home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  


Previous Section Next Section

23.4 Entry

The most important questions that arise in our discussion of programmed threats is this: How do these threats find their way into your computer system and how do they reproduce?

These days, most programmed threats arrive via the Internet in the form of either an email message or a direct attack on a network-based server. A received email message or direct attack may be the result of a random event (your organization's web server might be randomly chosen) or it may be deliberate (you may have been specifically targeted by an adversary). It is easy to mistake a direct attack for a random one, and vice-versa. A direct attack is much more worrisome than a random one, as a motivated attacker may continue to assault your organization until the attacker is successful or is stopped.

Users may also be unwitting agents of the transmission of viruses, worms, and other such threats. They may install new software from outside, and install embedded malicious code at the same time. They may run a "screen saver" or download a pornographic "viewer" from the Internet that contains a Trojan horse. Of course, most programs that are downloaded from the Internet do not contain any hostile code at all. However, the widespread practice of downloading and running code from untrusted sources makes it that much easier for hostile programs to be successful.

If you are targeted by a knowledgeable insider, that insider may write back doors, logic bombs, Trojan horses, and bacteria directly on the target system using readily available tools. Your users and especially your staff pose a significant threat to your system's overall security: these people understand the system, know its weaknesses, and know the auditing and control systems that are in place. Legitimate users often have access with sufficient privilege to write and introduce malicious code into the system. Especially ironic, perhaps, is the idea that at many companies the person responsible for security and control is also the person who could cause the most damage if he wished to issue the appropriate commands. Frequently, there is no technical auditing or other checks and balances for senior system management.

Programmed threats can easily enter most machines. Environments with poor controls abound, caused in part by the general lack of security training and expertise within the computing community. For example, even though anti-virus software is now considered a base requirement for corporate and home PCs, more machines lack anti-virus software than have it. Almost as unfortunate is the fact that many people who have purchased anti-virus software fail to update the virus signatures on a regular basis, thus rendering the software largely useless against current threats.

No matter how systems initially become infected, the situation is usually made worse when the software spreads throughout all susceptible systems within the same office or plant. Most systems are configured to trust the users, machines, and services in the local environment. Thus, there are even fewer restrictions and restraints in place to prevent the spread of malicious software within a local cluster or network of computers. Because the users of such an environment often share resources (including mail systems, file servers, shared programs, and so on), the spread of malicious software within such an environment is hastened considerably. Eradicating malicious software from such an environment is also more difficult because identifying all sources of the problem is almost impossible, as is purging all those locations at the same time.

    Previous Section Next Section