19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.3 Periodic runs of a virus detection program<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrator, <strong>IT</strong> users<br />

Different courses of action can be taken to afford protection against computer<br />

viruses. Programs which scan <strong>IT</strong> systems for known viruses have proven to be<br />

the most effective means of combating viruses. <strong>The</strong> advantage here is that<br />

newly-procured software and data media can be checked before they are used<br />

for the first time. Infection by known computer viruses can thus be prevented<br />

in principle. Another advantage of virus scanning programs is that they<br />

provide details on each virus detected. Known viruses have been analysed by<br />

specialists, who have ascertained whether these viruses have any damaging<br />

effects. Consequently, a good virus scanning program must not only be able to<br />

detect a large number of viruses, but also identify them as precisely as<br />

possible.<br />

It must be noted that virus scanning programs become less and less effective<br />

in the course of time, as they are only able to detect viruses known up to the<br />

inception of the programs, and are usually not able to identify any viruses<br />

created subsequently. For this reason, it is necessary to update virus scanning<br />

programs on a regular basis, at least four times a year.<br />

Virus scanning programs have various settings which, through<br />

parameterisation, allow users to specify which files should be tested and how<br />

thorough the test should be. It is the task of the <strong>IT</strong> security management to<br />

determine the suitable settings and inform the users of them or pass them on as<br />

pre-settings.<br />

Like other programs, virus scanning programs can be invoked when required<br />

(transient) or run in the background (resident). <strong>The</strong> operating mode of the<br />

scanning program has a decisive influence on user acceptance and, thus, on<br />

the actual degree of protection achieved.<br />

In transient operation, the user must start the virus scanning program and<br />

explicitly specify which data media are to be scanned. In this way, infections<br />

can only be identified afterwards. In principle, virus protection is possible, but<br />

its effectiveness depends on how careful the user is.<br />

In the resident mode, the virus scanning program is loaded into the main<br />

memory when the computer is started, and remains active there until the<br />

computer is switched off again. It operates without requiring any intervention<br />

by users, who can continue to perform the activities assigned to them, such as<br />

writing texts. Of late, this operating mode has gained in importance as the use<br />

of Windows programs has spread. In the case of Windows, the memory<br />

management operates more efficiently than under MS-DOS, which was used<br />

mainly in the past. Rapid technical developments, accompanied by an<br />

expansion in the size of computer main memories have supported the trend<br />

toward memory-resident programs. Under MS-DOS, memory-resident virus<br />

scanning programs were often designed to have a lower performance than<br />

transient programs, in order to save memory space. <strong>The</strong> most important<br />

advantage of memory-resident operation is that the security measure (virus<br />

scanning) is implemented regardless of user action, thus increasing the level of<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!