In the days of past it seemed that systems were more vulnerable to scripted attacks and the occasional directed attack by a 'real' hacker. Now that most business systems have become more secure the only threats to information security seems to viruses, and DoS attacks. So the question is: once you've protected yourself against known viruses, and trained your border devices to handle Dos Attacks whats left ?
Announcement
Collapse
No announcement yet.
Viruses, DDos's and then what ?
Collapse
X
-
Originally posted by ciph3rIn the days of past it seemed that systems were more vulnerable to scripted attacks and the occasional directed attack by a 'real' hacker. Now that most business systems have become more secure the only threats to information security seems to viruses, and DoS attacks. So the question is: once you've protected yourself against known viruses, and trained your border devices to handle Dos Attacks whats left ?When you draw first blood you can't stop this fight
For my own piece of mind - I'm going to
Tear your fucking eyes out
Rip your fucking flesh off
Beat you till you're just a fucking lifeless carcass
Fuck you and your progress
Watch me fucking regress
You were meant to take the fall - now you're nothing
Payback's a bitch motherfucker!
Slayer - Payback
-
Good point about SE, and Local security. I guess i should have been more clear on my question. I agree that internal security will continue to be an issue, but external threats drop dramatically once you handle viruses and kiddies experimenting with DoS tools. The attack-scape seems to be all about viruses and denial attacks. So once vendor sufficiently handle those threats for us will we become process trainers ?I saw your mom on myspace!
Comment
-
Originally posted by ciph3rGood point about SE, and Local security. I guess i should have been more clear on my question. I agree that internal security will continue to be an issue, but external threats drop dramatically once you handle viruses and kiddies experimenting with DoS tools. The attack-scape seems to be all about viruses and denial attacks. So once vendor sufficiently handle those threats for us will we become process trainers ?
You are joking right? You cannot really believe that these are the major threats. If so, you obviously don't work in either the INFOSEC field, or in the IT field at a place that gives two shits about security.perl -e 'print pack(c5, (41*2), sqrt(7056), (unpack(c,H)-2), oct(115), 10)'
Comment
-
Chris:: Are you saying that you dont view Viruses as a major threat to the continuance of business systems ? So an e-commerce company who's hit with either a virus or a dos attack shouldnt consider that a major attack ? Criticality of attacks are relative to the nature of business.I saw your mom on myspace!
Comment
-
Originally posted by ciph3rChris:: Are you saying that you dont view Viruses as a major threat to the continuance of business systems ? So an e-commerce company who's hit with either a virus or a dos attack shouldnt consider that a major attack ? Criticality of attacks are relative to the nature of business.
Nope. That isn't what I am saying at all. I am saying that there a a TON of other threats which you seem to discount as unimportant or non-existant.
Originally posted by ciph3rNow that most business systems have become more secure the only threats to information security seems to viruses, and DoS attacks.
This statement is silly.perl -e 'print pack(c5, (41*2), sqrt(7056), (unpack(c,H)-2), oct(115), 10)'
Comment
-
I agree with you that i left out alot of other attack vectors, but the point was not to identify all possible attack points. The point was that a huge chunk of 'security' these days seems to be focused around viral and denial attack mitigation. In saying that lets say for instance -- Given an environment where there are sufficient security controls such as proper firewall implementations, NAT and DMZ's at work and viral patterns and dos attacks are accounted for what else is on the radar as far as possible attacks ?
How many attackers out there have the technical know how to compromise a system without the aid of known security exploits -- in my [very humble] opinion not very many. So im saying that once you take care of those risks the threats against your system seem to fall dramatically.
(Yes we've already talked about internal threats but im talking about threats from outside the network )I saw your mom on myspace!
Comment
-
Originally posted by ciph3rI agree with you that i left out alot of other attack vectors, but the point was not to identify all possible attack points. The point was that a huge chunk of 'security' these days seems to be focused around viral and denial attack mitigation. In saying that lets say for instance -- Given an environment where there are sufficient security controls such as proper firewall implementations, NAT and DMZ's at work and viral patterns and dos attacks are accounted for what else is on the radar as far as possible attacks ?
How many attackers out there have the technical know how to compromise a system without the aid of known security exploits -- in my [very humble] opinion not very many. So im saying that once you take care of those risks the threats against your system seem to fall dramatically.
(Yes we've already talked about internal threats but im talking about threats from outside the network )
Like Chris said, you can't discount it just becuase it isn't a point-click attack. I've seen the logs and performed after-action incident response on several situations where the skiddie route failed, then someone put some thought into it and compromised a system or systems.Aut disce aut discede
Comment
Comment