prosecute                         Cost to prosecute outweighs recovery                         Company policy ("Press would have a field day")                                  - 8 -5.   GENERAL SECURITY RULES (All Systems, big and small)Disaster Recovery }      Backup    Backup    Backup     Plan         }      Restore (test it to make sure it works)Store your backup off-site (not in your car!)Physical security Password for access control (don't stick your password on      the front of your machine!)Access to menu only - not to system control levelReasonableness testsBalance checks (rounding: up, down, (out?); cross-calculationsAudit trails - all records (terminal i.d., user i.d., date and      time stamping, history record retention)Fall-through coding (if it doesn't meet a condition, does it go to limbo)Payroll/Accounts payable:  don't pay the same # twiceFault tolerance level supported   (user friendly/hostile -     balance between fault tolerance & productivity)Call back or no answer on dial-up systemsUPS (Uninterrupted Power Supply, or allowance for graceful     degradation) - or at least an automatic head parkerLogical view rights  (your user 'privileges' allows access only to the     data you need to see, e.g., accounting clerks don't need to see     production formulae)Multi-user environment:  protection against deadly embraceAutomatic logoff on inactivity timer / Screen saverPolicy statement re purchasing/use/theft/illegal      software, etc.Encryption (?) - don't lose the key!Shielding ("Tempest" hardware for secure systems)Educate users                                  - 9 -6.   VIRUSESAs in medicine, a virus needs an 'organism' to which it may attach itself,and a virus is 'contagious'.  In the case of computers, a virus is usually a destructive piece of codewhich attaches to a working program, such as your word processor,spreadsheet or CAD/CAM software.  Viruses are usually written to detectany load of a computer file that has an extension of .EXE, .COM, .OVL,.BIN - such extensions representing executable programs.  Often, thevirus loads itself into memory, then loads the program you just called, sothe virus is sitting at the front.  Then when you exit the program, thevirus code calls for the re-writing of the program back onto the disk -with the virus still sitting at the front.  Other viruses simply gostraight into your boot sector, so they get loaded every time you turn onyour machine.  Some do both.  However they 'hide', and whatever they attach to, they got to your machineon an infected diskette.  If you are infected and then copy your softwareto use on another machine, guess what happens?  Right!  That's where the'contagious' element comes in.In 1989, more viruses were discovered than in all previous years.  Therewere over 110 at the end of the year, and 7 were discovered in Decemberalone.  Sources have been from as far away as Pakistan and Bulgaria.Only .004% have reported infections, but most are not reported.  Considerthis:  if only 1% were infected, that would be 1/2 million units in theU.S. alone.  At a cost ranging from $300 to $3,000 per unit to recover,the problem starts to impact the economy as well as the productivity ofstaff at your organization.  It cost one Texas company US$10M to shutdown their 3,000-unit network for 4 days to find 35 infected units.One of the major problems with viruses is that 90% of the users whorecover are re-infected within 30 days.  One person at my organizationwas re-infected 7 times in 2 months!   Most reinfections occur for one oftwo reasons (not necessarily in this order):  your back-up was infected,or it was a virus that hid in the boot sector on track 0, and track 0 isnot re-written by the standard "FORMAT" command (only a low-level formatwill get rid of a track 0 virus).  Be careful of some new software aswell:  there has been more than one instance of shrink-wrapped softwarebeing infected (software companies have disgruntled employees, too, itseems).6.1  HISTORY1959 - Scientific American article about 'worms'1963 - caught my first two frauds (Payroll & Accounts Payable)1970 - Palo Alto lab - worm which directed activities1982 - Anonymous Apple II worm1984 - Scientific American CoreWare Series:  held contest to       find the most clever/difficult to detect 'bug'1987 - Apparent change from intellectual exercise to        dangerous activity.                                 - 10 -6.2  EFFECTMassive destruction:     Reformatting                         Programs erased                         Data file(s) modified/erasedPartial/Selective destruction:  Modification of data/disk space                         File allocation tables altered                         Bad sectors created                         If match with event, alter or deleteRandom havoc:            Altering keystroke values                         Directories wiped out                         Disk assignments modified                         Data written to wrong diskAnnoyance:               Message                         Execution of RAM resident programs                              suppressed                         System suspension6.3  WHY DO PEOPLE DO IT?Financial gainPublicityIntellectual exerciseTerrorism/Fanaticism/VandalismRevengeJust plain wierd6.4  SYMPTOMSChange in file size (Usually on .COM, .EXE     .OVL, .BIN, .SYS or .BAT files)Change in update time or dateCommon update time or dateDecrease in available disk or memory spaceUnexpected disk accessPrinting and access problemsUnexpected system crashes                                 - 11 -6.5  CONCERNSVariety:  Virus vs Bug vs Worm vs Trojan Horse vs Superzapper          vs Trap Doors vs Piggybacking vs Impersonation          vs Wiretapping vs EmulationStrains / Complexity / Growing SophisticationBulletin board use and free softwareLargest threats from taking computer work homeKids using same machine at homeNetworked mainframe systemsTravel/airline computers (AA wiped out early 1989)Work message systems (E-Mail)POS terminalsBanking / Credit Cards / Money MachinesIncome Tax recordsHealth records     **************************************************************     *    Global disaster may be on the way                       *     *    No specific laws to deal with malicious programming     *     *    No single national centre to gather data on infections  *     **************************************************************6.6  KNOWN VIRUS SOFTWARE12 viruses (and their strains) account for 90% of all PC infections:           _          |_|  Pakistani Brain          |_|  Jerusalem          |_|  Alameda          |_|  Cascade (1701/1704)          |_|  Ping Pong          |_|  Stoned          |_|  Lehigh          |_|  Den Zuk          |_|  Datacrime (1280/1168)          |_|  Fu Manchu          |_|  Vienna (DOS 62)          |_|  April First                                    - 12 -6.7  QUICK GUIDE TO VIRUS NAMES (Cross referenced)Name           Synonym-1      Synonym-2      Synonym-3      Synonym-41168           Datacrime-B1184           Datacrime II1280           Datacrime      Columbus Day   October 12th   Friday 13th1536           Zero Bug1701/1704      Cascade      Falling Letters  Falling Tears Autumn Leaves1704           Cascade1704           Cascade-B1704           Cascade-C1704           Cascade-D1704 Format    1704           Blackjack      Falling Letters1704           Blackjack      1704 Format    Falling Letters1808           Jerusalem      Black Box/Hole Israeli   PLO  1808/18131813           Jerusalem      Black Box/Hole Israeli   PLO  1808/18132086           Fu Manchu29303066           Traceback3551           Syslock3555123nhalf405500 Virus      Golden Gate512 Virus      Friday 13th    COM virus648            Vienna         DOS 62         DOS 68         AustrianAIDS           VGA2CGA        TauntAIDS Info DiskAlabamaAlameda Virus  Yale           Merritt        Peking         SeoulAlameda-B      Sacramento     Yale CAlameda-CAmstradAntiApple II GS    LodeRunnerApril 1st      SURIV01        SURIV02April 1st-BAsharAustrian       648            Vienna         DOS 62         DOS 68Australian     Stoned         New Zealand    MarijuanaAutumn Leaves  Cascade        1701/1704     Falling Letters Falling TearsBasit virus    Brain          Pakistani Brain  LehoreBlack Box      Jerusalem      Israeli        Black Hole     1808/1803 PLOBlack Hole     Jerusalem      Black Box      Israeli        1808/1813 PLOBlack Hole     RussianBlackjack      1704           1704 Format    Falling LettersBouncing Ball  Vera Cruz      Ping Pong      Bouncing Dot   Italian virusBouncing Dot   Italian virus  Bouncing Ball  Vera Cruz      Ping PongBrain-B        Brain-HD       Harddisk Brain Houston virusBrain-CBrain-HD       Harddisk Brain Houston virus  Brain-B

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -