Feeds

BT: Olympics cyber attackers were amateurs

No match for exhaustive planning and over-provisioning

Protecting against web application threats using SSL

Some writers were apparently less than enthused by BT’s attempts to locate and clean up any infected machines – valuing their right to privacy on the network more than the impact their infected machines had on others.

In the end, 18 months of war gaming and huge over-provisioning of network infrastructure meant BT was able to cope with the threats that presented themselves to an infrastructure that had to be basically completed by 2010.

Attack traffic averaged less than one per cent of total volumes, with most of that figure accounted for by “background noise” rather than anything specifically targeted at the Games, Packman added.

However, he admitted that BT was in charge only of security around the network perimeter, and that Atos – which dealt with IT security proper – may have different war stories to tell of the Games.

Schneier on security

BT’s chief security technology officer, Bruce Schneier also dropped into Hong Kong to share his unique brand of socio-techno philosophising and insight into the Games.

According to Schneier, every system – be it social, biological, etc. – requires co-operation to work properly, but there will also inevitably be ‘defectors’ – those who choose not to co-operate – and it is security which “keeps defectors down to an acceptable level”.

“Security is a tax on the honest in a very real sense because nothing Phil Packman did in a sense made anything better, it just stopped other people making things worse,” he said.

“This is why our jobs are so difficult, because if you do a good job no-one knows.”

He also warned that the gap between the attackers taking advantage of new technologies and law enforcement and others catching up is greater than it has ever been.

However, Schneier ended on a positive note.

“Threats are what we [as security professionals] work with. The bad things as a percentage of the whole are tiny – we’re doing really well, even though things are pretty bad out there and getting worse,” he said.

“I’m a short-term pessimist but a long-term optimist.” ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.