Feeds

Net simul-attacks expose US security holes

Attackers trounce defenders

Beginner's guide to SSL certificates

Simulated internet attacks in the US have uncovered gaps in the nation’s cybersecurity defences. In particular, cyber-defenders struggled to understand if simulated hack attacks were isolated or part of a more co-ordinated assault.

The four-day cyber-war exercise, conducted in February and the biggest such exercise to date, tested the US government's response to internet-based attacks on critical systems. The AP reports that these were of a type that "could crash air traffic control systems, halt subways or trigger power outages".

It is open to question if attacks of such a scope are feasible: we note that cyber-Armageddon has not happened yet, despite dire prognostications from prophets of doom. More plausible is the idea that cyber-attacks could create additional confusion in conventional terrorist attacks. But the exercises (which involved around 300 people from the US federal and state government agencies, nine IT companies and six public utilities looked at a different scenario.

During the simul-attacks, a motley crew of fake perpetrators, including "activist groups, disgruntled employees-turned-hackers and bloggers" were able to "[crash] the Federal Aviation Administration's control system, deface newspaper Web sites and threaten power outages".

The score-card of defenders contains these set-backs, but Department of Homeland Security (DHS) officials said that tests were successful as they will help to improve response to real attacks. There's more background on the exercise at the DHS website here. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?