textfiles/magazines/CHN/chn-ooo2.txt

131 lines
7.8 KiB
Plaintext
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=
* (CHN) Connecticut Hacker Newsgroup (CHN) *
= CHN News File #2 =
* an I.I.R.G. affiliate *
= -=>Present<=- =
* LAN Viruses - Fatal Attractions *
=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=
LAN Viruses - Fatal Attractions?
By: Randy Bradley
Viruses and networks are extremely compatible. So compatible in fact
that viruses understood and took advantage of networks long before software
applications did. And while viruses that can be deadly to your network
operating environment are a fact of life, they are also a manageable
threat.
Utilizing a holistic strategy of awareness, prevention techniques, and
early detection, you can effectively protect your network from debilitating,
expensive, and time-consuming viruses. In a survey conducted during
the summer of 1993 by Dataquest, 63% of respondents said they had battled
a computer virus. They also reported that the average virus attack
affected over 140 PCs and that it took an average of 2.4 days to eradicate.
A quarter of the those responding said it took them over five days
to correct the problem.
A LAN virus is virtually indistinguishable from a PC virus except that
it spreads faster and is harder to eradicate. The networked systems
as a whole have hundreds or thousands of entry points to increase the
odds that it will catch a virus. The very nature of networks makes
them susceptible to sharing the entering unintended virus along with
intended data and resources.
Prognosis: There are three assumptions that should be made when determining
the best treatment in the fight against LAN-based viruses. They are
that complete prevention is not practical, changing users work habits
is not reliable, and a maximum state of alertness is not maintainable.
The first assumption comes from the fact that no anti-virus product
or procedure is perfect. The very best antivirus products are only
95-97% effective, and procedures are rarely followed correctly 100%
of the time unless they are fully automated and verifiable. A "perfect
shield" is too expensive to even attempt in all but the most extreme
high security mission-critical environments, and even then can impart
a false sense of security. The only conclusion a LAN manager can make
is that virus infections are going to happen, and because of this, early
detection is the best strategy.
The second assumption comes from the fact that people are not perfect.
Users should definitely be educated as to the sources, symptoms, and
nature of a virus, but you can't count on everybody scanning every
floppy, tape, CD-ROM, or email attachment that comes into their system.
The only safe screening process is a fully automated screening process.
The third assumption is obvious to every general and doctor in the
world, and yet many LAN managers require users to take the same maximum
precautions every day even though the site has been clean of viruses
for months. A soldier cannot stay at attention for 24 hours, nor can
the human body be constantly rushed with adrenaline. And such unreasonable
expectations unnecessarily impact productivity, actually cause laziness
out of defiance, and can cause a general disrespect for reasonable
security precautions. The answer is to create a two-stage alert strategy
where the first stage is "no known virus present" and the second is
"virus present", and then to build your defenses appropriately around
these stages.
Treatment, Preparation, and Planning: The first step is to create or
modify an existing disaster recovery plan to include virus preparedness.
The backup and recovery policy should take into account the possibility
of infected backups. If the two-stage policy is adopted, the two stages
should be delineated to include what security functions are performed
in each stage and who is performing them. You should identify what
triggers a change to the second stage from the first, and what triggers
a return back to the first stage.
Preparation and planning also includes identifying places a virus may
hide such as a gateway, home PCs, or notebook PCs. It is also a good
idea to identify any applications that are likely to be spreaders of
viruses. The criteria and authority to disconnect subnets should also
be clearly defined if needed to stop a rapidly spreading virus.
Deterrence Although you can't depend on users to act as your first line
of defense, educating them on what to do to minimize virus attacks,
what to look for, and who to call is a prudent idea. Deterrence is
also accomplished by using the basic network operating system security
features such as utilizing minimum access rights and separate administration
accounts. Some also prefer to use resident TSR or NLM antivirus products,
although caution should be used as some of these are not as effective as
their scanning counterparts due to real-time processing constraints.
Integrity checking products which claim to detect all known viruses can be
helpful, but they can only tell you that something virus-like is present;
they cannot tell you what it is or how to clean it.
Detection and Containment: The scanning of all PCs and servers should
be completely automated. The process should determine when scans are
to be done, execute it, log the results, logout infected PCs, and
notify LAN managers which virus was found, when and where.
When a virus is detected, verify it, identify it, and learn its attributes
before proceeding to eradicate it. Verify it with a second anti-virus
product, and use a product like VSUM, a shareware hypertext product
with virus characteristics and anti-virus product ratings, to learn
about that specific virus. Some viruses are a minor annoyance and risk,
others are extremely dangerous, Once you know what you have, assess
your second stage criteria and implement it quickly across all or a
portion of the network. In extreme cases, you may need to isolate
segments or nodes to prevent spreading, and you should be logistically
ready to do this if necessary.
Cleanup and Post Cleanup: Cleaning up a virus is a straight-forward process
most of the time. If you contained it Well, you only have a few
PCs to clean and you can be done in minutes. If it has spread unchecked
for some time, you are in for a longer haul. In the latter case, you
would proceed systematically down each PC, notebook, gateway, server,
and segment of the network - In either case, the time you are most susceptible
to a new virus is when you think you have just cleaned up the old one.
You should remain in stage two for 2-14 days to minimize the risk of
reinfection.
Once you're through a virus event, start preparing for the next one
by analyzing your responsiveness and preparedness. Where did it come
from? Did you catch it carly? Did you contain it well and clean up
effectively?
Was this a recurrence of a virus or a new one? This last question is
the most important because it will tell you how you're doing in virus
defense. If you keep getting the same virus, you are not doing a
good job of cleaning it up. If you get a different virus every 4-6
months with only a few stations affected, you are doing a good job of
detecting, containing, and cleaning, but may need to work on education.
LANs are especially susceptible to significant disruption from virus
attacks, but they also provide the platform for centralized, automated
procedures that can minimize the risk. While a virus cannot be totally
prevented, the risk of disruption of business activity can be sufficiently
reduced using tools currently available and a well-managed virus defense
strategy.