HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.156 Selection of a suitable computer virus protection strategy

S 2.156 Selection of a suitable computer virus protection strategy

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Head of IT Section

In order to implement computer virus protection it is necessary to deploy human and financial resources, which must be in reasonable proportion to the actual potential threat. Details of the following influencing factors must be collected for all of the identified IT systems potentially threatened by computer viruses:

Given knowledge of the frequency of computer virus infections derived from the data collected as described above and from technical publications, and knowledge of the possible consequential damage, a decision has to be taken in conjunction with management as to which financial resources have to be made available for necessary measures and which human resources will be made available.

Once it is known which financial and human resources are available to provide protection against computer viruses and which IT systems have been identified as being potentially threatened, strategies for achieving suitable protection can be chosen.

A number of possible strategies are described in the following.

Computer virus scanning programs on every terminal

The use of an up-to-date resident computer virus scanning program (i.e. a program that runs permanently in the background) in an IT system ensures that an infected program cannot be executed or a file with a macro virus cannot be loaded. Checking of the interfaces on the terminal is taken care of by the resident scanning program. This ensures that no viruses are transferred to the IT system. It is not advisable to rely solely on the exclusive use of non-resident computer virus scanning programs (which are only activated when the program is explicitly started by the user). There is no significant financial advantage to be obtained from this nowadays, but the disadvantages on the part of the IT users are considerably increased because they must be relied upon to activate the program on a regular basis.

If all terminals are equipped with a resident computer virus scanning program, it can be guaranteed that computer viruses will be identified immediately after they appear and that they will not be disseminated from the terminal. In addition, even where resident virus scanning programs are used it should be possible to activate a program on a case-by-case basis on every client as the need arises, for example to check e-mail attachments selectively before they are opened.

Advantages:

Disadvantages:

Computer virus scanning programs on all terminals with external interfaces

In networked IT systems a resident computer virus scanning program is only installed on those IT systems which in addition to interfaces to their own internal network also have other external interfaces (floppy disk drive, CD-ROM, modem). Networked IT systems without direct external interfaces are not equipped with computer virus scanning programs.

Advantages:

Disadvantages:

Computer virus scanning programs on all servers

In this case every server in a networked IT system is equipped with a resident computer virus scanning program, but the terminals connected to the server are not. This ensures that it is impossible for computer viruses to be transferred from one terminal to another, and that therefore a possible infection remains locally isolated.

Advantages:

Disadvantages:

Computer virus scanning programs on all servers and terminals

This combination of the above strategies offers the greatest protection, because computer viruses are immediately detected when they appear and are not distributed further via servers. In addition, computer virus scanning programs from various vebdors can be used, so as in that way to increase the detection rate for computer viruses.

Advantages:

Disadvantages:

Computer virus scanning programs on the communication servers

Computer virus protection programs can be installed exclusively or additionally on all communication servers, i.e. the IT systems via which data exchange with external IT systems is carried out, for example firewalls or mail servers. However, the effect of this is that the terminals are only protected against computer viruses if they do not have any other interfaces, such as CD-ROM drives etc.

Advantages:

Disadvantages:

Data hygiene and central checking of files

All incoming and outgoing files and data media are checked at a central point by a computer virus scanning program. In addition, there is a rule that the IT users must not use any files, programs or data media of doubtful origin.

Advantages:

Disadvantages:

Regardless of which strategy is chosen for providing protection against computer viruses, there is always a residual risk that computer virus scanning programs will only detect those computer viruses that were known at the time when the program was developed. This means that new viruses may not be detected and could cause damage.

The choice of correct strategy, which must also be appropriate from the cost point of view, is dependent on the particular IT environment in each case. However, in view of the fact that the cost per licence is usually greatly reduced when purchasing multiple licences of the commonly used, suitable computer virus scanning programs, it is advisable to give consideration to fully equipping all servers and terminals.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home