[54580] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Trends in network operator security

daemon@ATHENA.MIT.EDU (David Lesher)
Thu Jan 9 11:01:39 2003

From: David Lesher <wb8foz@nrk.com>
To: nanog@merit.edu (nanog list)
Date: Thu, 9 Jan 2003 10:46:04 -0500 (EST)
In-Reply-To: <Pine.GSO.4.44.0301090655520.17466-100000@clifden.donelan.com> from "Sean Donelan" at Jan 09, 2003 07:53:44 AM
Reply-To: wb8foz@nrk.com
Errors-To: owner-nanog-outgoing@merit.edu


Unnamed Administration sources reported that Sean Donelan said:
 
> There are lots of interesting problems, but I don't know if 2003 is
> the year.  DOS is just too much fun.
> 
>     Route hijacks/bogus origins
>     Compromised infrastructure
>     MLPS alteration
>     Authentication attacks

>     Physical intrusion


This last one just hit the big bell atop the pole.

Don't recall if NANOG mentioned it, but mid-December someone broke
into a DOD-contractor HMO's server farm; and stole all the drives.

Google-news on "TriWest"...

It was clearly an organized identity theft. They got 500,000
names, medical records and SSNs.

What data do YOU have that people might want to steal? Is it 
encrypted?





-- 
A host is a host from coast to coast.................wb8foz@nrk.com
& no one will talk to a host that's close........[v].(301) 56-LINUX
Unless the host (that isn't close).........................pob 1433
is busy, hung or dead....................................20915-1433

home help back first fref pref prev next nref lref last post