When your system is vulnerable and possibly under attack,
your first indications may come from the following sources:
Reports from users
System monitoring, for example:
Unexplained changes or behavior in
applications or normal processes
Unexplained messages from OPCOM or the audit server
Unexplained changes to user accounts in the system
authorization database (privilege changes, protections, priorities,
quotas)
Reports from Users User observations frequently point to system security problems.
A user may contact you with the following situations:
Files are missing.
There are unexplained forms of last login messages,
such as successful logins the user did not perform or unexplained
login failures.
A user cannot log in, suggesting the user password
might have been changed since the last successful login or some
other form of tampering has occurred.
Break-in evasion appears to be in effect, and the
user cannot log in.
Reports from the SHOW USERS command indicate that
the user is logged in on another terminal when the user did not
do so.
A disconnected job message appears during a login
for a process the user never initiated.
Files exist in the user's directories that the user
did not create.
Unexplained changes have been found in the protection
or ownership of user files.
Listings appear that are generated under the user
name without the user requesting the listing.
A sudden reduction occurs in the availability of
resources, such as dialup lines.
Follow up promptly when one of these items is reported to
you. You must confirm or deny that the condition exists. If you
find the complaint is valid, seek a cause and solution.
Monitoring the System Ongoing Tasks to Maintain a Secure System lists those
tasks that can help you detect potential security breaches on your
system. The following list details possible warning signs you may
uncover while performing the recommended tasks:
A user appears on the SHOW USERS report
that you know could not be currently logged in.
You observe an unexplained change in the system
load or performance.
You discover media or program listings are missing
or notice other indications that physical security has degraded.
Your locked file cabinet has been tampered with,
and the list of authorized users has disappeared.
You find unfamiliar software in the system executable
image library [SYSEXE] or in [SYSLIB].
You observe unfamiliar images running when you examine
the MONITOR SYSTEM report.
You observe unauthorized user names when you enter
the DCL command SHOW USER. When you examine the listing that the
Authorize utility (AUTHORIZE) produces with the SHOW command, you find
that those users have been given system access.
You discover proxy users that you never authorized.
The accounting report reveals unusual amounts of
processing time expended recently, suggesting outside access.
You observe unexplained batch jobs on the batch
queues.
You observe unexpected device allocations when you
enter the SHOW DEVICE command.
You observe a high level of processing activity
at unusual hours.
The protection codes or the access control lists
(ACLs) change on critical files. Identifiers are added, or holders
of identifiers are added to the rights list.
There is high personnel turnover or low morale.
All these conditions warrant further investigation. Some indicate
that you already have a problem, and some may have simple explanations,
while others may indicate serious potential problems.