latest information about i-cet 2009 exam

Eligibility criteria:
1. The candidate must be an Indian national
2. Candidates appearing for MBA course must a Bachelor’s Degree from any university in andhtra Pradesh or any other equivalent university.
3. Candidates appearing for MBA course must a Bachelor’s Degree and he/she must have studied mathematics at class 12th level.

Proposed important dates:
1. First week of feb 2009 — Commencement of sale of application forms
2. First week of march 2009 — Last date for the sale & receipt of filled in applications
3. Mid march 2009 — Last date for the sale & receipt of filled in applications with a late fee of Rs.500/-
4. Mid may 2009 — Date of Entrance Test

Syllabus:
1. Total 200 questions
2. +1 for each correct answer

Section-A:
Analytical Ability
(i) Problem Solving
(ii) Data Sufficiency

Section-B:
Mathematical Ability
(i) Arithmatical Ability
(ii) Algebrical and Geometrical Ability
(iii) Statistical Ability

Section-C:
Communication Ability
(i) Vocabulary
(ii) Business and Computer Technology
(iii) Function Grammar
(iv) Reading Comprehension

Contact details:
Proffessor D.N. Reddy,
Convener, ICET- 2008,
Beside University Computer Centre
University College of Engineering,
Osmania University, Hyderabad - 500007. (AP)
Phone: 040-27682358, 64538254
Fax: 040-27097221
6:00 AM

Computer Security

COMPUTER SECURITY ----------------- Notes of the presentation to The Institution of Production Engineers March 21, 1990 by E.A.Bedwell, E.D.P. Specialist ORTECH International (NRC/IRAP) 2395 Speakman Dr., Mississauga L5K 1B3 (416) 822-4111, Ext. 261The writer wishes to thank the Institution of Production Engineers andit's President for the invitation to make this presentation, and toexpress sincere appreciation to David Stang, Ph.D., Director of Research,National Computer Security Association, for his contribution both to thispaper and to computer security in general. And I would be very remiss ifI neglected to mention the professional secretarial assistance provided byJane Templeman, who makes our whole team tick like the NRC official timeclock - the one that gives the CBC time signal.This document is, hopefully, written softly: after all, it might beeasier to digest if I have to eat my words. I do not profess to be "theexpert" in the field of computer security; an expert is someone who knowsmore and more about less and less until s/he knows absolutely everythingabout nothing. I hope never to stop learning, which means (thankfully)I'll never be an expert.

COMPUTER SECURITY ----------------- Notes of the presentation to The Institution of Production Engineers March 21, 1990 by E.A.Bedwell, E.D.P. Specialist ORTECH International (NRC/IRAP) 2395 Speakman Dr., Mississauga L5K 1B3 (416) 822-4111, Ext. 261The writer wishes to thank the Institution of Production Engineers andit's President for the invitation to make this presentation, and toexpress sincere appreciation to David Stang, Ph.D., Director of Research,National Computer Security Association, for his contribution both to thispaper and to computer security in general. And I would be very remiss ifI neglected to mention the professional secretarial assistance provided byJane Templeman, who makes our whole team tick like the NRC official timeclock - the one that gives the CBC time signal.This document is, hopefully, written softly: after all, it might beeasier to digest if I have to eat my words. I do not profess to be "theexpert" in the field of computer security; an expert is someone who knowsmore and more about less and less until s/he knows absolutely everythingabout nothing. I hope never to stop learning, which means (thankfully)I'll never be an expert. INDEX PAGE ----- ---- 1. Definition/Scope of "COMPUTER SECURITY" 2 2. Why Should You Be Concerned? 2 3. Types of Security Breaches 3 4. Reasons for Exposure 7 5. General Security Rules (all computer systems) 8 6. Viruses: 9 6.1 History 9 6.2 Effect 10 6.3 Why do people do it? 10 6.4 Symptoms 10 6.5 Concerns 11 6.6 Known Virus Software (1) 11 6.7 Quick Guide to Virus Names (1) 12 6.8 Table of Virus Effects 16 6.9 Virus Detector/Antidote software 19 6.10 Trojan Horses 20 7. PC Rules of Thumb 22 8. Easy Tricks for PC Security 23 9. So You're Infected (Cure) 24 10. Summary: What Can You Do? 25 11. Security Policy: Points for Consideration 26 12. To run SCAN (included on this diskette) 29(1) David Stang, Ph.D, "Network Security in the Federal Government,", January, 1990, p.168-169 (updated by E.A.Bedwell, March, 1990) - 2 -Tonight's topic is "Computer Security," a subject near and dear to myheart after catching fraud a few times, and cracking system security afew times. The only unfortunate part of this evening is that I haveenough material to cover an intensive 2 or 3 day seminar and I only havesomething over an hour, so in addition to extensive notes from thispresentation, I've put an article on viruses, and a PC virus detectorprogram on diskette for you.1. SCOPE OF COMPUTER SECURITYComputer security relates to any potential loss of information or yourability to operate, regardless of the source of the problem. Of course,all the publicity about computer security is going to the virussituation. I don't want to dissuade anyone from their concerns aboutviruses, because it's definitely a growing problem, and if you get hit,you'll be sorry you ever laid eyes on a computer. But, current estimatesindicate that viruses represent only 3% of all the computer problems nowoccurring. Of course, if you're one of the 3%, like CNIB or Barclay'sBank Canada were last fall, you'll feel like you're the only one onearth. The difference between viruses and other computer security issuesis apparently one of control: I hope to convince you that you have asmuch control over viruses and as little control over the other 97% ofproblems as to make them equal threats to the safety of your computer.I'm going to get to viruses later, their prevention, detection and cure,but I'd like first like to cover the other major problems that affectcomputer security - the other 97% - and I'd like to start with reasonswhy you should be concerned about security.2. WHY SHOULD YOU BE CONCERNED?Your data is a valuable asset, just like premises, equipment, rawmaterials and inventory. Because so much of modern business depends oncomputers - financial systems, engineering design, medical diagnosis,production and safety control - the destructive potential is greaterevery year. There has been more than one company that's suffered greatlosses, and even gone under because of the loss of things like theiraccounts receivable records: no one is going to pay you if you don'tsend them a bill, and if they get word of your inability to invoice them,their darned unlikely to volunteer payment - so you're in a financialmess. The same goes for your design information, production data, theconsequences if safety control systems malfunction, or even the simpleloss of your customer list.Another reason why you should be concerned is, too often, people don'tthink about computer security until it's too late. There's a saying inmy industry that, "He who laughs last probably made a backup." Anothersaying is, "Experience is something you don't get until just after youneeded it the most." Well, if it means the life of your company, or theloss of potentially millions of dollars, or even just the information onyour home computer, it might be wise to get at least some basic knowledgebefore the disaster strikes. - 3 -3. TYPES OF SECURITY BREACHESNow that the 'why' is out of the way, let's break down the 97% ofproblems. These are not in a specific order, but just as they came tome. Nor have I attempted to attach percentages to each type of risk,because very few computer crimes are actually reported, so any figuresthat anyone could estimate would not be realistic:FRAUD/THEFTBy far the biggest problem is fraud or theft. Some examples of this are: CHAOS - 1987 - Hamburg -> NASA data bank info sold to USSR Foreign exchange } famous because of big $ Electronic Funds Transfer } amounts, and because of the Insider Trading } publicity they've received Most common: Cookie jar technique - e.g., interest, income tax (aka 'Salami' technique - take a little and no one will notice)Specific examples I've caught were in Payroll (no crash on < or =),Accounts Payable (dummy companies), Purchasing (failed reasonablenesstest), and Accounts Receivable (failed balance routine). These were allthefts of money.Another example of theft which is very interesting is the 28-year-oldCanadian who was arrested at UNISYS in Pittsburgh on Dec. 13/89 - what heis alleged to have stolen was NCR's trade secrets - to the tune ofUS$68M, which comes under a different Canadian law from monetary theft.MALICIOUS DAMAGE / VANDALISMThe next major type of computer security breach is the disgruntledemployee syndrome. Their favourite is the logic bomb or time bomb: on acertain date or condition after they leave the company, something's goingto happen, such as at the health centre in LA where all prescriptionssuddenly multiplied by 2. That's really serious, even compared to thelogic bomb that superzaps all your files off the face of the earth,because someone could die. At least with a superzap, you can recover ifyou've been backing up and have a disaster recovery plan in effect. Purephysical vandalism occurs more often at educational institutions, but isstill a serious threat. I wouldn't let me near your machine if I wasangry with you - my vandalism would be difficult to detect (and expensiveto repair). A simple application of a magnetized screwdriver ......LACK OF SECURITY PLANNING IN SYSTEM DESIGN STAGEOne of the biggest logic bombs that's going to occur is on January 1/2000.Do you know how many computer systems use a 2 digit number for the year? Do you know how much work it's going to be to adapt systems to recognize00 as being greater than 99? My grandmother was born in 1886, and mostsystems show her birth year as 99. If she lives to the year 1999, Iwonder if they'll start sending her the baby bonus. This time bomb is notmalicious damage, it's pure lack of planning at the system design stage. - 4 -(Lack of Security Planning - continued)Things like balance checks and reasonableness tests are not built into thesystem from the beginning, and it's not easy to put them in later. Usersmust participate at the system design stage, because only they know what'sreasonable and what can be balanced. Don't expect a computer technicianto know everything there is to know about your job.DISTORTED SENSE OF HUMOURThen there's the practical joker - the one who thinks it's funny to breakinto the system to see what he can change, or create some dumb message toappear on your screen. That's what happened at IBM when the infamousChristmas tree appeared 2 years ago (1987). The joke was three-fold -first it analyzed your electronic mail distribution lists and reproduceditself to send to everyone you normally send messages to - this cloggedthe system up with people reading more messages than normal. The secondpart was a little more technical - everyone who read the message caused aseparate load of the offending program to take up space in memory, unlikemost systems where two or more people who are doing the same thing aresharing one load of the software. This clogged memory up so that nothingelse could run. There was one more part to this: there were delay timersbuilt into the program so it deliberately ran very slowly. The result wasthat the largest computer network in the world was shut down for 4 hours. Someone must have had a great need for a power trip.MISTAKENext, there's fumble fingers: you know, the one who keys the formula inas 600 grams instead of 60 grams, or the estimated production time of 2hours instead of 2 days. Or the one who almost took me into court whenhe blamed "the computer" for a mistake. Without going into details aboutthat incident, I can say that going through the grilling by severallawyers in a preliminary investigation was not the high point of mycareer. What saved the situation (for me and the organization) was audittrailing: every time a transaction was entered, the system recorded theterminal i.d., the user i.d., the date and the time. It also saved a copyof the record as it existed prior to the transaction taking place. A morecommon mistake, though, is to unlatch a diskette door before the lightgoes out. Few people realize that the FAT (file attributes table) is thelast thing written on a disk, and you can corrupt the FAT by removing thedisk too early."EVERYONE DOES IT" SYNDROMEThen there's everyone's favourite: copying software. Believe it or not,in Canada, that falls under the Copyright law, not under theft, but ithas been successfully prosecuted. Even if you reverse engineer it andmake some minor changes, it will come under the "look and feel" test ofthe Copyright law - if it looks and feels the same as the original, youcan be prosecuted. Copying software is illegal, and your company as theregistered owner could be held liable if it is detected. - 5 -ILLEGAL ACCESSMany major computer crimes are perpetrated by illegal access: the 14-year old who broke into NASA from his basement computer room is just oneexample. There is password software on all larger machines, and it's notdifficult to put it on PCs. On the larger machines, one of the majorproblems is not changing the standard passwords that are set when themachine is delivered: the standard user-level password may be USER, thestandard operator password may be OPERATOR, and the standard field repairperson's password may be REPAIR, and so on. Guess how I've crackedsecurity a couple of times. In a 1988 article by Dr. Cliff Stoll in"Computers and Security,", he reported that in 10 months of systematictesting on computers attached to the US Defense Data Network (Milnet),access was gained in 13% of the attempts simply by guessing at passwords!There should be some rules applied to passwords: not less than 7 or 8characters, must be changed at least every 60 days, don't use commonthings like names (another way I've broken security), don't share itunder any circumstances and, for heaven's sake, don't post it on thefront of your machine or leave it where someone can find it. It's yourpersonal PIN - just like the money machine - and the information you'redealing with is worth money. Some of the most difficult passwords tobreak (take it from me) are "two words reversed" (e.g., boardwall,hornshoe, cuptea), or foreign language words (e.g., coupdegrace,millegrazie, caliente). Nonsense is good, too: geebleurql is nice. If you're installing password security on a PC, consider whether youshould have it so tight that there is no recourse to the DOS level or noability to boot from the A: drive. You'd need really good passwordsoftware (or a good technician on staff) if you have both of thesefacilities - otherwise you can lock yourself out - but it's my preference(especially for the guy who's wiped his root directory twice).PHYSICAL SECURITYFinally, another area that affects computer security or your ability tocarry on computer operations, and one that is often overlooked, is simplephysical security: keys, thermal shock, vibration, dirt, water, fire,visibility of information, steady power supply, discharge of staticelectricity, magnetic fields, are all relevant to security. We have oneman in our network who should have (a) cabling bolted to his computer andthe floor, (b) a key to his unit, and (c) dust protectors (as well aspassword access only without recourse to the DOS level). When it comes to thermal shock, if you work in an area where the heat isreduced on winter weekends, I strongly recommend you leave your unitrunning over the weekend - just lock the keyboard. If the airconditioning is shut down, turn your unit off, and don't turn it on untilthe temperature is 23C or less. And please don't leave your machinesitting in the sun, or in front of an open window to attract dust. Theinternal temperature raises within 20 mins. or so to >30C, and the effectsof thermal shock are such that it can, first, rock memory chips out oftheir sockets, and, worse, misalign the read heads on your disk drive sothat nothing can be read. - 6 -(Physical Security - continued)Vibration, too, is a source of problems, especially for drives. The readheads actually float over the surface of drives, not on them the way arecord player needle does, and the space tolerance between is measured inAngstroms (metric version of microinches). Vibration can cause the headto hit the drive, and you can say goodbye to whatever was written there.If you're in a particularly sensitive field, and your information is whatmight be called top secret to your company, you might also want to lookat two protection devices: one is encryption, and the other is Tempesthardware or shielding. Encryption involves translating your data usingalgorithms to something unreadable, and de-coding it when you need it. Ituses a "key" to choose the algorithm - dont' lose the key! It comes in afew forms: software controlled encryption, hardware based encryption, ora combination of the two. Most encryptors work with standard algorithms,but defense departments and other high-security installations preferrandom algorithms. Tempest hardware, or shielding, protects againstsniffing of signals. ( Signal emanation surveillance is called"sniffing.") I don't have a computer here to demonstrate this, but ifyou take an old battery-operated transistor radio and set the dial to thebottom of the AM band around 520, try passing it within a foot of yourcomputer. Your ear might not pick up the individual signals, but I assureyou there's equipment that does. That's why the US Army was blasting rockmusic around the Vatican Embassy when Noriega was there - to mask signals.More important to the average user, though, is avoidance of electro-magnetic fields (such as ringing phones near a disk or disk drive), andhaving an automatic disk head 'parker' that moves the heads to a safe zoneevery few seconds. That way, something like a brief power failure is lesslikely to cause a "head crash" on the disk.Simple visibility of information is a risk. Recently I went to a bankwith a court order in hand to give me access to an account. The clerksimply turned the terminal toward me and, if I'd wanted to bother, I couldhave had the account numbers of two other people with identical names. There is screen saving software that will blank your screen after aninactivity duration you choose, and personnel should be made consciousthat unauthorized viewing of information is a security risk. And watchwhat your staff throw out on paper, too.When it comes to fire and water, there are two basic rules that everyonecan follow: first, don't smoke around the PC, and second, don't feed thePC coffee and donuts. You might be able to save a keyboard or some partswith a bath in distilled water, possibly followed by drying with a warmhair dryer, but there's no guarantee. I prefer pure isopropyl alcohol -without the hairdryer so I don't get fried in the process. Don't blast acomputer with a fire extinguisher if you can avoid it. If you do have afire or a flood, though, you'd better have a tested disaster recoveryplan, and your backups stored off-site.All of these issues are reasonably within your control: fraud, theft,disgruntled employees, practical jokers, fumble fingers, software copyingand physical security, at least as much as the infamous viruses that arearound, but let's take a look at why you're at risk. - 7 -4. REASONS FOR EXPOSUREConcentration of data in one placeInstantaneous adjustmentAlteration without a traceLack of visible recordsComplexity of the systemNetworkingTechnical persons can befuddleGeneral ignorance by non-techie and managementDetection problemsLack of trainingSecurity checks in programs not specifiedSystems not documentedLimited staff resource for programming/managementNo separation of dutiesPossibility of enormous losses remaining undetectedReluctance to report - Embarrassment Lack of sufficient evidence to prosecute Cost to prosecute outweighs recovery Company policy ("Press would have a field day") - 8 -5. GENERAL SECURITY RULES (All Systems, big and small)Disaster Recovery } Backup Backup Backup Plan } Restore (test it to make sure it works)Store your backup off-site (not in your car!)Physical security Password for access control (don't stick your password on the front of your machine!)Access to menu only - not to system control levelReasonableness testsBalance checks (rounding: up, down, (out?); cross-calculationsAudit trails - all records (terminal i.d., user i.d., date and time stamping, history record retention)Fall-through coding (if it doesn't meet a condition, does it go to limbo)Payroll/Accounts payable: don't pay the same # twiceFault tolerance level supported (user friendly/hostile - balance between fault tolerance & productivity)Call back or no answer on dial-up systemsUPS (Uninterrupted Power Supply, or allowance for graceful degradation) - or at least an automatic head parkerLogical view rights (your user 'privileges' allows access only to the data you need to see, e.g., accounting clerks don't need to see production formulae)Multi-user environment: protection against deadly embraceAutomatic logoff on inactivity timer / Screen saverPolicy statement re purchasing/use/theft/illegal software, etc.Encryption (?) - don't lose the key!Shielding ("Tempest" hardware for secure systems)Educate users - 9 -6. VIRUSESAs in medicine, a virus needs an 'organism' to which it may attach itself,and a virus is 'contagious'. In the case of computers, a virus is usually a destructive piece of codewhich attaches to a working program, such as your word processor,spreadsheet or CAD/CAM software. Viruses are usually written to detectany load of a computer file that has an extension of .EXE, .COM, .OVL,.BIN - such extensions representing executable programs. Often, thevirus loads itself into memory, then loads the program you just called, sothe virus is sitting at the front. Then when you exit the program, thevirus code calls for the re-writing of the program back onto the disk -with the virus still sitting at the front. Other viruses simply gostraight into your boot sector, so they get loaded every time you turn onyour machine. Some do both. However they 'hide', and whatever they attach to, they got to your machineon an infected diskette. If you are infected and then copy your softwareto use on another machine, guess what happens? Right! That's where the'contagious' element comes in.In 1989, more viruses were discovered than in all previous years. Therewere over 110 at the end of the year, and 7 were discovered in Decemberalone. Sources have been from as far away as Pakistan and Bulgaria.Only .004% have reported infections, but most are not reported. Considerthis: if only 1% were infected, that would be 1/2 million units in theU.S. alone. At a cost ranging from $300 to $3,000 per unit to recover,the problem starts to impact the economy as well as the productivity ofstaff at your organization. It cost one Texas company US$10M to shutdown their 3,000-unit network for 4 days to find 35 infected units.One of the major problems with viruses is that 90% of the users whorecover are re-infected within 30 days. One person at my organizationwas re-infected 7 times in 2 months! Most reinfections occur for one oftwo reasons (not necessarily in this order): your back-up was infected,or it was a virus that hid in the boot sector on track 0, and track 0 isnot re-written by the standard "FORMAT" command (only a low-level formatwill get rid of a track 0 virus). Be careful of some new software aswell: there has been more than one instance of shrink-wrapped softwarebeing infected (software companies have disgruntled employees, too, itseems).6.1 HISTORY1959 - Scientific American article about 'worms'1963 - caught my first two frauds (Payroll & Accounts Payable)1970 - Palo Alto lab - worm which directed activities1982 - Anonymous Apple II worm1984 - Scientific American CoreWare Series: held contest to find the most clever/difficult to detect 'bug'1987 - Apparent change from intellectual exercise to dangerous activity. - 10 -6.2 EFFECTMassive destruction: Reformatting Programs erased Data file(s) modified/erasedPartial/Selective destruction: Modification of data/disk space File allocation tables altered Bad sectors created If match with event, alter or deleteRandom havoc: Altering keystroke values Directories wiped out Disk assignments modified Data written to wrong diskAnnoyance: Message Execution of RAM resident programs suppressed System suspension6.3 WHY DO PEOPLE DO IT?Financial gainPublicityIntellectual exerciseTerrorism/Fanaticism/VandalismRevengeJust plain wierd6.4 SYMPTOMSChange in file size (Usually on .COM, .EXE .OVL, .BIN, .SYS or .BAT files)Change in update time or dateCommon update time or dateDecrease in available disk or memory spaceUnexpected disk accessPrinting and access problemsUnexpected system crashes - 11 -6.5 CONCERNSVariety: Virus vs Bug vs Worm vs Trojan Horse vs Superzapper vs Trap Doors vs Piggybacking vs Impersonation vs Wiretapping vs EmulationStrains / Complexity / Growing SophisticationBulletin board use and free softwareLargest threats from taking computer work homeKids using same machine at homeNetworked mainframe systemsTravel/airline computers (AA wiped out early 1989)Work message systems (E-Mail)POS terminalsBanking / Credit Cards / Money MachinesIncome Tax recordsHealth records ************************************************************** * Global disaster may be on the way * * No specific laws to deal with malicious programming * * No single national centre to gather data on infections * **************************************************************6.6 KNOWN VIRUS SOFTWARE12 viruses (and their strains) account for 90% of all PC infections: _ |_| Pakistani Brain |_| Jerusalem |_| Alameda |_| Cascade (1701/1704) |_| Ping Pong |_| Stoned |_| Lehigh |_| Den Zuk |_| Datacrime (1280/1168) |_| Fu Manchu |_| Vienna (DOS 62) |_| April First - 12 -6.7 QUICK GUIDE TO VIRUS NAMES (Cross referenced)Name Synonym-1 Synonym-2 Synonym-3 Synonym-41168 Datacrime-B1184 Datacrime II1280 Datacrime Columbus Day October 12th Friday 13th1536 Zero Bug1701/1704 Cascade Falling Letters Falling Tears Autumn Leaves1704 Cascade1704 Cascade-B1704 Cascade-C1704 Cascade-D1704 Format 1704 Blackjack Falling Letters1704 Blackjack 1704 Format Falling Letters1808 Jerusalem Black Box/Hole Israeli PLO 1808/18131813 Jerusalem Black Box/Hole Israeli PLO 1808/18132086 Fu Manchu29303066 Traceback3551 Syslock3555123nhalf405500 Virus Golden Gate512 Virus Friday 13th COM virus648 Vienna DOS 62 DOS 68 AustrianAIDS VGA2CGA TauntAIDS Info DiskAlabamaAlameda Virus Yale Merritt Peking SeoulAlameda-B Sacramento Yale CAlameda-CAmstradAntiApple II GS LodeRunnerApril 1st SURIV01 SURIV02April 1st-BAsharAustrian 648 Vienna DOS 62 DOS 68Australian Stoned New Zealand MarijuanaAutumn Leaves Cascade 1701/1704 Falling Letters Falling TearsBasit virus Brain Pakistani Brain LehoreBlack Box Jerusalem Israeli Black Hole 1808/1803 PLOBlack Hole Jerusalem Black Box Israeli 1808/1813 PLOBlack Hole RussianBlackjack 1704 1704 Format Falling LettersBouncing Ball Vera Cruz Ping Pong Bouncing Dot Italian virusBouncing Dot Italian virus Bouncing Ball Vera Cruz Ping PongBrain-B Brain-HD Harddisk Brain Houston virusBrain-CBrain-HD Harddisk Brain Houston virus Brain-B - 13 -Brain Pakistani Brain Basit virus LehoreCascade 1701/1704 Falling Letters Falling Tears Autumn LeavesCascade(-B-C-D) 1704Century Oregon Jan.1, 2000Century-BChromaCloneClone-BColumbus Day 1280/Datacrime October 12th Friday 13thCOM virus 512 virus Friday 13thCOM-B Friday 13th-BCOM-C Friday 13th-CCookie virus Sesame StreetDark AvengerDatacrime 1280Datacrime-B 1168Datacrime-II 1184dBASE virusDen Zuk Search VenezuelanDisk Killer OgreDo-Nothing (don't believe it!)DOS-62 Vienna DOS-68 648 AustrianDOS-68 Vienna DOS-62 648 AustrianDOS-62 UNESCODOS-62-BFalling Tears Cascade 1701/1704 Falling Letters Autumn LeavesFalling Letters 1704 Blackjack 1704 FormatFalling Letters Cascade 1701/1704 Falling Tears Autumn LeavesFalling Letters-Boot Ping Pong BFat 12 Swap Israeli BootFluShot4 (a corrupted version of a virus detector - use FluShot4+)Friday 13th 1280/Datacrime Columbus Day October 12th COMFriday 13th-B COM-B 512 Friday 13th-C COM-CFumble TypeFu Manchu 2086 Ghost-BootGhost-COMGolden Gate 500 VirusGolden Gate -BGolden Gate-C MazatlanGolden Gate-DHarddisk Brain Brain-B Brain-HD Houston virusHolland Girl SylviaHouston virus Brain-B Brain-HD Harddisk BrainIcelandic Disk-Crunching-virus Saratoga 2Icelandic 1 Saratoga 1Icelandic 2 System virusINIT29IRQ v. 41Israeli Friday13 Jerusalem Black Box/Hole 1808/1813 PLOIsraeli Boot Swap Fat 12 - 14 -Italian virus Bouncing Ball Vera Cruz Ping Pong Bouncing DotJan.1, 2000 Century OregonJerusalem Israeli Black Box/Hole 1808/1813 PLO Friday 13thJerusalem-B New JerusalemJerusalem-CJerusalem-DJerusalem-EJorkKeyLehighLehigh-2Lehore Brain Pakistani Brain BasitLisbonLodeRunner Apple II GSMacMag Peace virusMadonna (while the nice music plays, your hard disk is being destroyed)MailsonMarijuana New Zealand StonedMazatlan Golden Gate-CMerritt Alameda virus Yale Peking SeoulMix1Music virus Oropax virusNew Jerusalem Jerusalem-CNew Zealand Stoned Marijuana AustralianNew Zealand-B Stoned-BNew Zealand-C Stoned-CnVIROctober 12th 1280/Datacrime Columbus Day Friday 13thOhioOgre Disk KillerOregon CenturyOropax virus Music virusPakistani Brain Lehore Basit BrainPalette Zero BugPaydayPeace Virus MacMagPearsonPeking Alameda virus Yale Merritt SeoulPentagonPing Pong Bouncing Dot Italian virus Bouncing Ball Vera CruzPing Pong-B Falling Letters-BootPLO Jerusalem Friday 13th 1808/1813 IsraeliRussian Black HoleSacramento Alameda-B Yale CSaratoga 1 Icelandic 1Saratoga 2 Icelandic Disk-Crunching-virusScoresSearch Den Zuk VenezuelanSeoul Alameda virus Yale Merritt PekingSesame Street Cookie virusSF virusShoe virus UIUC virus (see also Terse Shoe) - 15 -Shoe virus-BStoned New Zealand Marijuana AustralianStoned-B New Zealand-BStoned-C New Zealand-CSUMDOSSundaySRI (destroys anti-viral programs before it damages your system)SURIV01 April 1stSURIV02 April 1stSURIV03Swap Israeli Boot Fat 12Sylvia Holland GirlSYSSyslock 3551System virus Icelandic 2Taunt AIDS VGA2CGATerse Shoe (see also Shoe virus)TP04VIR VacsinaTP25VIR Yankee DoodleTP33VIR Yankee DoodleTP34VIR Yankee DoodleTP38VIR Yankee DoodleTP42VIR Yankee DoodleTP44VIR Yankee DoodleTP46VIR Yankee DoodleTraceback 3066Typo (boot)Typo (COM) FumbleUIUC virus Shoe virusUNESCO DOS-62Venezuelan Den Zuk SearchVera Cruz Ping Pong Bouncing Dot Italian Virus Bouncing BallVacsina TP04VIRVGA2CGA AIDS TauntVienna DOS-62 DOS-68 648 AustrianVienna-BYale Alameda virus Merritt Peking SeoulYale C Alameda-B SacramentoYankee Doodle TP25VIRYankee Doodle TP33VIRYankee Doodle TP34VIRYankee Doodle TP38VIRYankee Doodle TP42VIRYankee Doodle TP44VIRYankee Doodle TP46VIRZero Bug 1536 - 16 -6.8 TABLE OF VIRUS EFFECTS (by virus name)This information is a reformatted version of that which was madeavailable to the writer by the National Computer Security Association,Suite 309, 4401-A Connecticut Ave. NW, Washington, D.C., 20008.This list is not as complete as the list of names preceding. Sinceviruses must be created and caught before they can be analyzed for thetype of information that follows, this list will never be as complete asthe list of names. In some instances, you may have been infected with avariation of the name. You might wish to check this list for allpossible variations of a name you've found on the list of synonyms.Explanation of codes used under "What it does", and analysis of frequencyof occurrence of each effect: EFFECT # OCCURRENCES % ------ - ----------- -1. Virus uses self-encryption 13 122. Virus remains resident 83 743. Infects COMMAND.COM 8 74. Infects .COM files 62 555. Infects .EXE files 41 376. Infects .OVL files 15 137. Infects floppy disk boot sector 36 328. Infects hard disk boot sector 14 139. Infects partition table 1 110. Corrupts or overwrites boot sector 31 2811. Affects system run-time operation 53 4712. Corrupts program or overlay files 57 5113. Corrupts data files 4 414. Formats or erases all/part of the disk 17 1515. Corrupts file linkage (FAT) 9 816. Overwrites program 4 417. Mac virus (as opposed to PC virus) 2 2 Increase in DisinfectorVIRUS NAME Prog'm size that works What it does---------- ----------- ----------- ------------1168/Datacrime B 1168 SCAN/D 1, 4, 12, 141184/Datacrime 2 1184 1, 4, 5, 12, 14123nhalf 3907 2, 5, 11, 131280/Datacrime 1280 SCAN/D 1, 4, 12, 141514/Datacrime II 1514 SCAN/D 1, 4, 5, 12, 141536/Zero Bug 1536 SCAN/D 2, 4, 11, 121701/Cascade 1701 M-1704 1, 2, 4, 11, 121704/Format 1704 M-1704 1, 2, 4, 11, 12, 141704/Cascade 1704 M-1704 1, 2, 4, 11, 121704/Cascade-B 1704 M-1704 1, 2, 4, 11, 121704/Cascade-C 1704 1, 2, 4, 11, 121704/Cascade-D 1704 1, 2, 4, 11, 122930 2930 SCAN/D 2, 4, 5, 12 - 17 -3066/Traceback 3066 M-3066 2, 4, 5, 123551/Syslock 3551 SCAN/D 1, 4, 5, 12, 133555 3555 1, 3, 4405 SCAN/D 4, 16AIDS SCAN/D 4, 16AIDS Info Disk 0 AIDSOUT 11Alabama 1560 SCAN/D 2, 5, 11, 12, 15Alameda-B 2, 7, 10Alameda-C 2, 7, 10Alameda/Yale MDISK 2, 7, 10Amstrad 847 SCAN/D 4, 12April 1st 2, 4, 11April 1st-B 2, 5, 11Ashar MDISK 2, 7, 10Black Hole 1808 2, 4, 5, 6, 11, 12, 15Brain-B 2, 7, 8, 10Brain-C 2, 7, 8, 10Century 2, 4, 5, 6, 11, 12, 14, 15Century-B 2, 4, 5, 6, 11, 12, 14, 15Clone-B 2, 7, 10, 15Clone virus 2, 7, 8, 10dBASE 1864 SCAN/D 2, 4, 11, 12, 13DOS-62-B 3, 4, 11DOS-62-UNESCO 650 3, 4, 11Dark Avenger 1800 M-DAV 2, 3, 4, 5, 6, 11, 12, 15Datacrime II-B 1917 SCAN/D 1, 3, 4, 5, 12, 14Disk Killer MDISK 2, 7, 8, 10, 11, 12, 13, 14Do-Nothing 608 SCAN/D 4, 12Fri 13th COM 512 SCAN/D 4, 12Fri 13th COM-B 512 4, 12Fri 13th COM-C 512 4, 12Fu Manchu 2086 SCAN/D 2, 4, 5, 6, 11, 12Ghost-Boot ver. MDISK 2, 7, 8, 10, 11Ghost-COM ver. 2351 SCAN/D 4, 10, 12Golden Gate 2, 7, 10, 14Golden Gate-B 2, 7, 10, 14Golden Gate-C 2, 7, 10, 14Golden Gate-D 2, 7, 10, 14IRQ v. 41 4, 5, 11Icelandic I 642 SCAN/D 2, 5, 11, 12Icelandic II 661 SCAN/D 2, 5, 11, 12Italian/Ping Pong MDISK 2, 7, 10, 11Italian-B MDISK 2, 7, 8, 10, 11Jerusalem 1808 SCAN/D/A 2, 4, 5, 6, 11, 12Jerusalem-B 1808 M-JERUSLM 2, 4, 5, 6, 11, 12Jerusalem-C 1808 2, 4, 5, 6, 11, 12Jerusalem-D 1808 2, 4, 5, 6, 11, 12Jerusalem-E 1808 2, 4, 5, 6, 11, 12, 15Jork 2, 7, 10Lehigh SCAN/D 2, 3, 12, 14, 16Lehigh-2 2, 3, 12, 14, 15, 16Lisbon 648 SCAN/D 4, 12 - 18 -MIX1 1618 SCAN/D 2, 5, 11, 12New Jerusalem 1808 M-JERUSLM 2, 4, 5, 6, 11, 12New Zealand MD 7New Zealand-B 7, 8New Zealand-C 7, 8nVIR 11, 17Ohio MDISK 2, 7, 10Oropax 2, 4Pakistani Brain MDISK 2, 7, 10Palette/Zero Bug 1536 2, 3, 4,Payday 1808 M-JERUSLM 2, 4, 5, 6, 12Pentagon MDISK 7, 10SF Virus 2, 7, 11, 14SRI 1808 2, 4, 5, 6, 11, 12SURIV01 897 SCAN/D 2, 4, 11, 12SURIV02 1488 SCAN/D 2, 5, 11, 12SURIV03 SCAN/D 2, 4, 5, 6, 11, 12SYS 2, 7, 8, 11, 12SYS-B 2, 7, 8, 11, 12SYS-C 2, 7, 8, 11, 12Saratoga 632 SCAN/D 2, 5, 11, 12Saratoga-2 2, 5, 11, 12Scores 11, 17Search HD 2, 7, 8, 10, 11Search-B 2, 7, 10, 11Search/Den Zuk MDISK 2, 7, 10, 11Shoe virus 2, 7, 8, 10Shoe virus-B 2, 7, 10Stoned/Marijuana MDISK/P 2, 7, 9, 10, 11, 15SumDOS 1500 4, 5, 14Sunday 1636 SCAN/D 2, 4, 5, 6, 11, 12Swap/Israeli Boot MDISK 2, 7, 10Sylvia/Holland 1332 SCAN/D 2, 4, 12Terse Shoe virus 2, 7, 10Typo (Boot) MDISK 2, 7, 8, 10, 11Typo/Fumble (COM) 867 SCAN/D 2, 4, 11, 12Vacsina/TP04VIR 2, 4, 5Vienna-B 648 SCAN/D 2, 4, 5, 12Vienna/648 648 M-VIENNA 4, 12Yankee Doodle 2855 SCAN/D 2, 4, 5, 11, 12Yankee Doodle/TP25VIR 2, 4, 5Yankee Doodle/TP33VIR 2, 4, 5Yankee Doodle/TP34VIR 2, 4, 5Yankee Doodle/TP38VIR 2, 4, 5Yankee Doodle/TP42VIR 2, 4, 5Yankee Doodle/TP44VIR 2, 4, 5Yankee Doodle/TP46VIR 2, 4, 5 - 19 -6.9 VIRUS DETECTOR AND ANTIDOTE SOFTWARE *** None offer complete protection ***Some do NOT test for boot sector viruses, modification of the commandinterpreter, branching into the BIOS, etc., unconventional things thatnasty viruses are known to do. This is not a comprehensive list, butyou'll have an idea of what's available, either commercially or throughpublic domain. Look for a product that will detect as many of theeffects identified in the previous section as possible. Warning: somehighly publicized virus detectors only search for ONE (1) virus! Othersare more sophisticated, and may even act as a disinfector as well as adetector.Old virus symptoms vs file changesAntidoteAntigenBombsqadCanaryCylene-4C-4Disk Defender * recommended (add-on board - write-protects hard disk)Disk watcherDr. Panda UtilitiesIBM - COMPare in DOSMace vaccineMagic BulletsSyringeSentry * recommended for systems booted regularlyVaccineViraidVirus-Pro * recommended for large corporate environmentsShareware: Novirus Flushot4+ Virusck ViruscanPlus what's shown on preceding pages as a "Disinfector that works". Ialso have a list of over 100 shareware products that do everything fromdetect and/or disinfect to write-protecting the hard drive and requiringpassword access .... but my fingers are getting tired from typing at thispoint, and there are more important things to cover - after all, ifyou're careful, you won't need a list of detectors/disinfectors. - 20 -6.10 TROJAN HORSESWhile a "virus" is something hidden within another program that iswaiting to make your system really sick, and a "worm" may be somethingthat lives on its own and usually transmits through networked computers, a "Trojan Horse" is a little of both, so I've included it with this virussection if only to warn you of its existence. It lives on its own as aprogram, and will bring you down like Helen of Troy's soldiers. "Iwouldn't copy something like that," you say. Well, like Helen's horse,it comes disguised. It will purport to do something really neat, likecompress files (so you have more disk space available), sort yourdirectories (so you can find things more easily), or play chess oranother game with you. In actuality, it's really just waiting to do thethings that viruses do - trash your files, scramble your boot sector, fryyour FAT, or erase your hard disk. It doesn't usually do anything itpromises to do.The following are just a few examples of the known Trojan Horses, mostof which come from bulletin boards. Please don't misunderstand me, mostBB operators are honest people who are trying to help the computerindustry as a whole, but they can't be held responsible for the peoplewho might dial into their BB and leave a disaster waiting until the nextcaller(s).SCRNSAVE.COM: This is supposed to blank your screen after x seconds of inactivity, thus preventing image burn-in or apparently offering a sense of security; say goodbye to your files while it erases your harddisk.TSRMAP: For the 'sophisticated' user who uses Terminate and Stay Resident programs, it's sometimes handy to have a map of where these programs are loaded in memory, and be able to delete some if you're short of memory; hopefully this same 'sophisticated' user has a copy of track 0, because his was just sent to heaven ..... or elsewhere.DOS-HELP: Sounds great, doesn't it? This TSR program is supposed to give on-line help on DOS commands. Your hard disk was just formatted.ULTIMATE.EXE: This is supposed to be a DOS shell (if you've used Directory Scanner or some other software that allows you to move around directories and load programs easily, or even a menu system, then you know what a DOS shell is). While the "Loading..." message shows on your screen, the FAT (file allocation table) of your hard disk went to the trash bin.BARDTALE.ZIP This purports to be a commercial game from Electronic Arts (BARDTALE I) Someone reverse engineered this program, and wrote in a routine to format your hard disk upon invocation. - 21 -COMPRESS.ARC This is dated April 1 1987, is executed from a file named RUN-ME.BAT, and is advertised as "shareware from Borland" (Borland is a highly reputable company). It will not compress your files, but it will very competently destroy your FAT table.DANCERS.BAS You'll actually see some animated dancers in colour - while your FAT is being tromped on.DEFENDER.ARC Think you're going to get a copy of Atari's DEFENDER for nothing, huh? There's still no such thing as a free lunch, and this one will be particularly expensive: it not only formats your hard disk, but it writes itself to your ROM BIOS - the chip that holds the Basic Input Output System for your machine. Get your wallet out.SIDEWAYS.COM The good "SIDEWAYS.EXE" is about 30Kb, while this version is about 3Kb. The really big difference, though, is what happens to your hard drive - it's spun off into oblivion.These are only a few of the 70 or so Trojans I have listed at work, butI'm sure you've got the idea. These programs (a) stand alone, (b) oftenclaim to do something useful, (c) may be hacked versions of goodsoftware, (d) may be named the same as good software, (e) may send youback to using a quill pen. - 22 -7. PC RULES OF THUMB (Additional to Basic Rules of Thumb)Run virus check BEFORE backupBoot floppy systems from known, protected disks onlyNever work with masters - first make copies on a trusted machineStore data on floppy: set path in autoexec.bat, but load from A: to ensure data goes to floppySave your data periodically while workingUse write protect tabsUse write protect software on hard disk / backup track 0Never boot HD systems from floppies (unless known and protected)New/repaired hard disk? - run a virus detectorUse protection package (practice safe hex)Avoid shareware / BB demos if you use a BB, set path to A: beforehand, download only to A:, poweroff immediately after, then powerup and do a virus scan on the floppy; always scan sharewareKnow the source of your softwareDon't use illegal copiesIf your data is truly confidential, don't depend on DELETE - you must use, e.g., WipefileAutopark softwareHardcards - 23 -6. A FEW EASY TRICKS FOR PC SECURITY1. Set Read only attributes on all files ending with .COM, .EXE, .SYS, . OVL, .BIN, .BAT e.g.: ATTRIB +R *.SYS2. Use an undocumented trick in DOS of naming your data files ending with an ASCII blank or NUL character (ASCII 32 or 255): *** e.g.: COPY A:OLDFILE.TXT NEWFILECHR$(255).TXT or REN A:MYFILE.DAT MYFILECHR$(32).DAT *** Newer versions of DOS will give the ASCII blank or null by holding the [Alt] key and striking the numeric keypad numbers; e.g. COPY A:OLDFILE.TXT NEWFILE[Alt]2553. Prevent inadvertent formatting of the hard disk: Rename FORMAT.EXE to (e.g.) DANGER.EXE Write a 1-line batch file called FORMAT.BAT: DANGER A: %1 %2 %3 %4 %5 %64. Have a batch program as a shutdown routine, to run: 1. Virus Check 2. Copy Track 0 3. Back up your data files 4. Park the heads - 24 -9. SO YOU'RE INFECTEDTerminate all connections with other computersRecord your last activitiesDetermine the nature and extent of the damageNotify other usersContact the source of the carrier software_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Back up data files to new diskettesErase infected disk (using high or low level format - low level is preferred to re-write track 0)Check master disks with detection program(s)Restore system filesRestore data filesRun detection program(s) againBe careful in future - think like a thief! ------------------ - 25 -10. SUMMARY: WHAT CAN YOU DO?There are many aspects to computer security, none of which are totallywithin your control, but all of which are reasonably within your control. One of the major methods of getting control is to establish anenforceable security policy AND a disaster recovery plan. However, it'salmost impossible to establish a plan unless you first know what therisks are.WHEN YOU GO BACK TO YOUR OFFICETry putting some staff into two teams: "hackers" and "police" (or callthem Blue Jays and Cardinals if you find that offensive). The role ofthe hackers is to try to dream up all the things they could get from ordo to the company (or to a department) by breaking computer security. The role of the police is to respond with defenses. Then switch roles.List all the ideas, no matter how "far out" they seem, then use this forthe basis of risk analysis and disaster recovery planning. The only ruleto this game is that no idea is initially rejected.Now that you have some idea of the value of your data and the risks it isunder, you can begin to work on a "Computer Security Policy" and a"Disaster Recovery Plan." While many suggestions have been made on theprevious pages, recognize that not all risks/solutions apply to allorganizations: you have to make some judgement calls based on yourassessment of the risk. The judgement is based on how much loss you can comfortably sustain, yet remain in business. The level of securityprotection you require may not always be the same. It may vary with thevalue of the hardware, software or data under consideration; thesecurity level, therefore, might be stated as "minimal," "discretionary,""mandatory," or "verified." The point is, as long as it's beenconsidered, you're closer to having a good security system than if youhave no policy or a policy that's based on guesswork.You may find, after working on this for a while, that you may wish todevelop a separate policy for the selection or development, change,testing and implementation of software. This might be stated as simplyas, "No system shall be acquired, developed, changed or implementedwithout the prior approval of the Systems Steering Group." This mightalso go on to cover documentation; e.g., "Documentation must be completefor all systems prior to implementation, and must include sections onfiles used, access controls, security considerations and controls(etc.)."Some further points for consideration are included in the next section. - 26 -11. COMPUTER SECURITY POLICY: POINTS FOR CONSIDERATIONAny policy on computer security must be based on the premise thatinformation is a valuable asset of the company, just like its premises,equipment, raw materials, inventory and so on. More than one company hasgone under because they lost their accounts receivable data in a fire,flood, or from a simple hard disk failure. The value of your data shouldbe subjected to a risk analysis, and all identifiable risks assessed. Itis not until you identify the risks that you can plan for a disasterrecovery.Your policy might include some of the many things addressed previously inthis paper: e.g., storing data only on removable media (diskettes ortapes), limiting access to bulletin boards, establishing passwordcontrols, rules on physical security, use of immunization software, etc. There are, however, some other specific points not previously discussed:RESPONSIBILITYRecognize that security is a management issue, not a technologicalissue, and that setting policy is the responsibility of seniormanagement. They must be 'on board' and understand why a security policyis needed to make it sensible and effective, and they must give overtsupport.Someone should be in charge of computer and network security. Withoutsomeone in charge, important security tasks may not get done. The dutiesof the security manager would include responsibility for limiting accessto the network, securing the information that passes over it, overseeingpassword systems, and installing security packages that protect computersfrom illegal tampering once a user is on the network. Other duties mightinclude analyzing the network for security weaknesses and helping usersunderstand the security strengths and weaknesses of the network.The amount of time required of the system security specialist may dependon the size of the organization, and on the number and complexity of thesystems in use or planned.Having one person in charge is probably the ideal security arrangement.The security specialist can become aware of all of the issues affectingcomputer/network security, can schedule and establish priority foractions, and can ensure that the actions are taken.This position in the organization requires some authority and autonomy. For instance, security is compromised if the boss shares his/herpassword. The security specialist needs to be able to change the boss'spassword if this happens, and gently but firmly discuss the problemswhich could result. In many organizations, putting two or more people in charge of somethingdiffuses responsibility. Each can think that some security concern wasthe responsibility of the other. If two individuals are charged withnetwork security, be certain that they work well together, communicate - 27 -well, and will each put in their fair share of the analysis and work thatis required for security.In some organizations, a "communications manager" is responsible forlimiting access to the network (with dialback modems and encryptiondevices), while the network manager maintains password systems andinstalls security software. If someone is in charge of network security and you don't know about it,then they haven't been very obvious about it. They need not be. But ifit is evident to you that security is lacking, then perhaps the issue ofresponsibility should be examined (or re-examined).BACKUPSThose who are most zealous about backups are those who've been affectedin the past by a loss of data. If backups are performed every day, yourcomputer or network is probably in good shape when the hard disk or fileserver goes to heaven. You will want to verify that this is the case,since most organizations (and individuals) put this off... and off...until it's too late.Backing a system up once a week is not enough, unless the system israrely used. If your last backup was a week ago, and your hard disk orthe hard disk in the file server crashes, all users of the network havelost one week's work.This cost is enormous. If you have 10 users who have lost 30 hours ofwork each, if each user is paid $20/hour, and overhead is 100%, then youhave just lost 10 x 30 x 20 x 2 = $12,000. If you assume that backuptakes one $20 hour with a tape drive, you could back the system up 600times for $12,000. That's nearly three years, if backups are done fivetimes a week. Many hard disks will not run continuously for three years. Even if you're a 'stand alone' computer user, your time is valuable. Youmight consider a policy that, if recovery covers a period of more than'x' days, it must be done on the employee's own time, and all deadlinesmust be met - tough, but it get's the point across!Irregular backups are a sign that backup is not taken as seriously as itshould be. It is probably wisest to do the arithmetic, comparing thecosts of backup with the costs of losing work for multiple users. Thecost comparison in the commentary on the second answer doesn't evenconsider the possibility of losing irreplaceable files, such as thosecontaining new accounts receivable entries or new prospects.Since file backup is a "private" activity, not knowing how often itoccurs does not mean that it does not occur. But if you have a securityconcern, you should find out what the correct answer is. After all, ifyou use the network, and it is not backed up frequently, it is your workthat is lost when the hard disk in the server crashes. - 28 -BEWARE: backing up is NOT enough! You MUST periodically run yourrecovery procedure .... how else will you know it will work when you needit most?PURCHASINGThe policy should state the controls in place for purchase of bothhardware and software, and it should be consistent and centralized. Unless you've seen what some software can do to destroy security, or howdifficult it is to interconnect different equipment, this might seem todestroy some autonomous activities in your organization. Autonomy bedarned, it's the company that's paying the bill.MAINTENANCE AGREEMENTSAll warranty registrations must be mailed to the manufacturer, andrecords kept of purchase dates, expiry dates and repairs made under thewarranty. Keeping accurate records has substantiated the completereplacement of more than one machine.SOFTWARE LOADINGThe checking, copying and loading of software should be theresponsibility of one person or department. The 'penalty' for loadingillegal/unauthorized software can range from a note in the personnel fileto dismissal, depending on the organization. The opposite, copying theorganization's software for loading in another location, should also becovered in the policy, because the company (as the registered owner)could be party to a lawsuit without the ability to plead ignorance.EMPLOYMENT TERMINATIONIn several organizations, when a person submits their resignation, theiraccess to the computer system is immediately withdrawn. This, of course,requires a close liaison with the personnel department in largeorganizations. Many of these companies feel it's worth the salary costto have the person leave the premises immediately (escorted), and simplypay out their notice period. If your company adopts such a policy, itshould be made very clear that it is not an indication of trust in theperson, but simply a means to reduce risk to the valuable resources ofhardware, software and data. It must be administered consistently andequitably to avoid problems. There are problems with such a policy,not the least of which could be someone who gives a very lengthy noticeperiod simply because they're aware of the policy - but you couldtransfer them to a clerical job for the interim (like the mail room) orto maintenance staff (washroom detail).- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 29 -12. TO RUN SCAN (Virus detection software included on this diskette)SCAN looks for 42 viruses in software files, but not in data files. Iknow it works on Jerusalem-B because I used SCAN to detect that virus ona machine at work. This is NOT the latest version of SCAN, but thenagain, you're not likely to have the latest viruses (I hope).If you want to print the documentation, type: COPY A:SCAN.DOC PRNIf you want to run SCAN, just type: A:SCAN [drive identifier] e.g., A:SCAN C:An article from the Washington Post, January 14, 1990, on ComputerViruses was added to the diskette after this paper was written. To read this article, key TYPE A:ARTICLE|MORE To print the article, key COPY A:ARTICLE PRN- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -If you have found this presentation useful, either by attending or byreading or using the information on this diskette, then I am rewarded. If you found it useful, please feel free to copy this diskette or itscontents and share it with others - I would ask that you don't changeanything, though. (It was virus free at the time I made the originaldiskette - but if you trust that statement, you might just have made yourfirst mistake.) If you'd like to make suggestions that would improve the information onthis diskette, I would be very happy to hear from you. I'd also like tohear from you if you wish to discuss security issues, get a virusinfection or hit by a Trojan Horse, or even just to comment on thecontents of this paper. My address and phone number are on the firstpage of this document.If you would like to join the National Computer Security Association, a'form' for application is on the next page. They provide benefits suchas a Virus Self-Defense Kit that's more sophisticated than the softwareon this diskette, newsletters, a virus-free bulletin board with hundredsof security-related programs, discounts on software, books andconferences, and advice if you run into trouble.Happy (and safe) computing! E. A. (Liz) BedwellNational Computer AssociationSuite 3094401-A Connecticut Ave. NWWashington, DCUSA 20008 Phone: (202) 364-8252[ ] I wish to join NCSA. Cheque enclosed for $45.00 (US funds)[ ] I wish to join NCSA. Please bill me for $45.00 (US funds)Name: _____________________________________________________Organization: _____________________________________________________Address: _____________________________________________________ _____________________________________________________City, Prov.: ____________________________ Postal Code ____________Phone (with area code): ___________________________________________Title or Position, or interest in computer security: _____________________________________________________ _____________________________________________________.Downloaded From P-80 International Information Systems 304-744-2253


Read more...

Do you work in a corporate environment where you don't appreciate your co-workers or boss having access to your comp and private files when you are not around?


You can provide added level of security to your WINDOWS XP System. This is called securing your Windows XP accounts database. You can store all information related to your accounts in a encrypted form on a floppy disk. What this would do is that if You do not have access to your floppy disk, You can not access the system. I am not sure You realized what I just said ! Even if You know your userid/password, You will not be able to access the system unless and until You have this startup disk.

Do you work in a corporate environment where you don't appreciate your co-workers or boss having access to your comp and private files when you are not around?


You can provide added level of security to your WINDOWS XP System. This is called securing your Windows XP accounts database. You can store all information related to your accounts in a encrypted form on a floppy disk. What this would do is that if You do not have access to your floppy disk, You can not access the system. I am not sure You realized what I just said ! Even if You know your userid/password, You will not be able to access the system unless and until You have this startup disk.


The process of generating this secure startup floppy disk is simple. Go to START-RUN and type syskey. You will see a window come up. Click on Upgrade command button. You would see another window popping up which will give You the option of storing the encrypted accounts database either locally or on your floppy disk. Choose floppy disk and click OK and let the process complete. You are done.

Next time You reboot the computer and get to the logon prompt, make sure that You have the floppy disk available in A: drive else You can not log on.



Read more...

Note: These are just notes of the changes i made to win-xp pro using win-xp options
after my default install. These changes will not secure your box 100% but they
make a good couple of 1st steps. They are in no specific order other than the
order that I performed them. I have only spent a couple of hours working on
this operating system at the time of this text so please bare with me and
understand that there is much more to securing your box than this.

1. NTFS Partition.
2. Disable Error Reporting
3. Disable Automatic Updates (only if your XP copy is pirated)
4. Disable "Recent Documents" Viewed
5. Setup XP Firewall
6. Setup screensaver password
7. Setup BIOS password
8. Setup "AfterBios" login password
9. Account Modifications
-Rename Admin Account
-Disable Guest Account
-Disable Help_Assistant Account
-Disable Support Account
10. Install a virus scanner.
11. Change Login Screen (default shows usernames)
12. Disable Remote Registry (and other services)
13. Disable/Change Auto-Search settings in IE.



Note: These are just notes of the changes i made to win-xp pro using win-xp options
after my default install. These changes will not secure your box 100% but they
make a good couple of 1st steps. They are in no specific order other than the
order that I performed them. I have only spent a couple of hours working on
this operating system at the time of this text so please bare with me and
understand that there is much more to securing your box than this.

1. NTFS Partition.
2. Disable Error Reporting
3. Disable Automatic Updates (only if your XP copy is pirated)
4. Disable "Recent Documents" Viewed
5. Setup XP Firewall
6. Setup screensaver password
7. Setup BIOS password
8. Setup "AfterBios" login password
9. Account Modifications
-Rename Admin Account
-Disable Guest Account
-Disable Help_Assistant Account
-Disable Support Account
10. Install a virus scanner.
11. Change Login Screen (default shows usernames)
12. Disable Remote Registry (and other services)
13. Disable/Change Auto-Search settings in IE.


1. -----------------------------------------------------------------------------------------
NTFS Partition (I like being God over system users)
-----------------------------------------------------------------------------------------

Be sure to install XP onto an NTFS partition so that you (the admin) can take advantage
of file permissions. You want this option so that "you" can decide who reads, writes,
executes what files.

If you didnt install XP onto an NTFS partition. Convert It. To convert to NTFS follow
the instructions below.

Open a command prompt and type "convert c: /FT:NTFS /v"

This command will convert your c: partition from FAT to NTFS in verbose mode.

2. -----------------------------------------------------------------------------------------
Disable Error Reporting - we dont want microsoft to know everytime we fuck up.
especially if we didnt pay for winxp.
-----------------------------------------------------------------------------------------

control panel >> performance and maintenance >> system >> advanced >> error reporting
(disable all)

right click "my computer" >> manage >> services and applications >> services >> " stop
and disable" Error Reporting.

3. -----------------------------------------------------------------------------------------
Disable automatic updates - to update, they must know what we have. thats a NO NO!
-----------------------------------------------------------------------------------------

NOTE: DO THIS ONLY IF YOUR COPY OF XP IS PIRATED!! I suggest "auto update" if your copy
of XP is legal. If your copy is pirated then i suggest that you stay updated with
the latest fixes and patches manually.

control panel >> performance and maintenance >> system >> automatic updates
(disable updates)

right click "my computer" >> manage >> services and applications >> services >> " stop
and disable" Automatic Updates.

4. -----------------------------------------------------------------------------------------
Quit listing most recent documents opened under the start button - Dont want the
girlfriend or the parents to find that pr0n you being viewing.
-----------------------------------------------------------------------------------------

control panel >> appearance and themes >> task bar and start menu >> start menu >>
customize >> advanced

remove the checkmark next to "List my most recently opened documents".

5. -----------------------------------------------------------------------------------------
Block incoming traffic to your winxp box. - Before this change, i scanned my xp box and
found it to have many ports wide open. After this change, I found nothing and xp logged
the attempts in c:\windows\pfirewall.log.
-----------------------------------------------------------------------------------------

control panel >> network connections >> right click "local area connection" >> properties
>> advanced >> check the box under "Internet Connection Firewall" then choose "settings".

Services Tab - leave all unchecked unless there is a service you are running that people
must be able to access.

Logging Options - Log everything.

ICMP - I left all these unchecked for the time being. (allowing nothing)

(this does not protect you from "Spy Ware". This only stops traffic from coming into
your win-xp box (not all traffic). It does not stop traffic from going out.) If you
need to stop traffic from going out and need a more secure firewall then download a real
firewall like "zone alarm or black ice".

6. -----------------------------------------------------------------------------------------
Setting a screensaver password incase you leave some of that secret pr0n open when you
walk away.
-----------------------------------------------------------------------------------------
right click on the desktop >> properties >> screen saver >> check the box next to " On
Resume, Password Protect."

If you dont have a password set on your user account, you can do so in control panel >>
user accounts >> change account.

7. -----------------------------------------------------------------------------------------
Setting a BIOS password - We dont want anyone rebooting the computer or trying to sneak
into our pr0n while we are away at school or work.
-----------------------------------------------------------------------------------------

I cant explain to one how this is done due to the differences between all computers and
how the BIOS settings are entered. If you know what Im talking about then do it. If you
dont know what Im talking bout then learn how to do it. A screensaver password is useless
unless you setup a BIOS password.

8. ------------------------------------------------------------------------------------------
Setting up the "AfterBios" password. Sometimes bios passwords are easily cracked. This
password will add extra local login security incase your bios pass is crax0red. I dont
know bout you but i love having to type in 3 passwds and a username to login to my box.
------------------------------------------------------------------------------------------

Start >> run >> type "syskey" >> choose "update" >> choose "Password Startup" >> enter a
password and choose ok.

9. ------------------------------------------------------------------------------------------
Renaming and Disabling Accounts for adminstrator, guest, help_assistant and support.
------------------------------------------------------------------------------------------
Right click my_computer >> manage >> local users and groups

rename administrator account
disable guest account
disable help_assistant account
disable support account

10. -------------------------------------------------------------------------------------------
Install Virus Protection............. (We like our uncorrupted data and trojan free system)
-------------------------------------------------------------------------------------------

Install a virus scanner. Your firewall might protect your system from unwanted hackers but
what about an unwanted virus or trojan?. I recommend installing a virus scanner such as
"Nortons" or "McAfee".

11. -------------------------------------------------------------------------------------------
Change Default Login Screen............ (why do we want to share usernames with anyone?)
-------------------------------------------------------------------------------------------

Xp uses the "welcome screen" by default. This screen has the names of all accounts on the
system so that the user only has to click on their name and type a password. Come on now....
We arent that damn lazy. If we change this screen to the normal login, then prying eyes
will have to know a username and password to get in. Follow the instruction below to change
this.

control panel >> user accounts >> change the way users log on or off

uncheck the box next to "Use Welcome Screen" and choose "apply options".

12. -------------------------------------------------------------------------------------------
Disable Remote Registry..........(why would I need to edit my registry remotely anyway?)
-------------------------------------------------------------------------------------------

right click "my computer" >> manage >> services and applications >> services >> " stop
and disable" Remote Registry.

NOTE: disable any services running in this area that you arent using.

13. -------------------------------------------------------------------------------------------
Disable/Change Auto-search in Internet Explorer. This is not really a security risk but it
is important to some people that prefer to keep their internet surfing to themselves and
away from microsoft.
-------------------------------------------------------------------------------------------

Open Internet Explorer >> Click the "search" button >> click the "customize" button >> click
"autosearch settings" >> FOLLOW INSTRUCTIONS BELOW...........

DISABLE: In the "When Searching" drop down menu, select "Do not search from the address bar".
>> click "ok" >> "ok". Type an invalid address in your address bar and see if it
takes you to the msn search page or if it gives a "page not found" error. In this
case, the "page not found" error is what we want.

CHANGE: If you wish not to disable, but you wish to change it to your favorite "google.com"
search page. Instead of following the "DISABLE" instructions, follow the instructions
below. Choose "Google Sites (or whatever you prefer)" from the "choose a search provider
to search from address bar" drop down menu >> click "ok" >> "ok"


Read more...

Configuring ZoneAlarm Security Settings
(

If you're running ZoneAlarm Pro you will probably have considered that most of the "advanced" settings might as well be in Chinese for all the use they are. User friendly they are not!

If you are not on a LAN (connected to another computer in a network) you can use this guide to give your firewall some real muscle and a new lease of life:

Configuring ZoneAlarm Security Settings
(

If you're running ZoneAlarm Pro you will probably have considered that most of the "advanced" settings might as well be in Chinese for all the use they are. User friendly they are not!

If you are not on a LAN (connected to another computer in a network) you can use this guide to give your firewall some real muscle and a new lease of life:

Launch ZoneAlarm Pro and click to highlight the "Firewall" tab on the left hand side . In the pane that appears on the right hand side in the section "Internet Zone Security" set the slider control to "High" Then click the "Custom" button in the same section.

The next settings page is divided into two sections with tabs Internet Zone and Trusted Zone at the top of the page. Under the Internet Zone tab there is a list of settings that can be accessed by scrolling. At the top is the high security settings and the only thing that should check from there is "allow broadcast/multicast". The rest should be unchecked.

Scroll down until you get to the medium security settings area. Check all the boxes in this section until you get to "Block Incomming UDP Ports". When you check that you will be asked to supply a list of ports, and in the field at the bottom of the page enter 1-65535

Then go back to the list and check the box alongside "Block Outgoing UDP Ports" and at the bottom of the page enter 1-19, 22-79, 82-7999, 8082-65535

Repeat this proceedure for the following settings
"Block Incomming TCP Ports": 1-65535
"Block Outgoing TCP Ports": 1-19, 22-79, 82-7999, 8082-65535
Then click "Apply", "Ok" at the bottom of the page.

Back in the right hand "Firewall" pane go next to the yellow "Trusted Zone Security" section and set it to "high" with the slider. Click "Custom" and repeat the above proceedure this time choosing the Trusted Zone tab at the top of the settings page.

These settings will stop all incoming packets @ports 1-65535 and also block all pings, trojans etc... this will also stop all spyware or applications from phoning home from your drive without your knowledge!


Read more...

PC magazine.

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.

1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.


PC magazine.

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.

1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.


3. Install a free spyware blocker. Our Editors' Choice ("Spyware," April 22) was SpyBot Search & Destroy (_http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel | Administrative Tools | Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.

5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts.

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., w*w.grisoft.com). And doublecheck your AV with the free, online-only scanners available at w*w.pandasoftware.com/activescan and _http://housecall.trendmicro.com.

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.

9. Join a respectable e-mail security list, such as the one found at our own Security Supersite at _http://security.ziffdavis.com, so that you learn about emerging threats quickly and can take proper precautions.

10. Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support."



Read more...