Tuesday, February 7, 2012

Tech Review Security: Tuesday, February 7, 2012


Anonymous takes down Boston PD site, releases FBI/Scotland Yard call



  • Hactivisim:  the use of computers and computer networks as a means to promote political ends
  • example

New, stealthy threats change best responses to cyberattack

  • Document everything
  • Work in a team of two or more
  • Analyze evidence
  • Notify appropriate people
  • Notify US-CERT
  • Stop the incident
  • Preserve evidence 
  • Wipe out all effects of the incident
  • Identify and mitigate
  • Confirm operations are restored
  • Create a final report

The three types of online attackers


  • Criminals
  • Hacktivists
  • Governments




No comments:

Post a Comment