The Community for Technology Leaders
RSS Icon
Issue No.04 - July/August (2010 vol.12)
pp: 20-28
Shari Pfleeger , RAND Corporation
<p>This insider's look at a real, sustained attack against a major, multinational corporation offers lessons learned about how to recognize an attack early, how to respond, and what to do to prevent future attacks.</p>
cyberattack, vulnerabilities, intrusion, profile, information technology, security &#x0026; privacy
Shari Pfleeger, "Anatomy of an Intrusion", IT Professional, vol.12, no. 4, pp. 20-28, July/August 2010, doi:10.1109/MITP.2010.40
1. B. Graham, "Hackers Attack via Chinese Web Sites," Washington Post,25 Aug. 2005, p. A01; 2005/08/24AR2005082402318_pf.html .
2. N. Thornburgh, "The Invasion of the Chinese Cyberspies," Time,29 Aug. 2005;,9171,1098961,00.html .
3. N. Thornburgh, "A Security Analyst Wins Big in Court," Time,14 Feb. 2007;,8599,1589735,00.html .
4. I. Mandraud, "La France, Cible de Hackers Chinois [France, Target of Chinese Hackers]," Le Monde [The World], 8 Sept. 2007; la-france-cible-de-hackers-chinois_952776_3224.html (in French).
5. R. Norton-Taylor, "Titan Rain: How Chinese Hackers Targeted Whitehall," The Guardian,5 Sept. 2007; news.internet.
6. S. Steele, "VA Breach Shows Growing Insider Threats," Network World,19 June 2006; .
7. S.L. Pfleeger and T. Ciszek, "Choosing a Security Option: The InfoSecure Method," IEEE IT Professional, Sept./Oct. 2008, pp. 31–37.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool