The first line of technical defense against any computer intrusion is the architecture of the networkÂ infrastructureÂ that the computer is connected to. The fact that worms like Conficker are so successful in their metastasis is “in your face” proof of just how insecure today’s IT Infrastructures are. Â If they weren’t so insecure then these worms would have a minimal impact. Â What’s even more interesting is that worms are “dumb” and people can’t seem to keep them out of their networks, so what are people going to do when hackers come knocking?
In simple terms a worm is little more than a dumb, self replicating, repeating computer program that uses some mechanismÂ (network, usb sticks, etc)Â to send copies of its self to other computer systems . A worms survival hinges on its ability to communicate with other computer systems and on its ability to gain entry into new uninfected computer systems. Â If it can’t do one or the other then it can’t spread and it will eventually die. Â If it can do both with relative success then it will likely survive for some time. The more hosts that a worm infects, the more potential hosts it can infect assuming that its method of gaining access isn’t patched before the host is infected.Â
With that said, the not so obvious but highly effective way of defending against worms is to undergo an Advanced Penetration Test. The reality is that worms and hackers use the same techniques for gaining access to networked infrastructures. Â The primary difference is that a worm only has one method of attack and is restricted by its programming while a hacker is unrestricted and has many methods of attack. Â Therefore it is reasonably safe to say that if […]