Virus Reporting (Stand-Alone Systems)

A computer virus infection is a reportable security incident. Department of the Navy (DON) policy requires that each computer security incident be reported by the NRL IS Security office to the Naval Computer Incident Response Team (NAVCIRT) as soon as possible.

If a virus or a suspected virus is detected by a user at NRL, take the following actions:

1. Notify your IS System Manager and the IS Security Office of the infection and take the necessary actions to minimize the spread of the virus within your activity.

2. Notify all activities that may have received infected diskettes or network files from your activity. Everyone concerned must know about the virus so that it may be stopped and removed.

3. If possible, capture samples of the virus(es) on diskette (no more than 1 diskette per virus). Forward them with the information in paragraph 5 below via your ISSM for analysis to the NRL IS Security Office.

4. Use Toolbox or a commercial antiviral software to remove the infection.

5. Provide the following information to NRL IS Security via your ISSM.

a) Name of the virus
b) How the virus was first detected and identified
c) Damage or observations resulting when the virus triggers
d) Damage caused to your systems, if any
e) Source of the virus, if known
f) Other locations, within or outside of your activity, possibly infected as a result of sharing infected media or files
g) Number and types of systems infected (i.e. hard disks and servers)
h) Number of floppy diskettes infected (approximate)
i) Method of clean-up (removal software, format disk, etc.)
j) Number of work hours expended to remove the infection (approximate)
k) Your name, phone and location

The IS Security Office will make an immediate and thorough investigation of all virus infections reported.

Virus Prevention

Scan all disks before they are used. Be cautious of all newly acquired software. Check new software for infection before it is run for the first time. Never boot from an unprotected diskette. Backup files and programs. Watch for unusual operation indicators. Use virus detection software.

Network Virus Protection

Networks at greatest risk to virus like (worms, etc.) infections are users of UNIX and PC-DOS, loosely administered networks, networks which permit dial-up access, homogeneous networks where most systems employ the same operating systems or hardware, and open networks which allow any organization to be connected. Defense organizations such as NRL not only need to be concerned because of the potential damage a virus might cause, but also because of potential news media attention and organizational oversight.

Network Protection Precautions

System administrators can take a number of steps to minimize the potential for a virus attack.

1. Change passwords frequently
2. Prohibit the introduction of any unapproved software
3. Continuously monitor and investigate performance utilization changes or other unusual activities
4. Continuously update and maintain access controls and integrity measures
5. Maintain updated program and operating system access
6. If possible, restrict write access to particular data objects on an individual basis
7. Train users to report unusual behavior or results immediately
8. Ensure remote diagnostic lines are only connected when needed
9. Set system software defaults in positions which reduce potential security vulnerabilities

Incidence Response Activities (Network Virus/Worm Attack)

NRL is seldom the identifying organization, incidents involving self replicating-computer viruses in computer systems and networks have underscored the need for NRL wide coordination and support. When a network virus is discovered on Milnet, Arpanet, or NSFnet, the Naval Computer Incident Response Team (NAVCIRT) will immediately advise all Navy organizations of its existence and suggested actions.

The IS Security Group will work closely with other federal agencies to coordinate identification and response efforts when acute computer network security incidences of this type are detected. The group will ensure suggested NAVCIRT corrective actions are implemented. Upon initial discovery of a previously undetected network related virus infection, the ADP Security Office will contact NAVCIRT immediately to formulate a combined response.