[54580] in North American Network Operators' Group
Re: Trends in network operator security
daemon@ATHENA.MIT.EDU (David Lesher)
Thu Jan 9 11:01:39 2003
From: David Lesher <wb8foz@nrk.com>
To: nanog@merit.edu (nanog list)
Date: Thu, 9 Jan 2003 10:46:04 -0500 (EST)
In-Reply-To: <Pine.GSO.4.44.0301090655520.17466-100000@clifden.donelan.com> from "Sean Donelan" at Jan 09, 2003 07:53:44 AM
Reply-To: wb8foz@nrk.com
Errors-To: owner-nanog-outgoing@merit.edu
Unnamed Administration sources reported that Sean Donelan said:
> There are lots of interesting problems, but I don't know if 2003 is
> the year. DOS is just too much fun.
>
> Route hijacks/bogus origins
> Compromised infrastructure
> MLPS alteration
> Authentication attacks
> Physical intrusion
This last one just hit the big bell atop the pole.
Don't recall if NANOG mentioned it, but mid-December someone broke
into a DOD-contractor HMO's server farm; and stole all the drives.
Google-news on "TriWest"...
It was clearly an organized identity theft. They got 500,000
names, medical records and SSNs.
What data do YOU have that people might want to steal? Is it
encrypted?
--
A host is a host from coast to coast.................wb8foz@nrk.com
& no one will talk to a host that's close........[v].(301) 56-LINUX
Unless the host (that isn't close).........................pob 1433
is busy, hung or dead....................................20915-1433