SlideShare ist ein Scribd-Unternehmen logo
1 von 43
The Truth About Viruses on IBM i
2
Your Presenters
ROBIN TATAM
Director of Security Technologies
robin.tatam@helpsystems.com
SANDI MOORE
Senior Technical Consultant
sandi.moore@helpsystems.com
3
Today’s Objectives
• Viruses and the Integrated File System
• Power System and Windows Viruses
• Prevention and Protection
• PC-Based Scanning vs. Native IBM i Scanning
• Some Myths and Facts
4
What Is the Integrated File System?
5
Integrated File System Relating to Viruses
• QDLS
• Root (/)
• QOpenSys
• UDFS
• QNTC
6
How Viruses Get into the IFS
7
How Viruses Get into the IFS
• Mapped drives
8
How Viruses Get into the IFS
• Mapped drives
9
How Viruses Get into the IFS
• Mapped drives
10
How Viruses Get into the IFS
• Mapped drives
11
How Viruses Get into the IFS
• Mapped drives
12
How Viruses Get into the IFS
• FTP
13
How Viruses Get into the IFS
• FTP
14
How Viruses Get into the IFS
• FTP
15
How Viruses Get into the IFS
• Image catalogs
• NFS mounts
• UDFS mounts
16
How Viruses Get into the IFS
• Client access
17
How Viruses Get into the IFS
• Web servers
18
How Viruses Get into the IFS
• Internet downloads
• Removable media
• Internet browsing
• Laptops or wireless devices
• Email
• VPNs
• File sharing
19
Can Windows Viruses Affect IBM i?
Fact: Viruses cannot hide inside RPG and CL programs.
Fact: Viruses cannot hide inside physical and logical files.
Fact: IBM i cannot run .exe files that contain viruses.
Fact: Viruses can hide inside Java and Unix stream files.
Fact: IBM i can run Java and UNIX executables.
20
Can Windows Viruses Affect IBM i?
• Malicious programs
21
Can Windows Viruses Affect IBM i?
• Malicious programs
22
Can Windows Viruses Affect IBM i?
• Malicious programs
23
Can Windows Viruses Affect IBM i?
• Denial of Service (DOS) attack
24
What’s at Risk?
• Operating System
25
What’s at Risk?
• Operating System
26
What’s at Risk?
• Operating System
27
Virus Protection on the Power System
TCP/IP
Websphere
IBM i Client
Access
Operations
Navigator
Growing Number
of IBM i
Applications
Domino
MQ Series
28
Security Measures That Won’t Protect
• Mail scanning
• Virus scanning on clients
• Firewalls
29
Virus Protection on the Power System
• Implement and enforce security policies
• Shut down unused services
• Avoid oversharing
• Scan for viruses regularly
• Use exit programs to restrict access to servers
• Enable auditing
• Monitor so you will know right away
• Get good backups
30
Virus Scanning from a PC
• Dedicate a PC for scanning
• Map a drive to Root with *ALLOBJ
• Physically secure the PC
• Ensure PC has internet access
• Scan the PC daily
• Automate monitoring of the PC
• Follow IBM’s procedures
31
Virus Scanning from a PC
IBM’s Recommendations
Step 1: To end all Netserver and File Server jobs, run the following commands:
ENDPJ SBS(QSERVER) PGM(QSYS/QZLSFILE) OPTION(*IMMED)
ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSO) OPTION(*IMMED)
ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSS) OPTION(*IMMED)
ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSERVS2) OPTION(*IMMED)
ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSTP0) OPTION(*IMMED)
ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSTP1) OPTION(*IMMED)
ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSTP2) OPTION(*IMMED)
Step 2: Change the QZLSFILE prestart job description to allow only one Netserver job to start and then start that job:
CHGPJE SBSD(QSERVER) +
PGM(QSYS/QZLSFILE) INLJOBS(1) THRESHOLD(1) ADLJOBS(0)
STRPJ SBS(QSERVER) PGM(QSYS/QZLSFILE)
32
Virus Scanning from a PC
Step 3: Perform the Scan. The user who will be doing the scan should map a network drive to the Power System.
Step 4: Change the NetServer prestart job back:
CHGPJE SBSD(QSERVER) +
PGM(QSYS/QZLSFILE) INLJOBS(1) THRESHOLD(1) ADLJOBS(5)
Step 5: Restart the Netserver and File Server Host Server jobs by running the following commands:
STRPJ SBS(QSERVER) PGM(QSYS/QZLSFILE)
STRPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSO)
STRPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSS)
STRPJ SBS(QSERVER) PGM(QSYS/QPWFSERVS2)
STRPJ SBS(QSERVER) PGM(QSYS/QPWFSTP0)
STRPJ SBS(QSERVER) PGM(QSYS/QPWFSTP1)
STRPJ SBS(QSERVER) PGM(QSYS/QPWFSTP2)
33
Virus Scanning from a PC
• Security concerns
• Leaving a PC signed on with full authority
• Confidential data is visible
• PC can infect the IFS
34
Virus Scanning from a PC
• Reliabilty/Stability concerns
• Parts of IFS cannot be scanned
• Scanning process can stop entirely
• PC scanning is manual process
35
Virus Scanning from a PC
• Performance concerns
• Increased network load
• Unable to use SAVCHGOBJ after scanning
• Backups take longer
• Very slow
36
Native IBM i Virus Scanning
• Secure
• Reliable
• Stable
• Optimized performance
37
Native IBM i Virus Scanning
• Security enabled
• Does not require *ALLOBJ
• No data is transferred
• Not Windows-based!
38
Native IBM i Virus Scanning
• Reliable/Stable
• Automated
• No additional hardware
• Easily monitored
• Can scan all files
• Can detect and remove threats
39
Native IBM i Virus Scanning
• Performance optimized
• Does not increase network load
• Does not reset a file’s “Last Access Time”
• Allows scanning more frequently
• Very fast!
40
Myths and Facts
Myth: We don’t use the IFS.
Fact: Most modern applications and protocols use the IFS extensively.
Myth: The Power System cannot get a virus.
Fact: Viruses can hide inside Java and Unix files and IBM i can execute
them.
Myth: Viruses can’t attack the IBM i architecture.
Fact: Anything an administrator can do, a virus can do.
41
Myths and Facts
Myth: Our Power System isn’t connected to the internet.
Fact: The cable doesn’t have to be physically connected. The Power
System isn’t an island if it’s on the network.
Myth: Our firewall protects us from viruses.
Fact: There is no single solution on any platform that gives you
protection, including firewalls.
Myth: I can scan the Power System with my PC virus scanner.
Fact: PC-based solutions can be used but they may miss files, require a
manual process, and open many security holes.
42
Questions?
43
Thanks for your time!
800-328-1000
info.powertech@helpsystems.com
www.helpsystems.com/powertech

Weitere ähnliche Inhalte

Was ist angesagt?

Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
PacSecJP
 
Csw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelistingCsw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelisting
CanSecWest
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Codiax
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
247infotech
 
Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2
PacSecJP
 
Final project
Final projectFinal project
Final project
rippea
 

Was ist angesagt? (20)

Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
 
Csw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelistingCsw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelisting
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
 
Enterprise Forensics 101
Enterprise Forensics 101Enterprise Forensics 101
Enterprise Forensics 101
 
Abdulkarim 1 and 2
Abdulkarim 1 and 2Abdulkarim 1 and 2
Abdulkarim 1 and 2
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection Plus
 
Code Europe PL - Securing the JVM: Neither for fun nor for profit, but do you...
Code Europe PL - Securing the JVM: Neither for fun nor for profit, but do you...Code Europe PL - Securing the JVM: Neither for fun nor for profit, but do you...
Code Europe PL - Securing the JVM: Neither for fun nor for profit, but do you...
 
Voxxed Days Athens - Securing the JVM - Neither for fun nor for profit, but d...
Voxxed Days Athens - Securing the JVM - Neither for fun nor for profit, but d...Voxxed Days Athens - Securing the JVM - Neither for fun nor for profit, but d...
Voxxed Days Athens - Securing the JVM - Neither for fun nor for profit, but d...
 
Network Security Through FIREWALL
Network Security Through FIREWALLNetwork Security Through FIREWALL
Network Security Through FIREWALL
 
Security in an embedded system
Security in an embedded system Security in an embedded system
Security in an embedded system
 
QIWI SOC benchmarking: Blue Team story
QIWI SOC benchmarking: Blue Team storyQIWI SOC benchmarking: Blue Team story
QIWI SOC benchmarking: Blue Team story
 
Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1
 
Firewall
FirewallFirewall
Firewall
 
[CB19] Hardware Wallet Security
[CB19] Hardware Wallet Security[CB19] Hardware Wallet Security
[CB19] Hardware Wallet Security
 
Hacker tool talk: kismet
Hacker tool talk:  kismetHacker tool talk:  kismet
Hacker tool talk: kismet
 
Final project
Final projectFinal project
Final project
 

Andere mochten auch (6)

Anticoncepci+¦n y +®tica, sexualidad humana y bio+®tica
Anticoncepci+¦n y +®tica, sexualidad humana y bio+®ticaAnticoncepci+¦n y +®tica, sexualidad humana y bio+®tica
Anticoncepci+¦n y +®tica, sexualidad humana y bio+®tica
 
Beth_Resume_(1)[1]
Beth_Resume_(1)[1]Beth_Resume_(1)[1]
Beth_Resume_(1)[1]
 
Anticoncepción y ética, sexualidad humana y bioética
Anticoncepción y ética, sexualidad humana y bioéticaAnticoncepción y ética, sexualidad humana y bioética
Anticoncepción y ética, sexualidad humana y bioética
 
Versteckte Akzeptanzkiller. Webinar 4 der Webinarreihe von Beck et al. Services
Versteckte Akzeptanzkiller. Webinar 4 der Webinarreihe von Beck et al. ServicesVersteckte Akzeptanzkiller. Webinar 4 der Webinarreihe von Beck et al. Services
Versteckte Akzeptanzkiller. Webinar 4 der Webinarreihe von Beck et al. Services
 
executive coach ICC
executive coach ICCexecutive coach ICC
executive coach ICC
 
AiTi Education Profile
AiTi Education ProfileAiTi Education Profile
AiTi Education Profile
 

Ähnlich wie The Truth About Viruses on IBM i

CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 

Ähnlich wie The Truth About Viruses on IBM i (20)

Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
 
The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - Powertech
 
1E_ITPF203333333333333333314_Bigfix.pptx
1E_ITPF203333333333333333314_Bigfix.pptx1E_ITPF203333333333333333314_Bigfix.pptx
1E_ITPF203333333333333333314_Bigfix.pptx
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and Viruses
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Dealing with legacy code
Dealing with legacy codeDealing with legacy code
Dealing with legacy code
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access Security
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Virusppt
ViruspptVirusppt
Virusppt
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KLBreaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
 
Fault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis ProtocolsFault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis Protocols
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Essential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security ConfigurationEssential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security Configuration
 

Mehr von HelpSystems

Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
HelpSystems
 

Mehr von HelpSystems (20)

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scripts
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de IT
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business Monitoring
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tour
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San Juan
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security Scan
 

Kürzlich hochgeladen

%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Kürzlich hochgeladen (20)

Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 

The Truth About Viruses on IBM i

  • 1. The Truth About Viruses on IBM i
  • 2. 2 Your Presenters ROBIN TATAM Director of Security Technologies robin.tatam@helpsystems.com SANDI MOORE Senior Technical Consultant sandi.moore@helpsystems.com
  • 3. 3 Today’s Objectives • Viruses and the Integrated File System • Power System and Windows Viruses • Prevention and Protection • PC-Based Scanning vs. Native IBM i Scanning • Some Myths and Facts
  • 4. 4 What Is the Integrated File System?
  • 5. 5 Integrated File System Relating to Viruses • QDLS • Root (/) • QOpenSys • UDFS • QNTC
  • 6. 6 How Viruses Get into the IFS
  • 7. 7 How Viruses Get into the IFS • Mapped drives
  • 8. 8 How Viruses Get into the IFS • Mapped drives
  • 9. 9 How Viruses Get into the IFS • Mapped drives
  • 10. 10 How Viruses Get into the IFS • Mapped drives
  • 11. 11 How Viruses Get into the IFS • Mapped drives
  • 12. 12 How Viruses Get into the IFS • FTP
  • 13. 13 How Viruses Get into the IFS • FTP
  • 14. 14 How Viruses Get into the IFS • FTP
  • 15. 15 How Viruses Get into the IFS • Image catalogs • NFS mounts • UDFS mounts
  • 16. 16 How Viruses Get into the IFS • Client access
  • 17. 17 How Viruses Get into the IFS • Web servers
  • 18. 18 How Viruses Get into the IFS • Internet downloads • Removable media • Internet browsing • Laptops or wireless devices • Email • VPNs • File sharing
  • 19. 19 Can Windows Viruses Affect IBM i? Fact: Viruses cannot hide inside RPG and CL programs. Fact: Viruses cannot hide inside physical and logical files. Fact: IBM i cannot run .exe files that contain viruses. Fact: Viruses can hide inside Java and Unix stream files. Fact: IBM i can run Java and UNIX executables.
  • 20. 20 Can Windows Viruses Affect IBM i? • Malicious programs
  • 21. 21 Can Windows Viruses Affect IBM i? • Malicious programs
  • 22. 22 Can Windows Viruses Affect IBM i? • Malicious programs
  • 23. 23 Can Windows Viruses Affect IBM i? • Denial of Service (DOS) attack
  • 24. 24 What’s at Risk? • Operating System
  • 25. 25 What’s at Risk? • Operating System
  • 26. 26 What’s at Risk? • Operating System
  • 27. 27 Virus Protection on the Power System TCP/IP Websphere IBM i Client Access Operations Navigator Growing Number of IBM i Applications Domino MQ Series
  • 28. 28 Security Measures That Won’t Protect • Mail scanning • Virus scanning on clients • Firewalls
  • 29. 29 Virus Protection on the Power System • Implement and enforce security policies • Shut down unused services • Avoid oversharing • Scan for viruses regularly • Use exit programs to restrict access to servers • Enable auditing • Monitor so you will know right away • Get good backups
  • 30. 30 Virus Scanning from a PC • Dedicate a PC for scanning • Map a drive to Root with *ALLOBJ • Physically secure the PC • Ensure PC has internet access • Scan the PC daily • Automate monitoring of the PC • Follow IBM’s procedures
  • 31. 31 Virus Scanning from a PC IBM’s Recommendations Step 1: To end all Netserver and File Server jobs, run the following commands: ENDPJ SBS(QSERVER) PGM(QSYS/QZLSFILE) OPTION(*IMMED) ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSO) OPTION(*IMMED) ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSS) OPTION(*IMMED) ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSERVS2) OPTION(*IMMED) ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSTP0) OPTION(*IMMED) ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSTP1) OPTION(*IMMED) ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSTP2) OPTION(*IMMED) Step 2: Change the QZLSFILE prestart job description to allow only one Netserver job to start and then start that job: CHGPJE SBSD(QSERVER) + PGM(QSYS/QZLSFILE) INLJOBS(1) THRESHOLD(1) ADLJOBS(0) STRPJ SBS(QSERVER) PGM(QSYS/QZLSFILE)
  • 32. 32 Virus Scanning from a PC Step 3: Perform the Scan. The user who will be doing the scan should map a network drive to the Power System. Step 4: Change the NetServer prestart job back: CHGPJE SBSD(QSERVER) + PGM(QSYS/QZLSFILE) INLJOBS(1) THRESHOLD(1) ADLJOBS(5) Step 5: Restart the Netserver and File Server Host Server jobs by running the following commands: STRPJ SBS(QSERVER) PGM(QSYS/QZLSFILE) STRPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSO) STRPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSS) STRPJ SBS(QSERVER) PGM(QSYS/QPWFSERVS2) STRPJ SBS(QSERVER) PGM(QSYS/QPWFSTP0) STRPJ SBS(QSERVER) PGM(QSYS/QPWFSTP1) STRPJ SBS(QSERVER) PGM(QSYS/QPWFSTP2)
  • 33. 33 Virus Scanning from a PC • Security concerns • Leaving a PC signed on with full authority • Confidential data is visible • PC can infect the IFS
  • 34. 34 Virus Scanning from a PC • Reliabilty/Stability concerns • Parts of IFS cannot be scanned • Scanning process can stop entirely • PC scanning is manual process
  • 35. 35 Virus Scanning from a PC • Performance concerns • Increased network load • Unable to use SAVCHGOBJ after scanning • Backups take longer • Very slow
  • 36. 36 Native IBM i Virus Scanning • Secure • Reliable • Stable • Optimized performance
  • 37. 37 Native IBM i Virus Scanning • Security enabled • Does not require *ALLOBJ • No data is transferred • Not Windows-based!
  • 38. 38 Native IBM i Virus Scanning • Reliable/Stable • Automated • No additional hardware • Easily monitored • Can scan all files • Can detect and remove threats
  • 39. 39 Native IBM i Virus Scanning • Performance optimized • Does not increase network load • Does not reset a file’s “Last Access Time” • Allows scanning more frequently • Very fast!
  • 40. 40 Myths and Facts Myth: We don’t use the IFS. Fact: Most modern applications and protocols use the IFS extensively. Myth: The Power System cannot get a virus. Fact: Viruses can hide inside Java and Unix files and IBM i can execute them. Myth: Viruses can’t attack the IBM i architecture. Fact: Anything an administrator can do, a virus can do.
  • 41. 41 Myths and Facts Myth: Our Power System isn’t connected to the internet. Fact: The cable doesn’t have to be physically connected. The Power System isn’t an island if it’s on the network. Myth: Our firewall protects us from viruses. Fact: There is no single solution on any platform that gives you protection, including firewalls. Myth: I can scan the Power System with my PC virus scanner. Fact: PC-based solutions can be used but they may miss files, require a manual process, and open many security holes.
  • 43. 43 Thanks for your time! 800-328-1000 info.powertech@helpsystems.com www.helpsystems.com/powertech