

"Only the really big-profile cases get prosecuted, but that doesn't mean shouldn't gather evidence and go to law enforcement."

"Now, it's basically not possible to hide if you get nailed properly," he says. Yet it's becoming harder to keep attacks quiet, according to SecurityFocus Incident Analyst Ryan Russellparticularly given the Web defacements that often accompany intrusions. For example, Exodus Communications declined to discuss its ongoing case against accused hacker Jerome Heckenkamp, who also allegedly broke into the systems of many large companies including eBay, Juniper Networks, E-Trade, and Cygnus in 1999. Despite this, companies are often reluctant to discuss the details of their own security breaches. Knowing just what to do in an incident response situation can often be difficult, given the lack of public discourse on the subject. When they then get into an incident response, they may destroy evidence or not know what to do." Log and Load "People forget about that and focus on the products and techniques. "First and foremost is having a security policy in the first place," he says. Vincent Weafer, director of Symantec Security Response, agrees. "Having a coherent policywhat to do, who to call, what to shut down, the first-fix thingsis important," she says. No matter what preventative measures administrators take, intruders on the company network, Web defacements, and virus outbreaks are often inevitable.įorrester Research Analyst Laura Koetzle stresses that a comprehensive security policy is the most important item to start with when defending a computer network and its datawhether the threat is the latest mass-mailing virus, an exploit that is making the rounds among hackers, or an internal compromise. It may just be a matter of time before everybody is In addition, the double threat posed by Trojan horse worms that leave systems vulnerable to later attack by intruders is growing. However, there are still many vulnerabilities, unreported bugs, and complex worms out there. Intelligence and information gathering have progressed to the point that most computer attacks are quickly reported. By all accounts, you should be able to sleep easy, but you know better. The only way in is through your virtual private network (VPN).
#Datathief map thief software
Your antivirus software is updated regularly, and you check daily to make sure you have all of the latest OS and server patches. To Catch a Thief Effective incident response against network intruders by Jay Lyman May 2002
