Countermeasures against Computer Viruses



Similar documents
Countermeasures against Bots

Countermeasures against Spyware

Countermeasures against Unauthorized Access

PC Security and Maintenance

Guide for <Avoidance of Risks> When You Use Electronic Mails

Guideline for Prevention of Spyware and other Potentially Unwanted Software

F-Secure Anti-Virus for Mac 2015

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender

ANTIVIRUS AND SECURITY SOFTWARE

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

F-Secure Internet Security 2012

Computer Viruses: How to Avoid Infection

ANTI-VIRUS POLICY OCIO TABLE OF CONTENTS

Airtel PC Secure Trouble Shooting Guide

How to easily clean an infected computer (Malware Removal Guide)

Microsoft Security Essentials Installation and Configuration Guide

How to stay safe online

How to Install Windows 7 software

Introduction to Computer Security Table of Contents

Get Started Guide - PC Tools Internet Security

Outlook Safe Sender s Filtering

McAfee Enterprise Edition v Installation & Configuration For Windows NT, 2000, and XP

AVG File Server. User Manual. Document revision ( )

ANDRA ZAHARIA MARCOM MANAGER

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

In this note, you will learn the basic applications of McAfee VirusScan Enterprise (hereafter McAfee ). Six topics will be covered as below:

Activities for Protecting Your Identity and Computer for Middle and High School Students

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

F-Secure Anti-Virus for Mac. User's Guide

Infocomm Sec rity is incomplete without U Be aware,

McAfee VirusScan Enterprise 8.7 Users Guide

SAFEGUARDING YOUR WINDOWS COMPUTER

Remote Access User Instructions

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection

ViRobot Desktop 5.5. User s Guide

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Virus Definition and Adware

Release Notes for Websense Security v7.2

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Malware & Botnets. Botnets

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Sophos Endpoint Security and Control Help

Sophos Enterprise Console Help

Using Windows Update for Windows XP

You can protect your computer against attacks from the Internet with Windows Vista integrated Firewall.

Enterprise Anti-Virus Protection

Introduction. This white paper provides technical information on how to approach these steps with Symantec Antivirus Corporate edition.

FAQ. Safe Anywhere PC. Disclaimer:

Basic Virus Removal Steps

Sophos for Microsoft SharePoint Help

Basic Computer Maintenance

How To Use Secureanything On A Mac Or Ipad (For A Mac)

NS Employee Resource Center: Problems and Solutions Accessing the Mainframe (Crewcall, Memo, Realtime, etc.)

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Cyber Security: Software Security and Hard Drive Encryption

A Guide to Information Technology Security in Trinity College Dublin

Contents. McAfee Internet Security 3

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Printed Documentation

Computing Guide. How to set up McAfee virus scanning software and become computer virus savvy

Network Security. Demo: Web browser

Sophos Endpoint Security and Control Help. Product version: 11


AVG File Server User Manual. Document revision (11/13/2012)

Housekeeping Your PC

Client Manager for Endpoint Protection (CMEP) User s Guide

What you need to know to keep your computer safe on the Internet

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Computer Security Maintenance Information and Self-Check Activities

F-Secure Anti-Virus for Windows Servers. Administrator's Guide

Sophos Endpoint Security and Control standalone startup guide

Internet Security for Windows XP and Vista

Protect your personal data while engaging in IT related activities

How to Configure Sophos Anti-Virus for Home Systems

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Frequently Asked Questions: Xplornet Internet Security Suite

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Using Windows Update for Windows 95/98

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s

Outlook XP Only

Business ebanking Fraud Prevention Best Practices

Securing Communications

Cyber Security Awareness

AVG File Server User Manual. Document revision (8/19/2011)

User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO Version 8.0.

Enterprise Anti-Virus Protection

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Frequently Asked Questions

Sophos Anti-Virus for Mac OS X: Home Edition Help

Enterprise Anti-Virus Protection

Security Awareness. ITS Security Training. Fall 2015

Using The Internet Effectively A Guide To Safe And Secure Web Surfing

ESET Mobile Security Business Edition for Windows Mobile

Transcription:

Countermeasures against Computer Viruses How to protect your computer from computer viruses!! Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/

Note: A poster showing 7 Articles for Virus Countermeasures is available. The poster is used in Teach Yourself Threats of Computer Viruses in 15 Minutes (Moving contents that show how to develop and promote virus protection measures). It can be downloaded from the following URL: http://www.ipa.go.jp/security/y2k/virus/cdrom2/documents/7kajyou.pdf Reference: Teach Yourself Threats of Computer Viruses in 15 Minutes http://www.ipa.go.jp/security/y2k/virus/cdrom2/ 1

1. Vaccine Software Keep it Up-to-Date To protect against viruses, antivirus software should be installed. Those who are using antivirus software must perform scan using the latest virus-scanning engine and virus definition files. Day by day, new viruses are detected one after another; even though some of them may look exactly the same as existing viruses, they are in fact subspaces of a specific virus. So the antivirus software should be kept updated so it can properly deal with such new viruses. Generally, antivirus software has the automatic update function that keeps virus-definition files up-to-date. Turn on this function or manually update the files on a regular basis. Some new computers have trial-antivirus-software pre-installed. Note, however, that after a specified period of time, those programs cannot be used or their definition files cannot be updated. If you have no antivirus software at hand but can access the Internet, you can still use free-online scan services provided by some venders (Refer to page 12). Note, however, that you cannot perform real-time checking, so it s recommended to install antivirus software. 2. Email Attachment Files Should be Scanned Computer viruses are often contained in email attachments. Even if the email is from your close friend, scan the attached files for viruses before opening them. The number of incidents caused by emails containing forged sender information is increasing. In order to protect your computer from such emails, you must also be careful with emails from unknown sources and forged service providers. When exchanging emails with your close friends and if it s necessary to attach a file, it s recommended to explain in the body of the email message that you have attached the file and what its contents are. When you have received an email with a file (or files) attached, you should scan the file for viruses before opening it. This step is necessary for better safety. 2

You should also be careful when the file extensions (the last three characters of a file name) listed below are used for attached files. Note, however, that Windows has the [Hide file extensions for known file types] option. It s recommended to disable it (Refer to page 5). Explanation of File Types: exe : Application File pif : Shortcut to a MS-DOS Program scr : Screen Saver bat : MS-DOS Batch File com : MS-DOS Application File Figure 1 Files with these extensions are executed right after they are opened. If the files contain a computer virus, your computer might be infected with it and suffer damage, such as leakage of personal information, destruction of hard drive, etc., and in the worst case, entire controls of your computer might be taken over. Depending on the virus, file icons might be forged or double extensions applied to make you think they are authentic ones. 1. Word document. This is a Word document. (The icon and extension are associated) 2. Application with a forged icon. This is not a Word document. (Masquerading with the Word document icon) (). 3. Application with double extensions. The file name is displayed using if it s too long to be displayed. Figure 2 Figure 3 Figure 4 Word document files should look like Figure 2. On the contrary, applications with forged icons will appear as in Figure 3, and applications with double extensions in Figure 4. 3

Figure 5 shows what the window looks like when you have received an email with a file (as shown in Figure 4) attached. Figure 5 There are several ways to check the file types. For example, in the case of Figure 2 and Figure 3, right-click on the file icon and select [Properties (R)] from the pop-up menu. Figure 6 File s properties Figure 7 File Properties 4

Settings to Show Hidden File Extensions By default, Windows does not show file extensions. In order to display them, open the [My Computer] or [Explorer] window, select [Tools (T)] > [Folder Options (O)], click the [Display] tab, and uncheck the [Hide file extensions for known file types] option. (Figure 8 is for Windows XP) Click the Display Tab Un-check this option Figure 8 5

Five points for handling email attachments (1) Be careful with email attachments from unknown sources. (2) Do not be fooled by the appearance of attachment files. (3) Be wary of suspicious files attached to emails even though they are from your friends. (4) Do not send a plain text that can be included in the body of an email message as an attachment file. (5) Learn about how email attachments are handled by different email programs. http://www.ipa.go.jp/security/antivirus/attach5.html Note: It is important to understand how email attachments are handled by the email program you are using. For example, some programs automatically save attachment files in certain folders upon receiving them. When using such programs, you need to make proper settings to ensure that, when emails and attachment files containing a computer virus are deleted, their copies in the designated folders are also deleted. 6

3. Downloaded Files Should be Scanned Various files such as image files, music files and video files can be downloaded Wonderful Present? from the Internet, but there is a possibility of a malicious program or instruction code being embedded in those files. To avoid this, be sure to scan downloaded files before using them. Similarly, files on external recording media (such as floppy disks, CDs, etc) should be scanned for viruses if the source of the media is unknown. Also, when downloading files, be sure that the Web site is secure. You should not download any files from suspicious Web sites, including the sites whose URLs are advertised in SPAM mails. Recently, personal data and confidential data of enterprises have been compromised due to a computer virus exploiting file-swapping software (such as Winny). Secret Information File-Swapping Network Secret Information Once the stolen information is posted on the Internet, the diffusion of the information is technically unavoidable, which may bring serious troubles. The virus Antinny spreads its infection by distributing virus files using a file-swapping software called Winny. Files obtained using the file-swapping software must also be scanned to avoid any trouble. 7

4. For Applications Utilize Security Functions When using mailer software to send or receive emails, or a web browser to access Web sites on the Internet, utilize the security functions/ settings supplied with the application software. Security Settings For example, when you are using Microsoft Internet Explorer, you can set security levels on the Options window (Select [Start] > [Settings] > [Control Panel] > [Internet Options]) (The figure below shows an example with Windows XP.) In this case, it s recommended to set the security level to Medium. 8

As a mean to protect your computer from Spyware, it is also recommended to set the privacy level to Medium - High or higher. (The figure below shows an example with Windows XP) Although macro-type viruses (*3) may seem obsolete, your computer can still be infected with such viruses by opening MS Word or Excel files containing malicious macros. To avoid this, disable the automatic execution of macros (by selecting [Tool(T)] > [Option(O)] > [Security] > [Macro Security] for Word2003.) This setting will protect your computer from viruses that can cause a serious damage. 9

5. Security Patches Should be Applied Recent viruses exploit vulnerabilities (or security holes) in the operating systems and application software. If there is any vulnerability, your computer can be infected with viruses only by previewing emails or accessing the Internet. For example, vulnerability in mailer software allowing the automatic execution of attachment files can be exploited by viruses, which can cause a broader damage. Such vulnerabilities are detected at short intervals, so it is important to periodically visit the vender's Web site and check for any related information on the application (in particular, mailer software and browsers) you are using, and then apply the latest security patch available. Depending on the vulnerability, your computer can be infected with viruses only by accessing the Internet. The virus W32/MSBlaster (detected in August 2003), W32/Welchia (August 2003) and W32/Sasser (May 2004) are well-known for causing computers to keep rebooting. A computer virus called Bot (*5), which has become a topic of conversation, can spread its infection via the Internet. Windows users should periodically perform the Windows Update/Microsoft Update, or turn on the Automatic Update feature. You can apply the latest patches provided by Microsoft for their operating systems, Internet Explorer, and Office products. Windows Update http://windowsupdate.microsoft.com/ Office Update http://office.microsoft.com/ja-jp/officeupdate/ Microsoft Update http://update.microsoft.com/microsoftupdate/ For information on how to apply the Windows Update, Office Update, and Microsoft Update, please refer to the following Web sites: How to apply the Windows Update http://www.microsoft.com/japan/athome/security/sechome/tool/mbsa4.mspx How to apply the Office Update http://www.microsoft.com/japan/athome/security/sechome/tool/mbsa5.mspx How to apply the Microsoft Update http://www.microsoft.com/japan/athome/security/update/j_musteps.mspx 10

6. Symptoms of Virus Infection Must not be Overlooked If you have encountered symptoms listed below, you computer may have been infected with computer viruses. Do not overlook them and scan your computer for viruses. (1) System or application software often gets hosed (freezes), or the system does not start. (2) Files disappear. Unknown files exist. (3) Strange icons appear on the task bar. (4) Attempts are made to access the Internet without any operation. (5) Emails are sent without the user s consent. (6) Can intuitively sense that there is something wrong with the computer. 7. In Case of Emergency Data should be Backed up Data corrupted by viruses cannot be restored by using antivirus software. Make it a rule to back up data on a regular basis so you can restore the system from any damage caused by virus infection. In addition, keep in a safe place the original CD-ROMs of application software. Should the contents of the hard drive be damaged, you can restore them using the CD-ROMs. USB Memory 11

8. Should Your Computer be Infected with a Virus Scan your computer for viruses using the latest virus definition files. If you have been able to identify the name of the virus but do not know how to eliminate it, visit the Web site of your antivirus software manufacture and look for information related to the virus, and then follow the instructions presented on the Web page. If you have no antivirus software at hand but can access the Internet, you can still use free-online scan services provided by some venders to identify the name of the virus. If identified, look for the information on the virus and follow the instructions presented on that Web page. Online scan services provided by major antivirus software venders are as follows: Symantec Security Check http://www.symantec.com/region/jp/securitycheck/ Trendmicro Online Scan http://www.trendmicro.co.jp/hcall/ McAfee Free Scan http://www.mcafeesecurity.com/japan/mcafee/home/freescan.asp If you have further questions, contact the IPA Computer Virus 911 call service, where you can consult IPA consultees about virus-related problems. IPA Computer Virus 911 Call Number Feel free to ask questions about computer viruses. (Japanese only) Weekdays: 10:00-12:00, 13:30-17:00 You can e-mail to the following address: virus@ipa.go.jp 12

9. References For further information, please refer to the following materials: Careless Downloading can Cause Considerable Damage http://www.ipa.go.jp/security/topics/malicious.html Notes on Using File-Swapping Software http://www.ipa.go.jp/security/topics/20050623_exchange.html Virus Protection Measure Check Sheets http://www.ipa.go.jp/security/virus/beginner/check/check.html Information on Antivirus Software http://www.ipa.go.jp/security/antivirus/vacc-info.html Security at Home: Protect Your Computer (Microsoft) http://www.microsoft.com/protect/computer/default.mspx Enhancing Security for Your Browser and Emails (Microsoft) http://www.microsoft.com/japan/security/incident/settings.mspx 10. Terminology (*1) SPAM Mail Also called Unsolicited Bulk Email (UBE). Emails containing identical or nearly identical messages that are sent to any number of recipients for commercial, religious, or harassing purposes. (*2) File-Swapping Software A software program that makes a user s files available to other users for download over the Internet. (*3) Macro-Type Virus A macro virus that infects Microsoft Word documents and Excel spreadsheets. If you open a document or spreadsheet that is infected with this virus, Word or Excel itself is also contaminated. Virus-infected files that are attached to emails or saved on recording media (such as floppy disks, magneto-optical disks etc) become the source of another infection. (*4) Vulnerability Vulnerability in terms of information security is a security hole that may degrade the security level of systems, networks, applications and protocols, which can bring unexpected, unwanted events, or design and implementation errors. Vulnerabilities are classified into vulnerabilities in the operating systems, vulnerabilities in applications, etc. Inadequate security settings are also referred to as vulnerability. In general terms, it is called security hole. (*5) Bot A computer virus designed to control computers (infected with this virus) from an external source via a network (or the Internet). It waits for instructions from the external source and upon receiving them, performs programmed tasks. The name Bot was derived from Robot, as its functions are similar to those of robots. 13

11. Major Antivirus Software Vendors (Based on reports submitted to IPA) Ahnlab.Inc URL http://global.ahnlab.com/ Main Product: Virus Block Aladdin Japan URL http://www.ealaddin.com/esafe/ (Israel Site) Main Product: esafe Symantec URL http://www.symantec.com/ (US Site) Main Product: Norton Internet Security, Norton Antivirus, Norton Antivirus for Mac Sophos URL http://www.sophos.com/ (UK Site) Main Product: Sophos Anti-Virus Trendmicro URL http://www.trendmicro.com/en/home/us/enterprise.htm (US Site) Main Product: Virus Buster, Inter Scan Japan F Secure URL http://www.f-secure.com/ (Finland Site) Main Product: F-Secure Antivirus McAfee URL http://www.mcafee.com/us/ (US Site) Main Product: VirusScan, GroupShield 14

Information-technology Promotion Agency IT Security Center 2-28-8, Honkomagome, Bunkyo, Tokyo, 113-6591 Japan TEL 81-(0)3-5978-7508 FAX 81-(0)3-5978-7518 E-mail virus@ipa.go.jp (Virus) crack@ipa.go.jp Hacking URL http://www.ipa.go.jp/security/ 15