jmolini@nasamail.nasa.gov (JAMES E. MOLINI) (10/19/90)
After several months as a computer hermit and Virus-L parasite, I guess it's time to sharpen up the old electronic writing stick and join the fray again. I owe this recurrence to Paul Furnanz (#171) and Dave Grisham (#170) who asked for advice on virus defense. Well, gentlemen, I am not very good at advice, but will you settle for an opinion? First, for all of those lost puppies who want to compare viruses to living organisms (yes, I've still been reading all this time), let me reiterate one of my earlier points: Viruses are a computer INTEGRITY problem, nothing more. The broader issue of malicious code can be another story, but viruses violate system integrity. Let me elaborate. A virus must modify some other EXECUTABLE resource on a computer system to replicate. If it doesn't modify another executable resource and still replicates then it can obtain computer resources on its own. This makes it a Worm. If it doesn't replicate, it is not a virus, it is a Trojan Horse. And unfortunately, no one can protect you from yourself. (If you want to know what is executable, please look up the Mar-May issues of Virus-L. We beat that horse to death back then.) This is all fairly basic stuff that is traceable back to Cohen, et al. So what does this mean to you the computer user? It means that as long as you can maintain the integrity of executable resources on your computer system, you can protect yourself from virus infections. Unfortunately, this is impossible to guarantee on most micro-computers, so we are back to relative levels of risk and effective detection. Before I get too far off track, let me describe the approach taken where I work. We have over 6000 IBM PC compatibles on-site and another 4-8000 in the local area. All users who wish to obtain Public Domain software are encouraged to download it from a BBS that we professionally maintain and register all users for. Every piece of software we put on the board is scanned before it is placed in the download directories. Nevertheless, we also display a disclaimer that we are not perfect and users should be careful. Software is not routinely exchanged over networks, but data is. We recommend that users buy software when they need it and have "demo" copies of most packages for users who want to test drive something. This software and all PC's that run in the demonstration facility are checked daily for viruses. This does 2 things. It makes users feel safe when they come in to try out the software, and it allows us to spot check user diskettes in case they are one of the walking wounded. We have a reliable and organized method for reporting infections and have done our best to tell users that getting infected is not a criminal offense. When an infection occurs, any user can call a support desk and get expert assistance with the problem. This also applies to possible infections. As a result, we have experienced an infection rate of less than 1 per 1000 PC's per year. Most of those infections have involved some type of shared machine. Therefore we are increasing our virus surveillance efforts around shared PC's and terminal areas. Even though we do have infections, as far as we know, we have not lost any data to viruses over the past 2 years. This is primarily due to the relatively long latency (time between infection and destruction) shown by the viruses we have seen. As far as I can see, the average latency for a virus is on the order of weeks, or months. Of course this is not always the case, but walking across the street is a crap shoot too. Just ask any armadillo. We are taking further steps in the future, but I will save that for a future edition of Virus-L. BTW, if John Perry is reading, he may be interested to know that his infection was pre-dated by a major infestation of the Ohio Virus at a university within 50 miles of his location. They were very lax about correcting the situation and I would not be surprised if his situation were an unfortunate consequence. I hope this helps. Jim Molini ---------------------------------------------- "Revoke 'em all & let God sort 'em out."