[comp.binaries.ibm.pc.d] WSMR newspaper article on Anti-Virus program

cmcdonal@WSMR-EMH10.ARMY.MIL (Chris McDonald ASQNC-TWS-RA) (10/05/89)

                    THE WSMR ANTI-VIRUS PROGRAM

	The subject of computer "viruses" has attracted considerable
attention in the last three years.  The publicity of a Columbus Day
virus and the continuing infection rates of several Friday the 13th
viruses has pointed out the necessity of ensuring all users are aware
of common sense policies and procedures to minimize the threat of
viral attacks.  This article attempts to describe our virus defense
program at the Range.

	We at White Sands have a unique history in viral research.
In the summer of 1984 we at White Sands Missile Range sponsored a
computer virus "experiment" by a University of Southern California
(USC) undergraduate, Mr.  Fred Cohen.  Fred went on to obtain his PhD
and has written and lectured extensively on the computer virus
phenomenon.  So we have had some direct experience in the area at a
rather early stage.

	The definition of a "virus" from Dr. Cohen's original research
work is short, but extremely important to understand some recent viral
attacks.  He defined a "virus" as "a computer program that can infect
other programs by modifying them to include a possible evolved copy of
itself."  With the infection property a virus can spread throughout a
computer system or network using the authorizations of every user who
might use it to infect their own programs.

	Viruses can spread on personal computers as well as on
mainframes.  For a variety of reasons we have seen the majority of
viruses infecting personal computers.  An Israeli researcher has
published a catalog of 77 identified MS-DOS viruses, including their
variations, as of 2 Oct 89.  Other researchers have identified at
least 10 Macintosh viruses, including variations, as of 3 Oct 89.
"Variations" occur as individuals receive a copy of an original virus
and then make some change to it for the purpose of creating a "new"
virus.

	If a "computer virus" is similar to a "biological virus," then
could one apply the defenses or at least the methodology used to
counter infectious human diseases to the issue of automation security?
On the assumption that the comparison holds, then prevention,
treatment and education would seem logical control measures.

	We can limit our exposure to computer viruses by controlling
and by monitoring the source of our software.  We can "buy" from
reputable sources.  We can apply the two-person rule to the
development and to the review of software which we develop in-house.
If we must use public domain and shareware software, then we have an
obligation to observe the policies and procedures which our particular
organization has for the acquisition, control and testing of such
software.  Users should also be aware that certain tenant activities
at WSMR prohibit the use of public domain software.

	We have at our disposal both commercial and shareware software
products to detect known computer viruses.  We have advertised over
the Workplace Automation System (WAS) electronic bulletin board the
availability of VIRUSCAN which specifically detects several Friday the
13th and Columbus Day viruses identified as the DatacrimeI and
DatacrimeII viruses.  Users can contact either Bob Rothenbuhler, the
installation systems security manager, at 678-4236, or Chris Mc
Donald, an ISC information systems management specialist, at 678-4176
for assistance.

	There are a variety of "disinfectant" programs for the MS-DOS
and for the Macintosh worlds which we maintain in the event of a viral
outbreak.  We also have access to the resources of the National
Computer Security Center (NCSC), the Computer Virus Industry
Association (CVIA), and the Computer Emergency Response Center (CERT)
in the event of viral attacks.  While it is impossible to stockpile
all possible "treatment" remedies, we have at least a good foundation.

	Finally, an article such as this serves to "educate" you, the
user community, as to the threats and to some of the defenses
applicable to the computer virus problem.  We have available a
briefing on computer viruses entitled "Everything the New England
Journal of Medicine will never tell you!"  which discusses this
subject in some detail.  The Information Systems Command has also
initiated an eight hour training class, "Protection of Automation
Resources", which will address the whole subject of automation
security, to include viruses.  Both Bob and Chris are always available
to answer specific questions and to assist users within their
respective fields of interest.

	While we cannot eliminate computer viruses, we can maintain a
program of prevention, detection and education to minimize the
possibly negative impact on our computing environment.  Using good
common sense computing practices can reduce the likelihood of
contracting and spreading any virus.
 
        - Backup your files periodically
        - Control access to your PC or terminal and limit use to those people
          whom you know and trust
        - Know what software should be on your system and its characteristics
        - Use only software obtained from reputable and reliable sources
        - Test public domain, shareware, and freeware software before you use
          it for production work
        - If you suspect your PC contains a virus, STOP using it and get
          assistance