19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

are located in inaccessible sectors which are not visible in the directories on<br />

the hard disks or floppy disks. Boot viruses overwrite these sectors with their<br />

own program code. <strong>The</strong> original contents are moved to a different location of<br />

the data media, and executed after the execution of the virus code during the<br />

start-up of the computer. As a result, the computer apparently starts in the<br />

usual manner, but the boot virus is loaded into the computer's main memory<br />

even before the operating system is loaded, and stays there during the whole<br />

power-on time of the computer. Consequently, the virus is able to infect the<br />

boot sector of every write-enabled floppy disk used during the computer's<br />

power-on time. Boot viruses can only infect other computers during booting,<br />

or through attempts at booting with infected floppy disks.<br />

File viruses<br />

Most file viruses attach themselves to program files. However, this happens in<br />

such a way that when the file is opened, the virus code is activated first,<br />

followed by the original program. <strong>The</strong> program then appears to run as usual<br />

and the virus is not immediately detected. Nevertheless, primitive, overwriting<br />

viruses are also known to exist, which attach themselves to the beginning of<br />

the host program in such a way that the program no longer runs correctly. File<br />

viruses are spread by the execution of infected programs.<br />

In the case of hybrid boot and file viruses, so called multi-partite viruses have<br />

become important. <strong>The</strong>se viruses can spread through the starting of an infected<br />

program as well as during booting (or attempted booting) from an infected<br />

floppy disk.<br />

Macro viruses<br />

Macro viruses are also placed within files, although they do not infect the<br />

applications, but the files generated by these applications. All kinds of<br />

application programs can be effected including those in which generated files<br />

not only single control characters, but also programs and other objects, can be<br />

embedded. Particularly Microsoft Word and Excel files are affected by such<br />

viruses. <strong>The</strong>se applications offer a powerful macro programming language,<br />

which can easily be abused for the implementation of viruses, also by users<br />

who are not very skilled with these programs.<br />

Macros are programs with whose help the application program can be<br />

expanded with additional functions which have been cut to fit the application<br />

(e.g. production of a fair copy from the draft of a text). <strong>The</strong>se macros can only<br />

be executed with the relevant application program (Winword, Excel etc.)<br />

when the document is processed, either due to activation by the user or if the<br />

macro starts automatically. If, for example, a Word file is received by a<br />

WWW browser which automatically opens the document with Microsoft<br />

Word, a macro can be activated. As data files are often distributed as<br />

conventional program files via data media and networked <strong>IT</strong> systems, the<br />

threat posed by macro viruses is now larger than that posed by boot and file<br />

viruses.<br />

Examples of destructive functions of computer viruses<br />

- On every March 6th, the boot virus called Michelangelo overwrites the first<br />

tracks of a hard disk with stochastic contents, thus rendering the hard disk<br />

useless.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!