This allows replacement of any infected files with uninfected copies. If files must be downloaded from bulletin board services, they should not be introduced to a hard disk until checked for viruses. Provide suitable physical security for all computer terminals. This includes locks on equipment or power lockouts when the equipment is not in use.
Access controls to areas where equipment is located may also be necessary. Observe operating system documentation including service bulletins and follow all steps recommended by the manufacturer to eliminate known flaws, "back doors" unauthorized or unplanned avenues of entry into the system , and similar "traps" that may have been inadvertently designed into the system or deliberately included as a convenience to programmers.
Control and monitor access to data on the basis of actual need. Individual network access codes should be changed frequently preferably monthly. Individuals needing access only to information should have "read only" capabilities and not have access to executable programs or any other avenues in which data may be altered or manipulated. Program systems permitting access from outside sources or from inside sources off-premises to include verification of the correct access codes i.
Program systems permitting access from outside sources or from inside sources off-premises to deny access to a caller who has three consecutive identification codes invalidated. Preserve original program disks in a secure place and run programs on duplicate media.
Back-up all operating software frequently. Heavy use software may require a continuous back-up mechanism. Other systems should be backed-up daily or weekly, depending on volume and complexity of daily data accumulation. It is wise to provide fresh back-up media i. Depending on the specific exposures, design security systems that will protect against the intrusion or presence of unauthorized or tainted software and either deny access by such software or shut down the system and alert management.
Many of the preventive efforts to thwart virus infection involve the application or avoidance of specific procedures involving the handling, maintenance and use of media.
For example:. The envelope or covering of all floppy disks contains perforation that allow the disk to accept data or instructions. If these perforations are covered or masked, the disk cannot accept any additional data. Use disk maintenance or "utilities" to sort and check hard disks files and to review hard disk behavior.
Hard disks, which may contain multiple applications and other software, can be breeding grounds for the accidental introduction of a virus-like chain of events. Well organized disk management procedures and regular system checks help avoid many of these risks.
What is a Virus? How Serious is the Virus Threat? Loss Control Considerations There are many anti-virus software products on the market today. Elements of an effective computer virus loss prevention and control program should include but are not limited to: Do not use pirated copies of software or let others install unauthorized applications on a PC. For example: Write Protection The envelope or covering of all floppy disks contains perforation that allow the disk to accept data or instructions.
Disk Utilities Use disk maintenance or "utilities" to sort and check hard disks files and to review hard disk behavior. Michelangelo is a virus from famous for being one of the greatest sources of hysteria in the history of viruses and probably the greatest in the era before a majority of homes and businesses were connected to the Internet. In spite of having a malicious payload , it did little damage except cause some embarrassment to journalists who avoided the subject of computer viruses for a while after the payload was supposed to activate.
Michelangelo is mostly similar to the original Stoned Virus. In addition to infecting the sectors of the original Stoned virus, Michelangelo infects sector 28 on 1.
Upon infection, the Michelangelo virus becomes memory resident at the top of system memory but below the K DOS boundary. Interrupt 12's return is moved to insure that Michelangelo is not overwritten in memory.
It has a destructive payload that overwrites all data on the hard disk with random characters, making recovery of any data unlikely, if not impossible. It will only do this if the computer is booted on March 6 the birthday of the artist Michelangelo, ironically, one of the vendors that sold software infected with the virus was DaVinci systems.
In addition, the virus does not check if the MBR has been previously infected, therefore if a similar virus has already infected the MBR, it will move the previous virus to the location the original MBR was stored on, making recovery of the MBR impossible. There are a few known variant s of the Michelangelo virus.
Only those that existed around the time of the original received much attention. Michelangelo itself is considered a member of the Stoned family. The Michelangelo virus had a destructive payload, however it ended up destroying very little. Like its parent, Stoned, it was commonly found accidentally installed on vendor software disks. In the month that the virus's payload was supposed to activate, Intel shipped a Netspool disk software for network printers on Novell Netware infected with Michelangelo.
Leading Edge shipped 6, PCs with the virus in January of In all, around 20 companies shipped disks or even computers with the virus. Although the virus itself had minimal real world impact in terms of number of infections, the publicity surrounding Michelangelo brought the issue of computer security into the public eye. Most people at that time still had little knowledge of computer viruses, resulting in ordinary users purchasing antivirus solutions en-masse.
IBM reported that stores sold out of their antivirus products, invariably purchased by people who bought into the hype. And while the Michelangelo virus—along with a majority of boot sector viruses—has come and gone, it retains a special place in infosec history as the first virus to bring malware awareness into the spotlight. As for the Michelangelo virus itself?
It still activates every March 6 for older, previously infected computers. Like it? Add this infographic to your site: 1.
0コメント