This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Anatomy of an Intrusion
July/August 2010 (vol. 12 no. 4)
pp. 20-28
Shari Pfleeger, RAND Corporation

This insider's look at a real, sustained attack against a major, multinational corporation offers lessons learned about how to recognize an attack early, how to respond, and what to do to prevent future attacks.

1. B. Graham, "Hackers Attack via Chinese Web Sites," Washington Post,25 Aug. 2005, p. A01; www.washingtonpost.com/wp-dyn/content/article/ 2005/08/24AR2005082402318_pf.html .
2. N. Thornburgh, "The Invasion of the Chinese Cyberspies," Time,29 Aug. 2005; www.time.com/time/magazine/article0,9171,1098961,00.html .
3. N. Thornburgh, "A Security Analyst Wins Big in Court," Time,14 Feb. 2007; www.time.com/time/nation/article0,8599,1589735,00.html .
4. I. Mandraud, "La France, Cible de Hackers Chinois [France, Target of Chinese Hackers]," Le Monde [The World], 8 Sept. 2007; www.lemonde.fr/societe/article/2007/09/08 la-france-cible-de-hackers-chinois_952776_3224.html (in French).
5. R. Norton-Taylor, "Titan Rain: How Chinese Hackers Targeted Whitehall," The Guardian,5 Sept. 2007; www.guardian.co.uk/technology/2007/sep/04 news.internet.
6. S. Steele, "VA Breach Shows Growing Insider Threats," Network World,19 June 2006; www.networkworld.com/columnists/2006061906-insider-threats.html .
7. S.L. Pfleeger and T. Ciszek, "Choosing a Security Option: The InfoSecure Method," IEEE IT Professional, Sept./Oct. 2008, pp. 31–37.

Index Terms:
cyberattack, vulnerabilities, intrusion, profile, information technology, security & privacy
Citation:
Shari Pfleeger, "Anatomy of an Intrusion," IT Professional, vol. 12, no. 4, pp. 20-28, July-Aug. 2010, doi:10.1109/MITP.2010.40
Usage of this product signifies your acceptance of the Terms of Use.