This Article 
 Bibliographic References 
 Add to: 
Anatomy of an Intrusion
July/August 2010 (vol. 12 no. 4)
pp. 20-28
Shari Pfleeger, RAND Corporation

This insider's look at a real, sustained attack against a major, multinational corporation offers lessons learned about how to recognize an attack early, how to respond, and what to do to prevent future attacks.

1. B. Graham, "Hackers Attack via Chinese Web Sites," Washington Post,25 Aug. 2005, p. A01; 2005/08/24AR2005082402318_pf.html .
2. N. Thornburgh, "The Invasion of the Chinese Cyberspies," Time,29 Aug. 2005;,9171,1098961,00.html .
3. N. Thornburgh, "A Security Analyst Wins Big in Court," Time,14 Feb. 2007;,8599,1589735,00.html .
4. I. Mandraud, "La France, Cible de Hackers Chinois [France, Target of Chinese Hackers]," Le Monde [The World], 8 Sept. 2007; la-france-cible-de-hackers-chinois_952776_3224.html (in French).
5. R. Norton-Taylor, "Titan Rain: How Chinese Hackers Targeted Whitehall," The Guardian,5 Sept. 2007; news.internet.
6. S. Steele, "VA Breach Shows Growing Insider Threats," Network World,19 June 2006; .
7. S.L. Pfleeger and T. Ciszek, "Choosing a Security Option: The InfoSecure Method," IEEE IT Professional, Sept./Oct. 2008, pp. 31–37.

Index Terms:
cyberattack, vulnerabilities, intrusion, profile, information technology, security & privacy
Shari Pfleeger, "Anatomy of an Intrusion," IT Professional, vol. 12, no. 4, pp. 20-28, July-Aug. 2010, doi:10.1109/MITP.2010.40
Usage of this product signifies your acceptance of the Terms of Use.