SlideShare a Scribd company logo
All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved.
The Truth About Viruses
on Power Systems
HelpSystems Corporate Overview. All rights reserved.
Your Presenter
Robin Tatam, CBCA CISM
Director of Security Technologies
+1 952-563-2768
robin.tatam@powertech.com
HelpSystems Corporate Overview. All rights reserved.
• What Are the Threats?
• Why Should We Act?
• Power System and Windows Viruses – Is My System at Risk?
• Virus Prevention and Protection
• PC-Based Scanning vs. Native Scanning
• Some Additional Myths Debunked
• Next Steps
Objectives
UP NEXT...
What are The Threats?
HelpSystems Corporate Overview. All rights reserved.
• Computer viruses
• Worms
• Trojan Horses
• Spyware & Adware
• Rootkit
• Ransomware
• Malware
• More…
Types of Threats
HelpSystems Corporate Overview. All rights reserved.
• Unauthorized applications (infected web links etc.)
• Code hidden and buried inside a different object
• A program that is masquerading as something else (usually
something innocent)
Source of Threats
HelpSystems Corporate Overview. All rights reserved.
• FBI warns that ransomware and malware attacks are growing
exponentially.
• 30% increase in ransomware victims in Q1 2016 compared to Q4
2015 (reported by security vendor Kaspersky Lab)
• 61% increase in the number of unique malware families over the
first half of 2016 (Check Point Software Technologies’ June Threat Index)
• Nearly 1 million malware threats are released every day (CNN, 2015)
• Viruses like Locky and CryptoLocker are mutating (CNBC, June 2016)
The Threat is Growing
HelpSystems Corporate Overview. All rights reserved.
The Threat is Ever Evolving
UP NEXT...
Why Should We Act?
HelpSystems Corporate Overview. All rights reserved.
Often, Because We Have No Choice
Why Do We Act?
HelpSystems Corporate Overview. All rights reserved.
Virus Protection and Regulatory Compliance
PCI DSS
Payment Card Industry Data Security Standard (PCI DSS)
Requirement 5
If you deal with payment card information, PCI DSS requires that all servers
in your network that are ‘in scope’ must have virus protection.
HelpSystems Corporate Overview. All rights reserved.
Virus Protection and Regulatory Compliance
HIPAA
Health Insurance Portability and Accountability Act (HIPAA)
§ 164.306 Security Standards: General Rules
 Ensure the confidentiality, integrity, and availability of all electronic
protected health information the covered entity creates, receives,
maintains, or transmits.
 Protect against any reasonably anticipated threats or hazards to the
security or integrity of such information.
 Implement security measures sufficient to reduce risks and
vulnerabilities to a reasonable and appropriate level.
HelpSystems Corporate Overview. All rights reserved.
Virus Protection and Regulatory Compliance
GLB Act
Gramm-Leach-Bliley Act
§ 501: Protection Of Nonpublic Personal Information
 To ensure the security and confidentiality of customer records and
information
 To protect against any anticipated threats or hazards to the security
or integrity of such records
 To protect against unauthorized access to or use of such records or
information which could result in substantial harm or inconvenience to
any customer
HelpSystems Corporate Overview. All rights reserved.
But We Should All Take Note
Why Do We Act?
HelpSystems Corporate Overview. All rights reserved.
• Not everyone has to deal with a formal compliance mandate
– Not publicly traded
– Don’t process credit card information
– No personally identifying information
• But virtually everyone uses computers to run line-of-business
applications and being infected with viruses can lead to:
– Disrupt service
– Corrupt data
– Infect other devices and servers
– Disclose credentials
Lest We Not Forget: “Best Practices”
HelpSystems Corporate Overview. All rights reserved.
• Infections can spread across the network
• Confidential files can be sent to third parties
• Costly downtime
• Loss of professional reputation
• Legal liability as a result of data breaches
• Loss of data
What if I Don’t Scan my Power System?
UP NEXT...
Power Systems and Windows Viruses
Is my system at risk?
HelpSystems Corporate Overview. All rights reserved.
Power Systems and Windows Viruses
How is my system at risk?
Myth: The majority of viruses exploit flaws in Microsoft Windows
where only a Windows-based PC can be harmed.
Fact: A virus doesn’t need to target a specific OS in order to wreak
havoc on your operations!
– An infected PC with connections to your Power Server can perform any
action for which that PC has authority.
 Files can be deleted
 Settings and objects can be modified
 Your server could be shut down!
HelpSystems Corporate Overview. All rights reserved.
Good
• Fact: Viruses cannot hide inside RPG and CL programs.
• Fact: Viruses cannot hide inside physical and logical files.
• Fact: IBM i cannot run .exe files [that may contain viruses].
Bad
• Fact: Viruses can hide inside Java and Unix stream files.
• Fact: IBM i can run Java and UNIX executables.
• Fact: A Virus can rename / delete / encrypt ‘native’ objects.
I was told IBM i was Immune?!
UP NEXT...
Virus Prevention and Protection
HelpSystems Corporate Overview. All rights reserved.
The following are all helpful security layers but cannot guarantee that
Power Servers will not become infected or operate as the “perfect
host”
• Mail scanning
• Virus scanning on PC clients and other servers
• Firewalls
• Ignoring the risk
Security Measures That Won’t Protect Your Power System
HelpSystems Corporate Overview. All rights reserved.
• Implement and enforce security policies.
• Shut down unused services.
• Avoid oversharing.
• Limit access to servers.
• Enable auditing.
• Monitor so you will know right away [timeliness is the key].
• Get good backups.
• Scan for viruses regularly.
Virus Protection For Your Power System
HelpSystems Corporate Overview. All rights reserved.
How to Implement Anti-Virus on IBM i
• Purchase and install an AV engine.
• Decide whether to perform real-time scanning, and scheduled scans.
• Integrate with IBM-supplied exit points [real-time].
• Configure QSCANFS and QSCANFSCTL system values.
• Configure job schedule entries for AV engine and signature updates.
• Review logs.
Done!
HelpSystems Corporate Overview. All rights reserved.
How to Implement Anti-Virus on AIX
• Purchase and install an AV engine.
• Schedule avupdate to retrieve daily signature updates.
• Schedule avscan to perform scan on desired directories.
• Scheduling on AIX can be done with cron tab, or a third party scheduler
such as HelpSystems’ popular SkyBot Scheduler software.
• Review logs.
Done!
HelpSystems Corporate Overview. All rights reserved.
• Update virus signature files often! (Daily updates from McAfee)
• Schedule weekly “full” scans of files and directories.
• Schedule daily scans if a directory contains sensitive files.
• Review logs for scan results.
Anti-virus Best Practices
UP NEXT...
PC-Based Scanning vs. Native Scanning
Why security experts recommend a native scanning solution
HelpSystems Corporate Overview. All rights reserved.
PC-Based Scanning vs. Native Scanning
PC-based scanning
• Requires leaving a PC signed on
with full authority, compromising its
security and integrity
• The scanning PC can infect the
server with viruses
• The entire Power System is visible
to a virus or malicious code
Native virus scanning
• Doesn’t require an outside
connection with admin authority
• No data is transferred over the
network unencrypted
• Native solutions are not vulnerable
to virus infections or disablement
PC-based virus scanning creates security concerns
HelpSystems Corporate Overview. All rights reserved.
PC-Based Scanning vs. Native Scanning
PC-based scanning
• Power systems use file structures
not found on Windows that can
cause non-native scans to fail
• Pop-up failure alerts require human
monitoring and intervention
throughout the scanning process
• Very manual effort
Native virus scanning
• All files can be scanned easily
• No additional hardware is required
• All detected threats will be removed
• Can run fully automated
PC-based scanning isn’t reliable
HelpSystems Corporate Overview. All rights reserved.
PC-Based Scanning vs. Native Scanning
PC-based scanning
• There are a number of problems
with PC-based scanning solutions
that cause the scanning process to
stop.
– lost connections
– pop-up warning messages
– lost power
Native virus scanning
• Stability concerns simply aren’t an
issue when you use software that’s
running natively on your system.
Native virus scanning eliminates stability problems
HelpSystems Corporate Overview. All rights reserved.
PC-Based Scanning vs. Native Scanning
PC-based scanning
• Can be incredibly slow and
increases network load dramatically
 Transfer data from Power System to PC
 Scan the data
 Transfer the data back to the Power System
• PC scanning resets the files’ “last
access time” after scanning so all
scanned files will be unnecessarily
saved and backups will take longer
as a result.
Native virus scanning
• Do not increase your network load,
allowing for more frequent and fast
scanning
• Native scanning programs know
how to treat files and mark them
properly
• Can be triggered to run only when a
scan is necessary.
 Upon alteration of an object
 On-demand
 Via job schedulers
Virus scanning from a PC creates performance problems
UP NEXT...
The Truth About Viruses on Power Systems
Myths vs. Facts
HelpSystems Corporate Overview. All rights reserved.
Myth: We don’t use IBM i’s Integrated File System (IFS).
Fact: Most modern applications and protocols use the IFS extensively.
Myth: The Power System cannot get a virus.
Fact: Viruses can hide inside PC and Unix files, and Java Executables.
Myth: Viruses can’t attack the system architecture.
Fact: Anything an administrator can do, a virus can do.
Myths vs. Facts
HelpSystems Corporate Overview. All rights reserved.
Myth: Our Power System isn’t connected to the internet.
Fact: The cable doesn’t have to be physically connected. The Power
System isn’t an island if it’s on the network.
Myth: Our firewall protects us from viruses.
Fact: There is no single solution on any platform that gives you 100%
protection, including firewalls.
Myth: I can scan the Power System with my PC virus scanner.
Fact: PC-based solutions can be used but they may miss files, require
a manual process, and open many security holes.
Myths vs. Facts
UP NEXT...
Next Steps…
HelpSystems Corporate Overview. All rights reserved.
StandGuard Anti-Virus
HelpSystems Corporate Overview. All rights reserved.
StandGuard Anti-Virus
HelpSystems Corporate Overview. All rights reserved.
• Decompress and scan compressed files
• Detects Macros and script viruses
• Detects encrypted and polymorphic viruses
• Detects new viruses in executable files
• Detects “Trojan horses,” worms, and other kinds of malicious software
• Upgrades easily for new anti-virus technology
Why McAfee Commercial Scan Engine
HelpSystems Corporate Overview. All rights reserved.
Native Virus Scanning for Power Systems
HelpSystems StandGuard Anti-Virus
 System values and exit points unlock native anti-virus scanning
capabilities within IBM i.
 StandGuard Anti-Virus is the only commercial-grade anti-virus
engine for IBM i and is powered by McAfee (a division of Intel)
ensuring ongoing virus signatures and scan engine updates.
 Discover the performance and integrity advantages of native
scanning versus remote scanning.
 Benefit from real-time protection, as well as scheduled and on
demand scans.
 Access virus removal and quarantine functions.
 Scan IBM i, AIX, Linux (x86) and Lotus Domino databases
HelpSystems Corporate Overview. All rights reserved.
Be Comprehensive
HelpSystems Corporate Overview. All rights reserved.
HelpSystems At-A-Glance
HelpSystems Corporate Overview. All rights reserved.
• Expansive Software Portfolio, including Anti-Virus for Power Servers.
• Comprehensive Professional Services.
• World-Class Security Experts:
– Robin Tatam, CISM
– Carol Woodbury, CRISC
• Member of PCI Security Standards Council.
• Authorized by NASBA to Issue CPE Credits for Security Education.
• Publisher of the Annual “State of IBM i Security” Report.
About HelpSystems’ Security Investment
UP NEXT...
Questions

More Related Content

PDF
Tips to Remediate your Vulnerability Management Program
PPTX
How Malware Works
PPTX
How to Simplify PCI DSS Compliance with AlienVault USM
PDF
API Training 10 Nov 2014
PPTX
Incident response
PPTX
Introduction to Symantec Endpoint Management75.pptx
PDF
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
PPTX
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
Tips to Remediate your Vulnerability Management Program
How Malware Works
How to Simplify PCI DSS Compliance with AlienVault USM
API Training 10 Nov 2014
Incident response
Introduction to Symantec Endpoint Management75.pptx
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting

What's hot (20)

PDF
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
PPTX
Using Assessment Tools on ICS (English)
PPTX
Information Assurance Metrics: Practical Steps to Measurement
PDF
Unearth Active Directory Threats Before They Bury Your Enterprise
PDF
Avoid Meltdown from the Spectre - How to measure impact and track remediation
PPTX
Malware detection how to spot infections early with alien vault usm
PPTX
Mitigating Rapid Cyberattacks
PPTX
Otx introduction sw
PDF
Symantec Endpoint Protection 12
PPTX
Utilizing the Critical Security Controls to Secure Healthcare Technology
PDF
Finding the needle in the hardware haystack - HRES (1)
PPTX
The CIS Critical Security Controls the International Standard for Defense
PPTX
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
PDF
Security Framework from SANS
PPTX
Improve Security Visibility with AlienVault USM Correlation Directives
PPTX
Incident response live demo slides final
PPTX
Configuring Data Sources in AlienVault
DOC
Daddy Thwane. CV
PDF
Preventing zero day cyber attacks
PPSX
Enterprise mobileapplicationsecurity
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Using Assessment Tools on ICS (English)
Information Assurance Metrics: Practical Steps to Measurement
Unearth Active Directory Threats Before They Bury Your Enterprise
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Malware detection how to spot infections early with alien vault usm
Mitigating Rapid Cyberattacks
Otx introduction sw
Symantec Endpoint Protection 12
Utilizing the Critical Security Controls to Secure Healthcare Technology
Finding the needle in the hardware haystack - HRES (1)
The CIS Critical Security Controls the International Standard for Defense
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Security Framework from SANS
Improve Security Visibility with AlienVault USM Correlation Directives
Incident response live demo slides final
Configuring Data Sources in AlienVault
Daddy Thwane. CV
Preventing zero day cyber attacks
Enterprise mobileapplicationsecurity
Ad

Similar to The Truth About Viruses on Power Systems - Powertech (20)

PPTX
Simplify PCI DSS Compliance with AlienVault USM
PPTX
Internet safety and you
PPTX
computer virus full explain ppt.pptx
PDF
Unit 6_keylogger_Spywares_virus_worms.pdf
PPTX
Make Every Spin Count: Putting the Security Odds in Your Favor
PPTX
operating system Security presentation vol 3
PPTX
CS5300 class presentation on managing information systems
PPTX
Cyber Security and GDPR Made Easy
PDF
Microsoft Avanced Threat Analytics
PPTX
Azure Operation Management Suite - security and compliance
PPTX
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
PPT
Chapter1 intro network_security_sunorganised
PPTX
9 - Security
PPTX
IBM i Security: Identifying the Events That Matter Most
PPTX
BAIT1003 Chapter 11
PPTX
Introduction to cyber security
PPTX
securing_information_systems_._lec6.pptx
PPT
Protecting Your organization from WannaCry Ransomware
PPTX
Slide Deck CISSP Class Session 5
PPTX
Introduction to Network and System Administration
Simplify PCI DSS Compliance with AlienVault USM
Internet safety and you
computer virus full explain ppt.pptx
Unit 6_keylogger_Spywares_virus_worms.pdf
Make Every Spin Count: Putting the Security Odds in Your Favor
operating system Security presentation vol 3
CS5300 class presentation on managing information systems
Cyber Security and GDPR Made Easy
Microsoft Avanced Threat Analytics
Azure Operation Management Suite - security and compliance
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Chapter1 intro network_security_sunorganised
9 - Security
IBM i Security: Identifying the Events That Matter Most
BAIT1003 Chapter 11
Introduction to cyber security
securing_information_systems_._lec6.pptx
Protecting Your organization from WannaCry Ransomware
Slide Deck CISSP Class Session 5
Introduction to Network and System Administration
Ad

More from HelpSystems (20)

PPTX
El Estado de la Seguridad de IBM i en 2020
PPTX
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
PPTX
Rbt jdbc odbc webinar
PPTX
RPA en 45 minutos
PPTX
Webinar go anywhere_mft_scripts
PPTX
Automatización de Procesos de IT
PPTX
Hs 2020-ibmi-marketplace-spanish v3
PPTX
Mft 45 minutos
PPTX
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
PPTX
Centro de Excelencia en Automatización 3
PPTX
Cómo crear un Centro de Excelencia de Automatización 2
PPTX
Construyendo un Centro de Excelencia de Automatización PARTE 1
PPTX
Webinar Vityl IT & Business Monitoring
PPTX
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
PPTX
Mft 45 minutos
PPTX
Automate feature tour
PPTX
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
PPTX
5 problemas del intercambio de archivos mediante scripts
PPTX
CASO DE ÉXITO: Grupo Banco San Juan
PPTX
Webinar Security Scan
El Estado de la Seguridad de IBM i en 2020
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Rbt jdbc odbc webinar
RPA en 45 minutos
Webinar go anywhere_mft_scripts
Automatización de Procesos de IT
Hs 2020-ibmi-marketplace-spanish v3
Mft 45 minutos
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Centro de Excelencia en Automatización 3
Cómo crear un Centro de Excelencia de Automatización 2
Construyendo un Centro de Excelencia de Automatización PARTE 1
Webinar Vityl IT & Business Monitoring
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
Mft 45 minutos
Automate feature tour
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
5 problemas del intercambio de archivos mediante scripts
CASO DE ÉXITO: Grupo Banco San Juan
Webinar Security Scan

Recently uploaded (20)

PDF
System and Network Administration Chapter 2
PPTX
Transform Your Business with a Software ERP System
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
assetexplorer- product-overview - presentation
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Digital Strategies for Manufacturing Companies
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
history of c programming in notes for students .pptx
System and Network Administration Chapter 2
Transform Your Business with a Software ERP System
Design an Analysis of Algorithms II-SECS-1021-03
assetexplorer- product-overview - presentation
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Digital Systems & Binary Numbers (comprehensive )
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Navsoft: AI-Powered Business Solutions & Custom Software Development
Wondershare Filmora 15 Crack With Activation Key [2025
PTS Company Brochure 2025 (1).pdf.......
Digital Strategies for Manufacturing Companies
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Upgrade and Innovation Strategies for SAP ERP Customers
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Which alternative to Crystal Reports is best for small or large businesses.pdf
Reimagine Home Health with the Power of Agentic AI​
Why Generative AI is the Future of Content, Code & Creativity?
CHAPTER 2 - PM Management and IT Context
history of c programming in notes for students .pptx

The Truth About Viruses on Power Systems - Powertech

  • 1. All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved. The Truth About Viruses on Power Systems
  • 2. HelpSystems Corporate Overview. All rights reserved. Your Presenter Robin Tatam, CBCA CISM Director of Security Technologies +1 952-563-2768 robin.tatam@powertech.com
  • 3. HelpSystems Corporate Overview. All rights reserved. • What Are the Threats? • Why Should We Act? • Power System and Windows Viruses – Is My System at Risk? • Virus Prevention and Protection • PC-Based Scanning vs. Native Scanning • Some Additional Myths Debunked • Next Steps Objectives
  • 4. UP NEXT... What are The Threats?
  • 5. HelpSystems Corporate Overview. All rights reserved. • Computer viruses • Worms • Trojan Horses • Spyware & Adware • Rootkit • Ransomware • Malware • More… Types of Threats
  • 6. HelpSystems Corporate Overview. All rights reserved. • Unauthorized applications (infected web links etc.) • Code hidden and buried inside a different object • A program that is masquerading as something else (usually something innocent) Source of Threats
  • 7. HelpSystems Corporate Overview. All rights reserved. • FBI warns that ransomware and malware attacks are growing exponentially. • 30% increase in ransomware victims in Q1 2016 compared to Q4 2015 (reported by security vendor Kaspersky Lab) • 61% increase in the number of unique malware families over the first half of 2016 (Check Point Software Technologies’ June Threat Index) • Nearly 1 million malware threats are released every day (CNN, 2015) • Viruses like Locky and CryptoLocker are mutating (CNBC, June 2016) The Threat is Growing
  • 8. HelpSystems Corporate Overview. All rights reserved. The Threat is Ever Evolving
  • 10. HelpSystems Corporate Overview. All rights reserved. Often, Because We Have No Choice Why Do We Act?
  • 11. HelpSystems Corporate Overview. All rights reserved. Virus Protection and Regulatory Compliance PCI DSS Payment Card Industry Data Security Standard (PCI DSS) Requirement 5 If you deal with payment card information, PCI DSS requires that all servers in your network that are ‘in scope’ must have virus protection.
  • 12. HelpSystems Corporate Overview. All rights reserved. Virus Protection and Regulatory Compliance HIPAA Health Insurance Portability and Accountability Act (HIPAA) § 164.306 Security Standards: General Rules  Ensure the confidentiality, integrity, and availability of all electronic protected health information the covered entity creates, receives, maintains, or transmits.  Protect against any reasonably anticipated threats or hazards to the security or integrity of such information.  Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level.
  • 13. HelpSystems Corporate Overview. All rights reserved. Virus Protection and Regulatory Compliance GLB Act Gramm-Leach-Bliley Act § 501: Protection Of Nonpublic Personal Information  To ensure the security and confidentiality of customer records and information  To protect against any anticipated threats or hazards to the security or integrity of such records  To protect against unauthorized access to or use of such records or information which could result in substantial harm or inconvenience to any customer
  • 14. HelpSystems Corporate Overview. All rights reserved. But We Should All Take Note Why Do We Act?
  • 15. HelpSystems Corporate Overview. All rights reserved. • Not everyone has to deal with a formal compliance mandate – Not publicly traded – Don’t process credit card information – No personally identifying information • But virtually everyone uses computers to run line-of-business applications and being infected with viruses can lead to: – Disrupt service – Corrupt data – Infect other devices and servers – Disclose credentials Lest We Not Forget: “Best Practices”
  • 16. HelpSystems Corporate Overview. All rights reserved. • Infections can spread across the network • Confidential files can be sent to third parties • Costly downtime • Loss of professional reputation • Legal liability as a result of data breaches • Loss of data What if I Don’t Scan my Power System?
  • 17. UP NEXT... Power Systems and Windows Viruses Is my system at risk?
  • 18. HelpSystems Corporate Overview. All rights reserved. Power Systems and Windows Viruses How is my system at risk? Myth: The majority of viruses exploit flaws in Microsoft Windows where only a Windows-based PC can be harmed. Fact: A virus doesn’t need to target a specific OS in order to wreak havoc on your operations! – An infected PC with connections to your Power Server can perform any action for which that PC has authority.  Files can be deleted  Settings and objects can be modified  Your server could be shut down!
  • 19. HelpSystems Corporate Overview. All rights reserved. Good • Fact: Viruses cannot hide inside RPG and CL programs. • Fact: Viruses cannot hide inside physical and logical files. • Fact: IBM i cannot run .exe files [that may contain viruses]. Bad • Fact: Viruses can hide inside Java and Unix stream files. • Fact: IBM i can run Java and UNIX executables. • Fact: A Virus can rename / delete / encrypt ‘native’ objects. I was told IBM i was Immune?!
  • 20. UP NEXT... Virus Prevention and Protection
  • 21. HelpSystems Corporate Overview. All rights reserved. The following are all helpful security layers but cannot guarantee that Power Servers will not become infected or operate as the “perfect host” • Mail scanning • Virus scanning on PC clients and other servers • Firewalls • Ignoring the risk Security Measures That Won’t Protect Your Power System
  • 22. HelpSystems Corporate Overview. All rights reserved. • Implement and enforce security policies. • Shut down unused services. • Avoid oversharing. • Limit access to servers. • Enable auditing. • Monitor so you will know right away [timeliness is the key]. • Get good backups. • Scan for viruses regularly. Virus Protection For Your Power System
  • 23. HelpSystems Corporate Overview. All rights reserved. How to Implement Anti-Virus on IBM i • Purchase and install an AV engine. • Decide whether to perform real-time scanning, and scheduled scans. • Integrate with IBM-supplied exit points [real-time]. • Configure QSCANFS and QSCANFSCTL system values. • Configure job schedule entries for AV engine and signature updates. • Review logs. Done!
  • 24. HelpSystems Corporate Overview. All rights reserved. How to Implement Anti-Virus on AIX • Purchase and install an AV engine. • Schedule avupdate to retrieve daily signature updates. • Schedule avscan to perform scan on desired directories. • Scheduling on AIX can be done with cron tab, or a third party scheduler such as HelpSystems’ popular SkyBot Scheduler software. • Review logs. Done!
  • 25. HelpSystems Corporate Overview. All rights reserved. • Update virus signature files often! (Daily updates from McAfee) • Schedule weekly “full” scans of files and directories. • Schedule daily scans if a directory contains sensitive files. • Review logs for scan results. Anti-virus Best Practices
  • 26. UP NEXT... PC-Based Scanning vs. Native Scanning Why security experts recommend a native scanning solution
  • 27. HelpSystems Corporate Overview. All rights reserved. PC-Based Scanning vs. Native Scanning PC-based scanning • Requires leaving a PC signed on with full authority, compromising its security and integrity • The scanning PC can infect the server with viruses • The entire Power System is visible to a virus or malicious code Native virus scanning • Doesn’t require an outside connection with admin authority • No data is transferred over the network unencrypted • Native solutions are not vulnerable to virus infections or disablement PC-based virus scanning creates security concerns
  • 28. HelpSystems Corporate Overview. All rights reserved. PC-Based Scanning vs. Native Scanning PC-based scanning • Power systems use file structures not found on Windows that can cause non-native scans to fail • Pop-up failure alerts require human monitoring and intervention throughout the scanning process • Very manual effort Native virus scanning • All files can be scanned easily • No additional hardware is required • All detected threats will be removed • Can run fully automated PC-based scanning isn’t reliable
  • 29. HelpSystems Corporate Overview. All rights reserved. PC-Based Scanning vs. Native Scanning PC-based scanning • There are a number of problems with PC-based scanning solutions that cause the scanning process to stop. – lost connections – pop-up warning messages – lost power Native virus scanning • Stability concerns simply aren’t an issue when you use software that’s running natively on your system. Native virus scanning eliminates stability problems
  • 30. HelpSystems Corporate Overview. All rights reserved. PC-Based Scanning vs. Native Scanning PC-based scanning • Can be incredibly slow and increases network load dramatically  Transfer data from Power System to PC  Scan the data  Transfer the data back to the Power System • PC scanning resets the files’ “last access time” after scanning so all scanned files will be unnecessarily saved and backups will take longer as a result. Native virus scanning • Do not increase your network load, allowing for more frequent and fast scanning • Native scanning programs know how to treat files and mark them properly • Can be triggered to run only when a scan is necessary.  Upon alteration of an object  On-demand  Via job schedulers Virus scanning from a PC creates performance problems
  • 31. UP NEXT... The Truth About Viruses on Power Systems Myths vs. Facts
  • 32. HelpSystems Corporate Overview. All rights reserved. Myth: We don’t use IBM i’s Integrated File System (IFS). Fact: Most modern applications and protocols use the IFS extensively. Myth: The Power System cannot get a virus. Fact: Viruses can hide inside PC and Unix files, and Java Executables. Myth: Viruses can’t attack the system architecture. Fact: Anything an administrator can do, a virus can do. Myths vs. Facts
  • 33. HelpSystems Corporate Overview. All rights reserved. Myth: Our Power System isn’t connected to the internet. Fact: The cable doesn’t have to be physically connected. The Power System isn’t an island if it’s on the network. Myth: Our firewall protects us from viruses. Fact: There is no single solution on any platform that gives you 100% protection, including firewalls. Myth: I can scan the Power System with my PC virus scanner. Fact: PC-based solutions can be used but they may miss files, require a manual process, and open many security holes. Myths vs. Facts
  • 35. HelpSystems Corporate Overview. All rights reserved. StandGuard Anti-Virus
  • 36. HelpSystems Corporate Overview. All rights reserved. StandGuard Anti-Virus
  • 37. HelpSystems Corporate Overview. All rights reserved. • Decompress and scan compressed files • Detects Macros and script viruses • Detects encrypted and polymorphic viruses • Detects new viruses in executable files • Detects “Trojan horses,” worms, and other kinds of malicious software • Upgrades easily for new anti-virus technology Why McAfee Commercial Scan Engine
  • 38. HelpSystems Corporate Overview. All rights reserved. Native Virus Scanning for Power Systems HelpSystems StandGuard Anti-Virus  System values and exit points unlock native anti-virus scanning capabilities within IBM i.  StandGuard Anti-Virus is the only commercial-grade anti-virus engine for IBM i and is powered by McAfee (a division of Intel) ensuring ongoing virus signatures and scan engine updates.  Discover the performance and integrity advantages of native scanning versus remote scanning.  Benefit from real-time protection, as well as scheduled and on demand scans.  Access virus removal and quarantine functions.  Scan IBM i, AIX, Linux (x86) and Lotus Domino databases
  • 39. HelpSystems Corporate Overview. All rights reserved. Be Comprehensive
  • 40. HelpSystems Corporate Overview. All rights reserved. HelpSystems At-A-Glance
  • 41. HelpSystems Corporate Overview. All rights reserved. • Expansive Software Portfolio, including Anti-Virus for Power Servers. • Comprehensive Professional Services. • World-Class Security Experts: – Robin Tatam, CISM – Carol Woodbury, CRISC • Member of PCI Security Standards Council. • Authorized by NASBA to Issue CPE Credits for Security Education. • Publisher of the Annual “State of IBM i Security” Report. About HelpSystems’ Security Investment