Virus Alerts |
This Site will attempt to keep up with new inovations and updates of current computer virus information. There are more than 10,000 new and variations of computer virus written a month. The necesesity for up-to-date current software to combat this onslaught on your computer system is apparent to most computer users. Safeguards Rule 1 There are no continuous Safeguards. Safeguards can be fashioned in many forms of strategies because of the many different categories of attacks. These are only temporary as newer ways of accessing remote systems are always progressive. Different Categories of Attacks Net attacks can fall into several different categories: - Virus: System or Network has a virus. (known) Time is used to track down and eliminate viral activity. · Denial of service: Users cannot access sites. - Nukes: Nuke attacks are (sometimes) used at various times by various attackers as a method for getting the machine to re-boot and enable (the attacker) to install the trojan. · Surrogacy: The site address is usurped. Someone else is using your account or power or address or ISP power possibly for other purposes. - Site Vandalism: Company Site can be continually vandalised. - Remote Manipulation: System(s) are remotely controlled by an otherwise unknown (to the Co.) administrator. · Piracy: Data is extracted and/or manipulated and used ie: credit card, or the changing of secured data. - Capitalisation: Your machine or Company Network (space) can be used for other purposes. (your machine or Networks free space can be compressed to give you roughly the same free space while giving the (remote administrator(s)) space and resouces assigned to other purposes. · Hazards: (Vital) (Many) Operational information is manipulated to disrupt an activity or give out certain information to a remote address. New Categories of Risk New categories of risk are appearing that could make businesses lose revenue, and make host organisations liable to third parties for the loss or theft of personal information in their possession. This includes: credit card information, login names, passwords, and just about any or all information held by that system or network. Cameras and microphones connected to computers may/can be transmitting internal conversation and images to remote addresses anywhere in the world. Standard off the shelf technology security solutions are not enough (usually) (most can be updated online though) to combat continual and sustained electronic attacks from these types of trojans and are usually out of step with viral "trends".. Back Orifice type modules may be embedded and lie undetected in the your computer or network for months before exporting sensitive information to a remote computer system anywhere in the World by remote administrators who cover their tracks in many, many ways. E-mail attacks, normally not detected in time, are not discussed by the victim organisation for fear of share price collapse or someone copying the attacks that exploit the same vulnerability. Security policies should prioritise immediate action and foster strong encryption, scanning, tracing, tracking, pursuit and interception techniques. Safeguards Safeguards can be designed into systems. These can include scanners, port scanners, port blockers, traps for hackers, spare back-up systems, spare parts, etc .. Constant vigilance is required by Netwrork Administrators and/or Engineers as immediate tracking is one effective procedure for safeguarding your network. Data Recovery
Data recovery may take several days or may not be possible in all cases of the new viral attacks.If data recovery is not an issue, because backup is available, the safest method of cleaning the machine(s) is to reformat the hard disk and reinstall the operating system and software applications. That is if you havn't been infected by a CMOS virus. In which case hardware(s) as well as software loss is possible. Security Defense and Attack Capabilities There are very few security defense architectures that have been built with sufficient reserve systems, power and multiple hidden ports to anticipate and deal (instantly) with a wide range of attacks. There are a number of security procedures that can be designed into a system to trick amateur hackers. These include adding extra layers, relatively visible, easily accessible areas to lure hackers, leading them to believe that they are inside a network. Alarms can trigger for Network Administrators to know the system is being hacked. It is argued that the most effective form of defence for this type of attack would be to launch a counter-attack and/or send a Tracker Co. to initiate defense/attack capabilities which could lead to a shoot-out or go into a full-blown war, from launching a crippling counter-attack. However, this approach is ill advised because it is fraught with legal obstacles and downstream liabilities. Who bears responsibility for the actions of either party when attacks and counter attacks, and possibly wars have occurred? Plus, .. the after affect. (continued attacks later) Trackers can take the worst/best opponents home if counter-counter tracking measures and disabling techniques are not successful. (continued attacks later) Tracking Services live a Dangerous Lifestyle for the prices charged to Companys for their Services. Each contract can have many (initially unforseen) tehnical circumstances surrounding the Contract or Company. Depending on circumstances, different Security Contracts or Companys requirements may require particular hardware or software solutions sometimes manufactured for that particular purpose for the Company. Any inquiries or questions please e-mail Koalas Internet Security. * Experienced or prospective Trackers (Co.) please e-mail Koalas Internet Security.
Virus Alert Reference Index
|