nanog mailing list archives
Re: Trends in network operator security
From: David Lesher <wb8foz () nrk com>
Date: Thu, 9 Jan 2003 10:46:04 -0500 (EST)
Unnamed Administration sources reported that Sean Donelan said:
There are lots of interesting problems, but I don't know if 2003 is the year. DOS is just too much fun. Route hijacks/bogus origins Compromised infrastructure MLPS alteration Authentication attacks
Physical intrusion
This last one just hit the big bell atop the pole. Don't recall if NANOG mentioned it, but mid-December someone broke into a DOD-contractor HMO's server farm; and stole all the drives. Google-news on "TriWest"... It was clearly an organized identity theft. They got 500,000 names, medical records and SSNs. What data do YOU have that people might want to steal? Is it encrypted? -- A host is a host from coast to coast.................wb8foz () nrk com & no one will talk to a host that's close........[v].(301) 56-LINUX Unless the host (that isn't close).........................pob 1433 is busy, hung or dead....................................20915-1433
Current thread:
- Trends in network operator security Sean Donelan (Jan 08)
- Re: Trends in network operator security batz (Jan 09)
- <Possible follow-ups>
- Re: Trends in network operator security Sean Donelan (Jan 09)
- Re: Trends in network operator security David Lesher (Jan 09)
- Re: Trends in network operator security Bill Woodcock (Jan 09)
- Re: Trends in network operator security Richard Irving (Jan 09)
- Re: Trends in network operator security David Lesher (Jan 09)
- Re: Trends in network operator security Pete Kruckenberg (Jan 09)
- Re: Trends in network operator security Sean Donelan (Jan 09)
- Re: Trends in network operator security Christopher L. Morrow (Jan 09)