Anonymous takes down Boston PD site, releases FBI/Scotland Yard call
- Hactivisim: the use of computers and computer networks as a means to promote political ends
New, stealthy threats change best responses to cyberattack
- Document everything
- Work in a team of two or more
- Analyze evidence
- Notify appropriate people
- Notify US-CERT
- Stop the incident
- Preserve evidence
- Wipe out all effects of the incident
- Identify and mitigate
- Confirm operations are restored
- Create a final report
The three types of online attackers
- Criminals
- Hacktivists
- Governments