May 7996
Network Security
1VIRUS NEWS Warning issued on new type of Word macro virus Magnetics Reflex Laboratories has uncovered a new type of macro virus that could pose a major threat to users of Microsoft Word for WindowsThe new macro virus uses a hitherto unknown way of activating. Reflex have named this activation method ‘Challenge’. The method makes use of an obscure and undocumented feature of Word for Windows. This enables the writer to start the macro virus without using any of the auto macro commandsJust by opening a Word document infected with this new type of virus, PC users will expose themselves to the effects of its payload. Reflex are now in the process of working on ways to defend against this new type of virus, They claim they will be in a position to deliver effective protection against it within a few weeks. for further information, confucf David Aubrey-Jones, Reflex Magnefics Lfd on: +44 I77 372 6666.
! MARKET &WS Encryption battle sees possible break through Advocates of encryption software are stepping up efforts in the States to loosen export restrictions on the controversial technology, reports the Wall Street Journal. Republican Senator Conrad expected to Burns is introduce a bill that would the federal ease government’s export rules.
2
-_-
-. .-~__--..-_.
_-_____
Firewull market dw&opments The market for Internet firewalls is heating up further as companies implement corporate intranets and seek ways to protect them. Compu#etworld reveals that Trusted Information Systems Inc. has introduced the Gauntlet lntranet firewall to protect intranets from intrusion by unauthorized employees. Sometimes an intranet firewall is set up to protect sensitive organizational units, such as payroll, from intrusions by employees outside those units while still allowing employees in that operation to use the full corporate network and the Internet. For example, Boston Edison Co. uses three firewalls - one from Checkpoint Software Technologies Ltd and two routers - to protect the corporate WAN and the LANs at 20 sites in the USA. The arrangement protects the utility in three ways. It blocks access to the corporate network by outsiders on the Internet. It blocks unauthorized employees from accessing several protected subnetworks, or intranets. It prevents employees from accessing the Internet in ways that policy forbids. In addition to the move to intranet firewalls, firewall vendors are beginning to break out of the traditional Unix moulds.
Those in favour of the reduction of restrictions placed on the export of encryption products are seeking support on the Internet. The Clinton adminstration has opposed the export of stronger encryption on the grounds that terrorists could use it to conduct operations without monitored. But being technology executives contend that these regulations hamper their ability to compete overseas. Because the regulations govern any software that incorporates the technology to keep data secure, they can impede exports of electronic-mail systems, WWW other software and Internet-related products, The new bill would give software makers free reign to sell scrambling systems overseas as long as the same systems are widely available in the USA. The new bill has been crafted to focus more tightly on ending export curbs without attacking other encryption-related issues.
Encryption supports will launch a ‘Golden Key Campaign’to garner backing on the World Wide Web.
: COMPANY / NE Enhanced network security offered An agreement has been reached between Secure Computing Corp.(a producer of firewall technology) and Security Dynamics Technologies Inc. to support Security Dynamics SecurlD and ACE/Server technologies in conjunction with Secure Computing’s Sindwinder The Internet firewall. companies hope that their agreement will enable customers to “mix and match security products”. SecurlD offers athentication technology which is an alternative to passwords for identification of persons attempting to sign onto a computer network. This,
01996 Elsevier Science Ltd
Network Security
May I996
data file across the Internet. For full system backups, the product integrated a disaster recovery module called ImageStor which utilizes image-based backup technology to create a baseline snapshot of the entire primary storage system.
with corn bined the Sidewinder firewall which restricts an individual’s actions once they are on the network, means that unauthorized access and actions are impossible. virtually ACE/Server network security software works in conjunction with the SecurlD token and provides Sidewinder firewall users with a level of user authentication significantly secure than the more reusable password typically provided in Internet firewall technology. To access a protected network, the user enters his secret personal number identification followed by the current code displayed on the SecurlD token’s LCD. for further information, contact Julie Herubin on + I 6 12 628 2745.
PRODUCT , NEWS
~ --!
The Internet-enabled backup solution McAfee has announced that it has begun shipping WebStor which they claim is the first Internet-enabled backup According to solution. research, 90% of all data requests originating from end-users are not the results of disasters, but are instead caused by the loss of a single data file, such as a word processor or spreadsheet WebStor is document. designed to use the Internet TV address the backup requirements of these types of smaller, more dynamic data files. Using a 14.4 kbps modem it would take seven seconds to recover an average 10 K
01996 Elsevier Science Ltd
Also included in the product is Protection Manager, a feature which helps the user identify personal data files that need to be backed up on a regular basis.Once these files have been identified, WebStor can automatically launch unattended backups on a scheduled basis. The product provides on-demand data backup and restore capabilities 24 hours a day without the intervention of an administrator. It relieves users from the sessionorientation of traditional tape-based solutions by supporting tape-less backups over the Internet. For further information, contact Caroline Kuipers, McAfee Associates on: +44 7344 304730. _
Private information sent safely over public frame relay network Racal-Datacom claims its new product Datacryptor 64F can provide communications security over public frame relay networks on an ‘end-to-end’ basis. End-to-end encryption, using the Data Encryption Standard (DES) algorithm, protects data from the source to the destination by encrypting prior to transmission and decrypting after arriving at the final destination. Address and control information, however, remains
unencrypted and ‘in the clear’ for proper routing through the frame relay network. Datacryptor 64F frame relay encryptor, designed to meet Federal Information Protection Standard (FIPS) 140-l for government and commercial applications also meets the American National Standards Institute (ANSI) X9.17 Key Management Standard. Each individual virtual circuit is protected with a unique crypto-key for optimum security. Under user control, some connections can be encrypted while others are not, saving the cost of installing encryption devices at frame relay sites that do not require security. The product provides centralized key management of an entire network of Datacryptor units. When used with the Key Center, a three-key hierarchy is implemented for management. When used without the Key Center, a two-key hierarchy is used, In both cases the customer is assured of secure key distribution and control. Key changes can be performed automatically without operator intervention. Cryptographic service messages are authenticated using a secure protocol ensuring information integrity. The product is designed to restrict unauthorized internal access. An anti-tamper switch activates if any unauthorized attempt is made to remove the cover. Upon activation, all stored cryptographic keys are automatically erased. for further information, contact Deborah Ford-Douthit, Racal-Dafacom on: + 1 305 846 5587.