ZDDDDDDDDDDDDDDDDDD? IMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM; ZDDDDDDDDDDDDDDDDDD?
3   Founded By:    3 :  Network Information Access   : 3 Mother Earth BBS 3
3 Guardian Of Time 3D:            17APR90            :D3  NUP:> DECnet    3
3   Judge Dredd    3 :          Judge Dredd          : 3Text File Archives3
@DDDDDDDDBDDDDDDDDDY :            File 25            : @DDDDDDDDDBDDDDDDDDY
         3           HMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM<           3
         3         IMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM;         3
         @DDDDDDDDD6 Overview On Viruses & Threats III GDDDDDDDDDY
                   HMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM<

$_Virus Prevention for Multi-User Computers and Associated Networks

 Virus prevention in the multi-user  computer environment is aided
 by the centralized system and  user management, and the  relative
 richness of technical controls.   Unlike personal computers, many
 multi-user    systems   possess    basic   controls    for   user
 authentication, for levels  of access  to files and  directories,
 and  for  protected regions  of  memory.   By  themselves,  these
 controls are not  adequate, but combined with other  policies and
 procedures that  specifically target viruses and related threats,
 multi-user systems  can greatly  reduce their  vulnerabilities to
 exploitation and attack.

 However, some relatively powerful multi-user  machines are now so
 compact as to be  able to be located  in an office or on  a desk-
 top.  These machines are still fully able to support a small user
 population, to connect to major  networks, and to perform complex
 real-time operations.  But  due to their size and  increased ease
 of operation, they  are more  vulnerable to unauthorized  access.
 Also,  multi-user  machines are  sometimes  managed by  untrained
 personnel  who  do not  have adequate  time  to devote  to proper
 system management and who may not possess  a technical background
 or  understanding  of  the  system's  operation.    Thus,  it  is
 especially important for organizations who use or are considering
 machines of this nature to pay  particular attention to the risks
 of attack by unauthorized users, viruses, and related software.

 The  following sections  offer guidance  and recommendations  for
 improving  the management  and reducing  the risk  of attack  for
 multi-user computers and associated networks.

$_General Policies

 Two general policies are  suggested here.  They are  intended for
 uniform adoption throughout an organization,  i.e., they will not
 be entirely effective if they are  not uniformly followed.  These
 policies are as follows:

    - An organization must assign a dedicated system manager to
      operate each multi-user computer.   The manager should be
      trained,  if  necessary,  to  operate  the  system  in  a
      practical and secure  manner.  This individual  should be
      assigned  the  management  duties  as  part  of  his  job
      description; the management duties should not be assigned
      "on top"  of the  individual's other  duties, but  rather
      adequate time should be taken  from other duties.  System
      management  is a  demanding and  time-consuming operation
      that can  unexpectedly require  complete dedication.   As
      systems are increasingly inter-connected via networks,  a
      poorly managed system that  can be used as a  pathway for
      unauthorized access  to  other  systems  will  present  a
      significant vulnerability to an organization.   Thus, the
      job of system  manager should be assigned  carefully, and
      adequate time be given  so that the job can  be performed
      completely.

    - Management needs to impress upon users the need for their
      involvement  and  cooperation in  computer  security.   A
      method  for  doing this  is  to create  an organizational
      security policy.  This policy should be a superset of all
      other  computer-related  policy,  and  should  serve   to
      clearly define what is  expected of the user.   It should
      detail  how  systems are  to be  used  and what  sorts of
      computing are permitted and not  permitted.  Users should
      read this policy  and agree  to it as  a prerequisite  to
      computer  use.   It  would also  be  helpful to  use this
      policy to create  other policies specific to  each multi-
      user system.


$_Software Management


 Effective  software management  can help  to make  a  system less
 vulnerable to  attack and can make containment  and recovery more
 successful.  Carefully controlled access to software will prevent
 or  discourage  unauthorized  access.   If  accurate  records and
 backups  are  maintained, software  restoral can  be accomplished
 with  a minimum of lost  time and data.  A  policy of testing all
 new  software,  especially  public-domain   software,  will  help
 prevent accidental infection  of a system by  viruses and related
 software.    Thus,  the  following  policies and  procedures  are
 recommended:

    - Use only licensed copies of  vendor software, or software
      that can be verified to be free of harmful code or  other
      destructive aspects.  Maintain complete information about
      the software, such  as the  vendor address and  telephone
      number,  the  license  number  and  version,  and  update
      information.   Store the  software in  a secure,  tamper-
      proof location.

    - Maintain configuration reports of all installed software,
      including the operating system.  This information will be
      necessary if the software must be re-installed later.

    - Prevent user access to system software and  data.  Ensure
      that  such  software   is  fully   protected,  and   that
      appropriate  monitoring  is  done to  detect  attempts at
      unauthorized access.

    - Prohibit users  from installing software.   Users  should
      first contact the system  manager regarding new software.
      The software should  then be tested on an isolated system
      to determine whether the software may contain destructive
      elements.  The isolated system should  be set up so that,
      to a practical  degree, it replicates the  target system,
      but does  not connect  to networks  or process  sensitive
      data.  A highly-skilled user knowledgeable about  viruses
      and related threats should perform the testing and ensure
      that  the  software  does  not  change  or  delete  other
      software or data.  Do not allow users to directly add any
      software  to  the  system, whether  from  public software
      repositories, or other systems, or their home systems.

    - Teach  users  to  protect  their  data  from unauthorized
      access.  Ensure that they know how to use access controls
      or  file  protection mechanisms  to  prevent others  from
      reading  or  modifying  their files.    As  possible, set
      default file protections such that when a user  creates a
      file, the file can  be accessed only by that user, and no
      others.  Each user should not permit others to use his or
      her account.

    - Do  not   set-up  directories   to   serve  as   software
      repositories  unless  technical  controls  are  used   to
      prevent users from  writing to the directory.   Make sure
      that users contact the system  manager regarding software
      they wish to place in a software repository.  It would be
      helpful  to  track  where the  software  is  installed by
      setting up a  process whereby  users must first  register
      their  names  before  they  can  copy software  from  the
      directory.

    - If  developing  software, control  the update  process so
      that the  software is not modified without authorization.
      Use a  software  management and  control  application  to
      control  access  to  the  software  and to  automate  the
      logging of modifications.

    - Accept system and  application bug fixes or  patches only
      from  highly  reliable  sources,  such  as  the  software
      vendor.  Do  not accept  patches from anonymous  sources,
      such as received via a network.  Test the new software on
      an isolated system  to ensure that the  software does not
      make an existing problem worse.

$_Technical Controls

 Many  multi-user  computers   contain  basic  built-in  technical
 controls.   These  include  user  authentication  via  passwords,
 levels of user  privilege, and  file access controls.   By  using
 these  basic  controls  effectively, managers  can  significantly
 reduce the risk of attack by  preventing or deterring viruses and
 related threats from accessing a system.

 Perhaps   the   most   important   technical   control   is  user
 authentication, with the most widely  form of user authentication
 being a username associated with a  password.  Every user account
 should use a password that is  deliberately chosen so that simple
 attempts  at  password  cracking  cannot  occur.    An  effective
 password should not consist of a  person's name or a recognizable
 word, but rather should consist of alphanumeric characters and/or
 strings of words  that cannot easily  be guessed.  The  passwords
 should be changed  at regular intervals,  such as every three  to
 six months.  Some systems include or can be modified to include a
 password history, to  prevent users  from reusing old  passwords.

 The  username/password mechanism  can  sometimes be  modified  to
 reduce opportunities  for password  cracking.  One  method is  to
 increase the running time of  the password encryption to  several
 seconds.   Another method is to  cause the user login  program to
 accept from three  to five incorrect  password attempts in a  row
 before disabling  the  user account  for several  minutes.   Both
 methods  significantly  increase the  amount  of time  a password
 cracker would spend  when making repeated attempts at  guessing a
 password.  A method for ensuring  that passwords are difficult to
 crack involves  the use  of a  program that  could systematically
 guess passwords,  and then  send warning messages  to the  system
 manager and corresponding users if successful.  The program could
 attempt passwords that  are permutations of each  user's name, as
 well as using words from an on-line dictionary.

 Besides  user  authentication,   access  control  mechanisms  are
 perhaps  the  next  most  important  technical control.    Access
  control mechanisms permit a system  manager to selectively permit
 or bar user access  to system resources regardless of  the user's
 level of privilege.  For example, a user at a low-level of system
 privilege  can be granted access to a  resource at a higher level
 of privilege without raising the user's privilege through the use
 of an access  control that specifically grants that  user access.
 Usually,  the access control  can determine  the type  of access,
 e.g.,  read  or  write.   Some  access  controls  can send  alarm
 messages  to audit logs  or the system  manager when unsuccessful
 attempts are  made  to access  resources protected  by an  access
 control.

 Systems which do not use access controls  usually contain another
 more  basic form  that grants  access based  on user  categories.
 Usually, there are four: owner, where only the user who "owns" or
 creates the resource  can access it;  group, where anyone in  the
 same group as the owner can access the resource; world, where all
 users can access  the resource, and system, which  supersedes all
 other user privileges.   Usually, a file or directory can  be set
 up to allow any combination of the four.  Unlike access controls,
 this scheme doesn't permit access to resources on a specific user
 basis, thus if a user at a low level of privilege requires access
 to  a  system level  resource, the  user  must be  granted system
 privilege.    However,   if  used  carefully,  this   scheme  can
 adequately  protect  users'  files from  being  accessed  without
 authorization.  The  most effective  mode is to  create a  unique
 group  for each  user.   Some systems  may permit a  default file
 permission mask  to be set  so that every  file created would  be
 accessible only by the file's owner.

 Other technical control guidelines are as follows:

    - Do  not  use  the  same   password  on  several  systems.
      Additionally,  sets  of   computers  that  are   mutually
      trusting in the sense that login to one constitutes login
      to all should be carefully controlled.

    - Disable  or  remove  old  or unnecessary  user  accounts.
      Whenever users leave  an organization or no  longer use a
      system, change all passwords that the users had knowledge
      of.

    - Practice a  "least privilege"  policy, whereby  users are
      restricted to accessing resources on a need-to-know basis
      only.    User  privileges  should  be as  restricting  as
      possible without adversely  affecting the performance  of
      their  work.   To  determine  what  level  of  access  is
      required, err first  by setting privileges to  their most
      restrictive,  and  upgrade  them as  necessary.    If the
      system uses access controls, attempt to maintain a user's
      system privileges at  a low level while using  the access
      controls  to  specifically grant  access to  the required
      resources.

    - Users are generally able to determine other users' access
      to their files  and directories,  thus instruct users  to
      carefully maintain their files  and directories such that
      they are not accessible,  or at a minimum,  not writable,
      by  other  users.     As   possible,  set  default   file
      protections such  that files  and directories created  by
      each user are accessible by only that user.

    - When  using modems,  do not  provide more  access to  the
      system than is necessary.  For  example, if only dial-out
      service  is required, set up the  modem or telephone line
      so  that dial-in  service is  not  possible.   If dial-in
      service  is   necessary,  use  modems  that   require  an
      additional  passwords  or  modems  that  use  a call-back
      mechanism.  These modems may work such that a caller must
      first  identify   himself  to   the  system.     If   the
      identification has been pre-recorded with  the system and
      therefore valid,  the system  then calls  back at  a pre-
      recorded telephone number.

    - If file  encryption mechanisms are  available, make  them
      accessible to users.  Users may wish to use encryption as
      a  further  means of  protecting  the confidentiality  of
      their files, especially  if the system is  accessible via
      networks or modems.

    - Include  software so  that users  can temporarily  "lock"
      their terminals from accepting keystrokes while they  are
      away.  Use software that  automatically disables a user's
      account if no  activity occurs after a  certain interval,
      such as 10 - 15 minutes.


$_Monitoring

 Many  multi-user systems  provide a  mechanism for  automatically
 recording  some  aspects  of  user  and  system  activity.   This
 monitoring  mechanism,  if  used regularly,  can  help  to detect
 evidence of viruses and  related threats.  Early detection  is of
 great  value, because  malicious software  potentially can  cause
 significant damage within a matter of  minutes.  Once evidence of
 an  attack  has  been  verified,  managers  can  use  contingency
 procedures to contain and recover from any resultant damage.

 Effective  monitoring   also  requires   user  involvement,   and
 therefore,  user education.  Users must  have some guidelines for
 what constitutes normal and abnormal  system activity.  They need
 to be aware of such items  as whether files have been changed  in
 content,  date, or by access permissions,  whether disk space has
 become suddenly full, and whether  abnormal error messages occur.
 They need to know whom to contact to report signs of  trouble and
 then the steps to take to contain any damage.

 The following  policies and procedures  for effective  monitoring
 are recommended:

    - Use  the  system   monitoring/auditing  tools  that   are
      available.    Follow the  procedures  recommended  by the
      system vendor, or start out by enabling the full level or
      most  detailed  level  of  monitoring.     Use  tools  as
      available to help read the logs, and determine what level
      of monitoring is adequate,  and cut back on the  level of
      detail  as  necessary.   Be  on the  guard  for excessive
      attempts to access  accounts or other resources  that are
      protected.  Examine the log regularly, at least weekly if
      not more often.

    - As  a  further aid  to  monitoring, use  alarm mechanisms
      found in some access  controls.  These mechanisms  send a
      message to the audit  log whenever an attempt is  made to
      access a resource protected by an access control.

    - If no system  monitoring is available, or  if the present
      mechanism is unwieldy or not sufficient,  investigate and
      purchase  other  monitoring  tools as  available.    Some
      third-party software companies sell monitoring tools  for
      major operating systems  with capabilities that supersede
      those of the vendor's.

    - Educate  users  so  that   they  understand  the   normal
      operating  aspects of the system.   Ensure that they have
      quick access  to an  individual or  group who  can answer
      their   questions   and   investigate   potential   virus
      incidents.

    - Purchase or build system sweep programs to checksum files
      at night, and report differences from previous runs.  Use
      a password checker to monitor whether passwords are being
      used effectively.

    - Always report,  log, and  investigate security  problems,
      even when the problems appear insignificant.  Use the log
      as input into regular security reviews.  Use the  reviews
      as a means  for evaluating the effectiveness  of security
      policies and procedures.

    - Enforce  some  form   of  sanctions  against   users  who
      consistently  violate  or  attempt  to  violate  security
      policies and procedures.  Use the audit logs as evidence,
      and bar the users from system use.

$_Contingency Planning

 As  stressed  in  part II,  backups  are  the  most  important
 contingency planning  activity.  A  system manager must  plan for
 the eventuality of having  to restore all software and  data from
 backup  tapes  for any  number  of  reasons, such  as  disk drive
 failure or upgrades.  It has been shown that viruses and  related
 threats  could potentially  and unexpectedly  destroy all  system
 information  or  render  it  useless,  thus managers  should  pay
 particular   attention  to  the  effectiveness  of  their  backup
 policies.   Backup  policies  will vary  from  system to  system,
 however they should be performed daily, with a minimum of several
 months backup history.   Backup  tapes should be  verified to  be
 accurate, and should be stored off-site in a secured location.

 Viruses and  related software threats  could go  undetected in  a
 system  for months  to years, and  thus could be  backed up along
 with  normal  system data.    If  such a  program  would suddenly
 trigger  and cause damage, it may  require much searching through
 old backups to determine  when the program first appeared  or was
 infected.   Therefore the safest  policy is to  restore programs,
 i.e., executable and  command files,  from their original  vendor
 media only.   Only system data  that is non-executable should  be
 restored from regular backups.  Of course, in the case of command
 files or batch procedures  that are developed or modified  in the
 course of daily system  activity, these may need to  be inspected
 manually to ensure that they have not been modified or damaged.

 Other recommended contingency planning activities are as follows:

    - Create a security distribution list  for hand-out to each
      user.  The list should include  the system manager's name
      and number, and other similar information for individuals
      who can  answer  users'  questions  about  suspicious  or
      unusual system activity.   The list should  indicate when
      to contact these individuals, and where to reach  them in
      emergencies.

    - Coordinate with  other  system  managers,  especially  if
      their  computers  are  connected  to  the  same  network.
      Ensure that all can be contacted  quickly in the event of
      a network emergency  by using  some mechanism other  than
      the network.

    - Besides  observing physical  security for  the system  as
      well as its  software and backup media,  locate terminals
      in offices that can be locked or in other secure areas.

    - If users are accessing the  system via personal computers
      and terminal emulation  software, keep a record  of where
      the personal computers  are located and their  network or
      port address for monitoring  purposes.  Control carefully
      whether such users are uploading software to the system.

    - Exercise caution when  accepting system patches.   Do not
      accept patches that arrive over a network unless there is
      a high degree of certainty  as to their validity.  It  is
      best to accept patches only from the appropriate software
      vendor.


$_Associated Network Concerns

 Multi-user  computers are  more often associated  with relatively
 large  networks  than  very  localized  local  area  networks  or
 personal  computer  networks  that  may   use  dedicated  network
 servers.  The viewpoint taken here is that wide area network  and
 large local  area network  security is  essentially a  collective
 function of the systems connected to the network, i.e., it is not
 practical for a controlling system to monitor all network traffic
 and differentiate  between authorized  and unauthorized  use.   A
 system manager  should generally assume that  network connections
 pose inherent risks of  unauthorized access to the system  in the
 forms  of unauthorized  users and  malicious software.   Thus,  a
 system manager  needs to  protect the  system from  network-borne
 threats and likewise exercise responsibility by ensuring that his
 system is not  a source of such  threats, while at the  same time
 making  network connections available to users as necessary.  The
 accomplishment  of these aims  will require the  use of technical
 controls  to  restrict  certain types  of  access,  monitoring to
 detect violations, and a certain amount  of trust that users will
 use the controls and follow the policies.

 Some guidelines for using networks in a more secure manner are as
 follows:

    - Assume  that network  connections  elevate  the  risk  of
      unauthorized access.  Place network connections on system
      which  provide adequate  controls,  such  as strong  user
      authentication  and  access  control  mechanisms.   Avoid
      placing  network  connections  on  system  which  process
      sensitive data.

    - If the system permits, require  an additional password or
      form of authentication for accounts accessed from network
      ports.    If possible,  do  not permit  access  to system
      manager accounts from network ports.

    - If  anonymous   or  guest   accounts   are  used,   place
      restrictions  on  the  types  of  commands  that  can  be
      executed  from  the  account.    Don't permit  access  to
      software tools,  commands that  can increase  privileges,
      and so forth.

    - As  possible,  monitor usage  of the  network.   Check if
      network connections are made at odd hours, such as during
      the night, or if repeated attempts are made  to log in to
      the system from a network port.

    - When more  than  one computer  is connected  to the  same
      network,  arrange the  connections  so that  one  machine
      serves as a central gateway for the other machines.  This
      will allow a rapid disconnect from the network in case of
      an attack.

    - Ensure that users  are fully  educated in network  usage.
      Make  them  aware  of the  additional  risks  involved in
      network access.  Instruct them to be on the alert for any
      signs of tampering, and to  contact an appropriate person
      if they detect any suspicious activity.  Create a  policy
      for responsible network  usage that details what  sort of
      computing activity will and will  not be tolerated.  Have
      users read the policy as a prerequisite to network use.

    - Warn  users to  be suspicious  of  any messages  that are
      received from unidentified or unknown sources.

    - Don't advertise  a system  to network  users by  printing
      more information than necessary on a welcome banner.  For
      example, don't include  messages such as "Welcome  to the
      Payroll Accounting System"  that may cause the  system to
      be more attractive to unauthorized users.

    - Don't network  to outside organizations  without a mutual
      review of security practices

-JUDGE DREDD/NIA

[OTHER WORLD BBS]




Downloaded From P-80 International Information Systems 304-744-2253 12yrs+