Previous Topic: Viruses and Other Software Threats

Next Topic: Spreading Contaminated Software

About Threats

Contaminated software is the number one threat to the computer industry. In this guide, contaminated software refers to viruses, logic bombs, trap doors, Trojan horses, or any combination of these. Virus programs typically combine the capabilities of traditional techniques such as logic bombs, trap doors, and Trojan horses with the ability to replicate and spread to (or infect) other software. When we refer to a virus, we mean any type of contaminated software that can infect another program or computer system.

Fortunately for mainframe users, most of the virus incidents reported involve personal computers (PCs) and PC-based server computers. Once a PC is infected, its design and the extensive sharing of software promote the spread of viruses. Mainframes have largely escaped the virus plague because they were designed from the beginning to support multiple users. Unfortunately, mainframes are at great risk because the information stored on them is so vital to the welfare and success of corporations. Already, techniques and mechanisms that allow a virus to infect these systems have been identified.

In addition, and perhaps more importantly, mainframe users might be subject to denial-of-service (DOS) outages in which modern TCP/IP networks might be inundated with high volumes of traffic, all of which can negatively impact the ability of the network to provide adequate service to all of its users – including mainframe users.

Be aware that an employee is just as likely to create viruses as is someone outside your company. In fact, someone with access to your system and a grievance against your company has more of an opportunity and a motive to create havoc in your system than a stranger.

Because you depend on mainframe‑based systems to run your business, early detection of viruses is imperative before they disrupt your data center’s operations. Even elaborate off‑site disaster recovery plans, which are effective against physical destruction, could prove ineffective if the virus was already moved to the data vaults with the organization’s backup tapes. You can use CA Auditor to help identify viruses before they have the opportunity to spread and cause significant damage.