Lecture 10 The iPremier Company: Denial of Service Attack
Synopsis • Successful hih!en" retailer shut "o#n $y a "istri$ute" "enial of service %DDoS& attack #hich occurs for '( minutes • C)* +o$ Turley coor"inatin from afar • Some lea"ers helpful, others not so helpful
Case *vervie# • .a"e!up case $ase" on real events that have happene" in various companies • Consi"ers the manaement perspective of a DDoS attack • These are not common, $ut can $e sinificant
hat is a DoS attack • an"shake $et#een communicatin computers • Can $e "efen"e" if all from one reconi3e" source • Distri$ute" DoS more "ifficult to "efen" aainst
hat is a fire#all • Com$ination of har"#are an" soft#are to prevent unauthori3e" access to company4s internal computer resources • iPremier 5not a real fire#all4 • Attack vs intrusion
=ollo# up info • A fe# hours later, iPremier announce" pu$licly that they have $een victim of DD*S attack 9 '( minutes, mi""le of niht 9 =e# customers inconvenience" 9 oul" revisit alrea"y soli" computer security
• 7o conclusive evi"ence that intru"ers ha" tampere" #ith pro"uction computer e>uipment • ?=inerprint@ on files ha" not $een kept up to "ate, so impossi$le to kno# etent of $reach
8estart all pro"uction computer e>uipment se>uentially #ithout interruptin service to customers =ile!$y!file eamination of every file on every pro"uction computer lookin for evi"ence of missin "ata +ean stu"y of ho# ?"iital sinature technoloy@ miht $e use" to assure that files on pro"uction computers #ere the same files initially installe" there Bpe"ite" proect aime" at movin to a more mo"ern hostin facility .o"erni3e" computin infrastructure to inclu"e more sophisticate" fire#all )mplemente" secure shell access so that pro"uction computin e>uipment coul" $e mo"ifie" an" manae" from off site A""e" "isk space to ena$le more loin, lea"in to $etter information if this happene" aain Traine" more staff in use of monitorin soft#are, an" e"ucate" a$out security threats Create" inci"ent!response team, practice" simulate" attack +ean eecutive search for chief security officer )nstitute" >uarterly thir"!party security au"its
=ollo# up info • oanne 8ipley recommen"s "isconnectin all pro"uction computers an" re$uil" from scratch 9 Bstimate 2/ 9 -6 hours to complete 9 Documentation there, $ut thins can o #ron
• eate" "e$ate over this suestion 9 ?only #ay to $e sure@ 9 ?irresponsi$le to customers to "o this@ 9 hurt satisfaction 9 7o evi"ence of compromise
Thank you for interesting in our services. We are a non-profit group that run this website to share documents. We need your help to maintenance this website.