HOME     MENU     SEARCH     NEWSLETTER    
NEWS & INFORMATION FOR TECHNOLOGY PURCHASERS. UPDATED 4 MINUTES AGO.
You are here: Home / Data Security / Microsoft Suggests PC Quarantines
The Innovative CIO:
Stanford Graduate School of Business weeklong immersion program.
Download Brochure.
Microsoft Official Suggests Quarantining Infected PCs
Microsoft Official Suggests Quarantining Infected PCs
By Barry Levine / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
OCTOBER
07
2010
Infected computers should be quarantined. That's the recommendation of Scott Charney, vice president for Microsoft's Trustworthy Computing effort, in a speech Tuesday at the International Security Solutions Europe Conference in Berlin, Germany.

Charney also made the recommendation on his blog and in a paper published by Microsoft. His recommendation is based on lessons from public health, where quarantining people can be an effective response to a virulent virus outbreak.

'Considerable Paralysis'

His solution is particularly directed at combating botnets, where organized cybercriminals control entire networks of computers.

On Microsoft's TechNet blog, Charney wrote that most computer-security experts believe "a persistent adversary will more often than not be successful in attacking systems," particularly if "raising defenses" is the only response.

Because of this, he argued, attention needs to be paid to deterring these attacks -- especially by government agencies, which have the power to investigate criminal activity and utilize a wide range of tools and resources. But, he added, neither governments nor industries are "well-positioned" to respond to such a complex threat, and, as a result, "there is considerable paralysis."

The implementation of public-health models, Charney argued, could be the best approach. Firewalls, antivirus tools, and automatic updates for security patches can reduce risk, but many consumer computers still become unwitting participants in a botnet or malware hosts.

"To realize this vision," he wrote, "there are steps that can be taken by governments, the IT industry, Internet access providers, users and others to evaluate the health of consumer devices before granting them unfettered access to the Internet and other critical resources."

Privacy Measures

He wrote that voluntary efforts and market forces for such quarantining are preferred, but, "if those means fail, then governments should ensure these concepts are advanced." Charney added that privacy must be maintained, even in the event of a quarantine of computers. "Examining health is not the same as examining content," he wrote, adding that communication of health is separate from communicating identity, and privacy measures should be maintained.

Charney pointed to several existing models for industry and government action to improve the health of Internet-connected systems.

France's Signal Spam is a database used by public and private entities to help clean up the e-mail ecosystem. Japan's Cyber Clean Center is a core organization which works with Internet service providers to analyze the characteristics of botnets, clean infected computers, and prevent their re-infection.

The Finnish National Computer Emergency Response Team manages an aggregation service that automatically compiles information on malware and security incidents on Finnish networks and reports them to network owners, which can then choose to act. Charney also noted that enterprise IT departments already often quarantine infected computers.

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
Waiting in a monster line is rough on customers. Transactions that involve tedious document scanning? Even scarier. Meet the KODAK ScanMate i1150. A smart, responsive little beast from Kodak Alaris that fits easily on a desk or counter--and has an "overdrive" button that devours stacks of 10 even faster. It can even sense a jam and stop in its tracks. Fiercely reliable. Well behaved. Look closer.
MORE IN DATA SECURITY
Product Information and Resources for Technology You Can Use To Boost Your Business

NETWORK SECURITY SPOTLIGHT
Contrite. That best describes Lenovo after the Superfish fiasco and subsequent Lizard Squad attack on its Web site. The PC maker vows to ban bloatware like Superfish, and lead with "cleaner, safer PCs."
NEWSFACTOR.COM
NEWSFACTOR NETWORK SITES
NEWSFACTOR SERVICES
© Copyright 2015 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.