• My Tweats

    • Flickr Photos

    Evalution of Malware

    Via digg:

    The Fourth Generations of Malware

    The First Generation: DoS Viruses (1986 – 1995)
    The Second Generation: Macro Viruses (1995 – 2000)
    The Third Generation: Big Impact Worms (1999 – 2005)
    The Fourth Generation: Malcode for Profit (2004 – to present)

    With each generation of malware growing more complex and devastating, it’s become increasingly important for CIOs to know not only who is on their network, but who is accessing their network.

    read more

    The war over Malware has to be fought on both the micro and macro level.

    On the micro level, organization should do things like:

    • Lock down desktops and servers and have vetted control over the applications on them. Consider moving from desktop/laptops to thing clients were appropriate.
    • Consider looking into new the newer control software for locking down USB ports
    • The internal organizations should be broken into different zones of security (e.g. workgroup A, workgroup B, internal data-center applications, extranet applications). Traffic between zones should pass through firewall devices (with access control and anti-virus scanning; possibly bridge type firewalls like Fortinet Fortigates)
    • Deploy internally Honeypots/Honeynets or a Darknet as an additional warning devices to existing log analysis and aggregation.

    At the macro level, Malware is an Economics/Incentives based war:

    • Industry as a whole and consumer protections groups should actively pursue InfoSec Lawfare against those perpetuating Malware
    • Industry as a whole and consumer protections groups should actively pursue InfoSec Lawfare against those third parties (that allow themselves to be compromised through negligence) whose information technology resources are subsequently used as part of a Malware attack.

    Leave a Reply

    Fill in your details below or click an icon to log in:

    WordPress.com Logo

    You are commenting using your WordPress.com account. Log Out /  Change )

    Google photo

    You are commenting using your Google account. Log Out /  Change )

    Twitter picture

    You are commenting using your Twitter account. Log Out /  Change )

    Facebook photo

    You are commenting using your Facebook account. Log Out /  Change )

    Connecting to %s

    %d bloggers like this: