We have already discussed the amount of devastation viruses can wreak on
systems. Melissa, I LOVE YOU, Love Bug, and other viruses shut down companies
for days to deal with the cleanup and recovery from the virus. The threat from
viruses varies with the type of malicious activity they attempt to perform. Some
viruses offer only simple annoyances, while others enable remote attackers to
gain unauthorized access to systems. The widespread problems resulting from
these viruses demonstrate hackers' abilities to hide malicious code relatively
well. It also shows how easy it is for users to unknowingly execute this code
and compromise the security of the company. Virus-scanning products are quite
advanced now, but the scanners are only as good as the virus definitions. Virus
scanners must be constantly updated. Additionally, many new viruses may not
appear in the database and may be missed. Virus-scanning tools that employ
heuristics and sandboxes should be used to attempt to catch these undefined
viruses. Heuristics involve looking for code or programs that resemble or could
potentially be viruses. Sandboxes actually execute the code in a quarantined
environment and examine what the program does. If the program appears to be a
virus, the virus package quarantines the program and performs an alert function.
The heuristics and sandboxes hopefully catch any newly developed exploits and
viruses that may not have been included in the most recent virus definitions
update.
Hidden code is directly related to viruses. A hacker can trick users into executing hidden code that will open access for the hacker into the internal network or system. The code could be hidden a number of ways. Hackers can hide remote Java or Active X code on a remote Web server. Users could unknowingly execute this code while browsing the site. Hackers also frequently hide malicious code in e-mails or e-mail attachments. The malicious programs and scripts commonly open holes in the victim's system, enabling the hacker to effectively bypass firewalls and other perimeter controls and directly access the internal network.
System administrators need to take a layered approach to defend against this threat. First, users must be educated not to accept and open e-mail and attachments from unknown sources. Perimeter virus and heuristics scanning should be installed at the network's border to scan all incoming e-mail, attachments, and Internet downloads. E-mail and Internet downloads should be scanned before they are allowed to enter the network. By employing a layered scanning defense (heuristics, gateway scanning, and desktop scanning), security administrators hopefully will be able to catch viruses that may have been able to bypass one or two layers of the defense. Finally, administrators should configure user browsers to not run remote Java and Active X scripts.
Hidden code is directly related to viruses. A hacker can trick users into executing hidden code that will open access for the hacker into the internal network or system. The code could be hidden a number of ways. Hackers can hide remote Java or Active X code on a remote Web server. Users could unknowingly execute this code while browsing the site. Hackers also frequently hide malicious code in e-mails or e-mail attachments. The malicious programs and scripts commonly open holes in the victim's system, enabling the hacker to effectively bypass firewalls and other perimeter controls and directly access the internal network.
System administrators need to take a layered approach to defend against this threat. First, users must be educated not to accept and open e-mail and attachments from unknown sources. Perimeter virus and heuristics scanning should be installed at the network's border to scan all incoming e-mail, attachments, and Internet downloads. E-mail and Internet downloads should be scanned before they are allowed to enter the network. By employing a layered scanning defense (heuristics, gateway scanning, and desktop scanning), security administrators hopefully will be able to catch viruses that may have been able to bypass one or two layers of the defense. Finally, administrators should configure user browsers to not run remote Java and Active X scripts.
Comments
Post a Comment