The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July/August (2010 vol.12)
pp: 20-28
Shari Pfleeger , RAND Corporation
ABSTRACT
<p>This insider's look at a real, sustained attack against a major, multinational corporation offers lessons learned about how to recognize an attack early, how to respond, and what to do to prevent future attacks.</p>
INDEX TERMS
cyberattack, vulnerabilities, intrusion, profile, information technology, security &#x0026; privacy
CITATION
Shari Pfleeger, "Anatomy of an Intrusion", IT Professional, vol.12, no. 4, pp. 20-28, July/August 2010, doi:10.1109/MITP.2010.40
REFERENCES
1. B. Graham, "Hackers Attack via Chinese Web Sites," Washington Post,25 Aug. 2005, p. A01; www.washingtonpost.com/wp-dyn/content/article/ 2005/08/24AR2005082402318_pf.html .
2. N. Thornburgh, "The Invasion of the Chinese Cyberspies," Time,29 Aug. 2005; www.time.com/time/magazine/article0,9171,1098961,00.html .
3. N. Thornburgh, "A Security Analyst Wins Big in Court," Time,14 Feb. 2007; www.time.com/time/nation/article0,8599,1589735,00.html .
4. I. Mandraud, "La France, Cible de Hackers Chinois [France, Target of Chinese Hackers]," Le Monde [The World], 8 Sept. 2007; www.lemonde.fr/societe/article/2007/09/08 la-france-cible-de-hackers-chinois_952776_3224.html (in French).
5. R. Norton-Taylor, "Titan Rain: How Chinese Hackers Targeted Whitehall," The Guardian,5 Sept. 2007; www.guardian.co.uk/technology/2007/sep/04 news.internet.
6. S. Steele, "VA Breach Shows Growing Insider Threats," Network World,19 June 2006; www.networkworld.com/columnists/2006061906-insider-threats.html .
7. S.L. Pfleeger and T. Ciszek, "Choosing a Security Option: The InfoSecure Method," IEEE IT Professional, Sept./Oct. 2008, pp. 31–37.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool