|Common Threats and Viruses|
- Malicious code: viruses, worms, trojans
- Protect your workstation with updated anti-virus software and only open emails from people you know and trust .
- Hackers: People will try to manipulate you or your computer to gain information. Be vigilant about giving out information .
- Physical theft: Protect equipment and information by restricting access to it. Proper access controls prevents system snooping and obtaining information by unauthorized users.
- Identity theft: Do not share confidential or sensitive information about yourself or your agency without appropriate authorization .
- Viruses: A virus is a program or code that attaches itself to a legitimate, executable program, and then reproduces itself when that program is run. Viruses may be opened or run as an email attachment or contained in a document or spreadsheet macro in order for the program to replicate and damage your data or computer.
- Example: Melissa Macro Virus.
- Worm: A self-contained program (or set of programs) that is able to spread copies of itself to other computer systems. The propagation usually takes place through network connections or email attachments.
- Example: Code Red, Nimda, Klez, I LOVE YOU.
- Trojans: A program that neither replicates nor copies itself, but performs some illicit activity when it is run. It stays in the computer doing its damage or allows somebody from a remote site to take control of the computer. Trojans often sneak into your system attached to a free game .
- Example: elf-bowling game, christmas cards.
- The vast majority of viruses, worms, and Trojan Horses (backdoor programs) are propagated through e-mail.
- Other methods include file-sharing (files from home, chat, peer-to- peer networks like Kazaa, Morpheus, etc.) and using infected media.
- Do not open e-mail attachments that are suspicious or that come from unknown sources.
- Do not download files or install software without appropriate DIT authorization.
- Use current, up-to-date antivirus protection:
- Scan downloaded files for viruses before opening them.
- Scan media (CD-ROMs, floppy disks, reused hard drives) for malicious code.