 
What allowed this to happen?
  -  "Target rich environment" (and getting richer)
  
-  Speed/complexity of intrusions overwhelming
  
-  Use of "Root
       Kits" exceeds average sysadmin skill level
  
-  Poor understanding of network monitoring tools/techniques
  
-  Primary focus on restoration of service without data gathering
  
-  Use of UDP, ICMP, and IGMP packets hard to detect/block
  
-  Networks still built using "Pick any two: Fast, Reliable, Secure"
  
-  Software/OSs designed with "ease of use" over security
  
-  Short of firewalls or IDS at network borders, use "net flows"
       to detect initial intrusion signature or flooding agents
       (lack of tools/standards for doing this)
  
-  Poor system/network forensic data gathering and analysis
       means no idea who did what, when,
       where, how...
[Next]
|
[Prev]
|
[Top]
Dave Dittrich <dittrich@cac.washington.edu>
Last modified: Sat Jul 22 02:42:40 PDT 2000