exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

readlist.txt

readlist.txt
Posted Aug 17, 1999

Abbreviated bibliography of selected works about computer viruses, worms, and related issues - 1990-05-02

tags | paper, worm
SHA-256 | 4f02ec28a5f7f54caa5634ffef3ff2c7ffa46bf4d8823ecace26a868f8f49272

readlist.txt

Change Mirror Download








An Abbreviated Bibliography for



Computer Viruses

and

Related Security Issues
















Revised
April 18, 1990






NIST The National Institute of Standards and Technology

ABSTRACT

This document provides a list of suggested
readings about computer viruses and other
related threats to computer security. The
primary intended audience is management and
those who need access to the basic facts,
however readings are included that are also
suitable for technically-oriented individuals
who wish to learn more about the nature of
computer viruses and techniques that can be
used to reduce their potential threat. The
suggested readings range from general discus-
sions on the nature of viruses and related
threats, to technical articles which explore
the details of various viruses, the mechan-
isms they attack, and methods for controlling
these threats to computer security. Other
articles are included that deal with more
general aspects of computer security, but
which have some bearing on the problem.












The National Institute of Standards and Technology


The National Institute of Standards and Tech-
nology (NIST) has responsibility within the
Federal Government for computer science and
technology activities. The programs of the
NIST National Computer Systems Laboratory
(NCSL) are designed to provide ADP standards,
guidelines, and technical advisory services
to improve the effectiveness of computer
utilization and security, and to perform
appropriate research and development efforts
as foundation for such activities and prog-
rams. Copies of this paper as well as other
publications may be obtained from the follow-
ing address:

National Institute of Standards and Technology

Computer Security Management and Evaluation Group

Computer Security Division
A216, Technology
Gaithersburg, MD 20899


BASIC TERMS


The following list provides general definitions for basic terms
used throughout the literature. Some of the terms are relatively
new and their definitions are not widely agreed upon, thus they
may be used differently elsewhere.

Computer Virus: A name for
software written to cause some
form(s) of damage to a comput-
ing system. Computer viruses
copy their instructions to
other programs; the other pro-
grams may continue to copy the
instructions to more programs.
Depending on the author's mo-
tives, the instructions may
cause many different forms of
damage, such as deleting files
or crashing the system. Com-
puter viruses are so named be-
cause of their functional sim-
ilarity to biological viruses,
in that they can spread rapid-
ly throughout a host system.
The term is sometimes used in
a general sense to cover many
different types of harmful
software, such as Trojan hor-
ses or network worms.

Network Worm: A name for a
program or command file that
uses a computer network as a
means for causing damage to
computing systems. From one
system, a network worm may at-
tack a second system by first
establishing a network connec-
tion with the second system.
The worm may then spread to
other systems in the same man-
ner. A network worm is simil-
ar to a computer virus in that
its instructions can cause
many different forms of
damage. However, a worm is a
self-contained program that
spreads to other systems,
whereas a virus spreads to
programs within the same sys-
tem (a worm could do that as
well).

Malicious Software: A general
term for computer viruses,
network worms, Trojan horses,
and other software designed to
deliberately circumvent
established security
mechanisms or codes of ethical
conduct or both, to adversely
affect the confidentiality,
integrity, or availability of
computer systems and networks.

Unauthorized User(s): A user
who knowingly uses a system in
a non-legitimate manner. The
user may or may not be an
authorized user of the system.
The actions of the user
violate established security
mechanisms or policies, or
codes of ethical conduct, or
both.

Trojan Horse: A name for a
program that disguises its
harmful intent by purporting
to accomplish some harmless
and possibly useful function.
For example, a Trojan horse
program could be advertised as
a calculator, but it may
actually perform some other
function when executed such as
modifying files.

Back Door: An entry point to
a program or system that is
hidden or disguised, perhaps
created by the software's
author for maintenance or
other convenience reasons.
For example, an operating sys-
tem's password mechanism may
contain a back door such that
a certain sequence of control
characters may permit

access to the system manager
account. Once a back door be-
comes known, it can be used by
unauthorized users or
malicious software to gain
entry and cause damage.

Time Bomb, Logic Bomb:
Mechanisms used by some
examples of malicious software
to cause damage after a
predetermined event. In the
case of a time bomb, the event
is a certain system date,
whereas for a logic bomb, the
event may vary. For example,
a computer virus may infect
other programs, yet cause no
other immediate damage. If
the virus contains a time bomb
mechanism, the infected
programs would routinely check
the system date or time and
compare it with a preset
value. When the actual date
or time matches the preset
value, the destructive
aspects of the virus code
would be executed. If the
virus contains a logic bomb,
the triggering event may be a
certain sequence of key
strokes, or the value of a
counter.

Anti-Virus Software: Software
designed to detect the occur-
rence of a virus. Sold as
commercial products and as
shareware, anti-virus programs
can scan software for known
viruses or monitor a system's
behavior and raise alarms when
activity occurs that is typi-
cal of certain types of
computer viruses.

Isolated System: A system
that has been specially
configured for determining
whether applicable programs
contain viruses or other types
of malicious software. The
system is generally
disconnected from any computer
networks or linked systems,
and contains test data or data
that can be restored if
damaged. The system may use
anti-virus or other monitoring
software to detect the
presence of malicious
software.

Computer Security: The tech-
nological safeguards and
management procedures that can
be applied to computer
hardware, programs, data, and
facilities to assure the
availability, integrity, and
confidentiality of computer
based resources and to assure
that intended functions are
performed without harmful side
effects.
SUGGESTED READINGS


Adler, Marc, "Infection Protection: Antivirus Software" PC
Magazine, April 25, 1989.

Arkin, Stanley et al., "Prevention and Prosecution of High-Tech
Crime," Matthew Bender Press Co., 1989.

Brenner, Aaron, "LAN Security", LAN Magazine, August 1989.

Bunzel, Rick, "Flu Season," Connect, Summer 1988.

Cohen, Fred, "Computer Viruses," Proceedings of the 7th DoD/NBS
Computer Security Conference, 1984.

Computer Viruses - Proceedings of an Invitational Symposium, Oct
10/11, 1988, Deloitte, Haskins, and Sells, 1989.

Denning, Peter J., "Computer Viruses," American Scientist, Volume
76 May-June 1988.

Denning, Peter J., "The Internet Worm," American Scientist,
Volume 77, March-April 1989.

Dewdney, A. K., "Of Worms, Viruses and Core Wars," Scientific
American, March 1989.

Dvorak, John, "Virus Wars: A Serious Warning," PC Magazine, Feb
29, 1988.

Federal Information Processing Standards Publication 112,
Password Usage, National Bureau of Standards, May 1985.

Fiedler, David and Hunter, Bruce M., "Unix System Administra-
tion," Hayden Books, 1987.

Fites, P.F., M.P.J. Kratz, and A.F. Brebner, "Control and
Security of Computer Information Systems," Computer Science
Press, 1989.

Fitzgerald, Jerry, "Business Data Communications: Basic Concepts,
Security, and Design," John Wiley and Sons, Inc., 1984.

Gasser, Morrie, "Building a Secure Computer System," Van Nostrand
Reinhold, New York, 1988.

Grampp, F. T. and Morris, R. H., "UNIX Operating System
Security," AT&T Bell Laboratories Technical Journal, October
1984.

Greenberg, Ross, "Know Thy Viral Enemy," Byte Magazine, June
1989.

Hatkin, Martha E, and Robert B. J. Warner, "Smart Card Technol-
ogy: New Methods for Computer Access Control," NIST Special
Publication 500-157, National Institute of Standards and Tech-
nology, September 1988.

Hoffman, Lance, "Modern Methods for Computer Security and
Privacy," Prentice-Hall, 1977.

Honan, Patrick, "Avoiding Virus Hysteria," Personal Computing,
May 1989.

Kurzban, Stanley A., "Viruses and Worms--What Can You Do?," ACM
SIG Security, Audit, & Control, Volume 7 Number 1, Spring 1989.

Lipner, S. and S. Kalman, "Computer Law,", Merrill Publishing
Co., 1989.

McAfee, John, "The Virus Cure," Datamation, Volume 35, Number 4,
February 15, 1989.

McLellan, Vin, "Computer Systems Under Siege," The New York
Times, January 17, 1988.

Murray, William H., "Epidemiology Application to Computer
Viruses," Computers and Security, Volume 7, Number 2, April 1988.

Parker, T., "Public domain software review: Trojans revisited,
CROBOTS, and ATC," Computer Language, April 1987.

Pfleeger, Charles, P., "Security in Computing," Prentice-Hall,
1989.

Pozzo, Maria M., and Terence E. Gray, "An Approach to Containing
Computer Viruses," Computers and Security, Volume 6, Number 4,
August 1987.

Rubenking, Neil, "Infection Protection," PC Magazine, April 25,
1989.

Schnaidt, Patricia, "Fasten Your Safety Belt," LAN Magazine,
October 1987.

Shoch, John F., and Jon A. Hupp, "The Worm Programs--Early
Experience with a Distributed Computation," Communications of the
ACM, Volume 25, Number 3, March 1982.

Spafford, Eugene H., "The Internet Worm Program: An Analysis,"
Purdue Technical Report CSD-TR-823, November 28, 1988.

Spafford, Eugene H., Kathleen A. Heaphy, and David J. Ferbrache,
"Computer Viruses - Dealing with Electronic Vandalism and
Programmed Threats," ADAPSO Software Industry Division Report,
1989.

Stefanac, Suzanne, "Mad MACS," Macworld, November 1988.

Steinauer, Dennis D., NBS Special Publication 500-120, Security
of Personal Computer Systems: A Management Guide, National Bureau
of Standards, January 1985.

Stohl, Clifford, "The Cuckoo's Egg," Doubleday, 1989.

Thompson, Ken, "Reflections on Trusting Trust (Deliberate
Software Bugs)," Communications of the ACM, Vol 27, August 1984.

Tinto, Mario, "Computer Viruses: Prevention, Detection, and
Treatment," National Computer Security Center C1 Tech. Rpt. C1-
001-89, June 1989.

Wack, John P., and Lisa J. Carnahan, "Computer Viruses and
Related Threats: A Management Guide," NIST Special Publication
500-166, National Institute of Standards and Technology, August
1989.

White, Steve R., David M. Chess, and Chengi Jimmy Kuo, "Coping
with Computer Viruses and Related Problems," Research Report
Number RC 14405, International Business Machines Corporation,
Yorktown Heights, New York, 1989, adapted and distributed as
"Coping with Computer Viruses and Related Problems," Form G320-
9913, International Business Machines Corporation, September
1989.

Witten, I. H., "Computer (In)security: infiltrating open sys-
tems," Abacus (USA), Summer 1987.

ELECTRONIC FORUMS:

VIRUS-L is a moderated mail forum for discussing computer virus
issues; comp.virus is a non-digested Usenet counterpart. Infor-
mation on accessing anti-virus, documentation, and back-issue
archives is distributed periodically on the list. Send subscrip-
tion requests to: LISTSERV@LEHIIBM1.BITNET. In the body of the
message, enter "SUB VIRUS-L your name"

RISKS-FORUM Digest is a moderated mail forum for discussing
computer security issues as well as risks associated with other
forms of technology. Send subscription requests to:
RISKS-Request@CSL.SRI.COM.

The NIST Security Bulletin Board is a repository of computer
security information open to the general public. Users can
download files, send messages, participate in forums, and access
security alert information. Dial
(301) 948-5717 at 2400/1200/300 BPS, parity none, 1 stop bit, 8-
bit characters.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close