This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Common Sense for Your Network
May/June 2010 (vol. 12 no. 3)
pp. 11-13
Bruce Potter, Ponte Technologies

In December 2009, Google and several other companies admitted they had been targeted by sophisticated attackers. Practically overnight, the tenor of the IT security discussion changed. Although many organizations are now focusing on advanced defensive capabilities to combat the advanced threat, let's not forget about the basic, commonsense aspects of running a network.

1. "Sebelius and Napolitano Hold Briefing on Gov't's H1N1 Response," Zimbio.com, 27 Oct. 2009, www.zimbio.com/pictures/Tkc3g170vp9/Sebelius+Napolitano+Hold+Briefing+Gov+t+H1N1/ PyHTue9cEp9 Janet+Napolitano.
2. G. Venere, "An Insight into the Aurora Communication Protocol," McAfee Labs Blog, 18 Jan. 2010, www.avertlabs.com/research/blog/index.php/ 2010/01/18an-insight-into-the-aurora-communication-protocol .
3. "Operation Aurora, Zero-day IE Flaw and Google Hacking—Don't Panic!" InfosecEvents, 28 Jan. 2010, www.governmentsecurity.org/global-security-news operation-aurora-zero-day-ie-flaw-and-google-hacking-dont-panic.html .

Index Terms:
Network security, firewalls, password policy, APT, Aurora, information technology, security & privacy
Citation:
Bruce Potter, "Common Sense for Your Network," IT Professional, vol. 12, no. 3, pp. 11-13, May-June 2010, doi:10.1109/MITP.2010.86
Usage of this product signifies your acceptance of the Terms of Use.