Return-Path: <sentto-279987-4652-1021055125-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 10 May 2002 11:45:07 -0700 (PDT) Received: (qmail 1590 invoked by uid 510); 10 May 2002 18:43:12 -0000 Received: from n25.grp.scd.yahoo.com (66.218.66.81) by all.net with SMTP; 10 May 2002 18:43:12 -0000 X-eGroups-Return: sentto-279987-4652-1021055125-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.197] by n25.grp.scd.yahoo.com with NNFMP; 10 May 2002 18:25:25 -0000 X-Sender: fastflyer28@yahoo.com X-Apparently-To: iwar@yahoogroups.com Received: (EGP: mail-8_0_3_2); 10 May 2002 18:25:24 -0000 Received: (qmail 20419 invoked from network); 10 May 2002 18:25:24 -0000 Received: from unknown (66.218.66.217) by m4.grp.scd.yahoo.com with QMQP; 10 May 2002 18:25:24 -0000 Received: from unknown (HELO web14504.mail.yahoo.com) (216.136.224.67) by mta2.grp.scd.yahoo.com with SMTP; 10 May 2002 18:25:24 -0000 Message-ID: <20020510182523.44606.qmail@web14504.mail.yahoo.com> Received: from [68.100.119.45] by web14504.mail.yahoo.com via HTTP; Fri, 10 May 2002 11:25:23 PDT To: iwar@yahoogroups.com In-Reply-To: <200205100324.g4A3Ogm13144@red.all.net> From: "e.r." <fastflyer28@yahoo.com> X-Yahoo-Profile: fastflyer28 Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Fri, 10 May 2002 11:25:23 -0700 (PDT) Subject: Re: [iwar] [fc:Companies.unprepared.for.cyberattacks] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit I agree with one exception. At present, no one dies in cyber attacks, but the PLA of China does give one pause. While their standing military is huge, if they did not believe that training a batallion ,or two to become procificeint IWARiors, one of two conclusions can be made. Either China has spent money on trainging troops and purchasing material to no end, or they had a plan on day 1 to train and use of Digitroops They were in clear violation of a agreement with the US when we initially parked large computers system in the high northwestern desert. They were specifically to be used to sesmically monitor Russian missile test and bases. When we had the chance to recheck these systems, it was clear they had been tampered with and utilized for China's own purposed from time to time. And, nuclear weapons modernazation was part of their intent. At the time, they did not have indiginious capability to make such complex sytems to aid them with mathamatical modeling that goes into CBRN areas. They may not directly kill in an IWAR sense, but at the time of this agreement-late 70's. they had no where near the cyber systems hardware development skills that were likely part lift from Russian designs, and information gathered from other nations computers systems. Their aerospace program was nearly pre-historic until we agreed to train Chinese students in the US. Now, they have come an unusually long way to make icbm, nuke and others weapons that are being sold to our adversaries. As this case proved, although the US needed access to this strategically sigificant area of the world, the price we have paid was dear. Fred Cohen <fc@all.net> wrote: Companies unprepared for cyberattacks SecuritySearch.net, 5/8/02 <a href="http://www.securitysearch.net/display_industry_news_article.cfm?id=485">http://www.securitysearch.net/display_industry_news_article.cfm?id=485> Through 2005, 90 percent of cyberattacks will exploit known security flaws for which a patch is available or a solution known, according to GartnerG2, a research unit of Gartner, Inc. (NYSE: IT and ITB). Presenting their outlook for cyperattack prevention at last weeks Gartner Symposium/ITxpo in San Diego, California, Gartner presented a dim outlook for cyperattack prevention. GartnerG2 said that not only are patches available before the cyberattacks, but 90 percent of the attacks are imitation ones. Moreover, recent cyberattacks could have been avoided if enterprises were more focused on their security efforts. "Nearly every major attack to hit the headlines involved the exploitation of known security flaws for which a patch or defense was widely known," said Richard Mogull, research director for GartnerG2. "Estimated losses from Code Red and Nimda were in the billions of dollars, yet Code Red exploited a flaw for which a patch was available, proving that we never learn from our mistakes. Nimda exploited the same flaw just a few months later. Both continue to survive on the Internet today." GartnerG2 predicts that through 2005, 20 percent of enterprises will experience a serious (beyond a virus) Internet security incident. Such victims can expect the cleanup costs of the incident to exceed the prevention costs by 50 percent. According to GartnerG2 the top five overall IT vulnerabilities to cyberattacks are: -- Security of suppliers and partners; -- No benchmarking (spending and value); -- Security not integrated into projects; -- Poor governance and culture; and -- Lack of risk management integration To adequately protect against security incidients, GartnerG2 says organisations must be more proactive - developing incident response procedures and monitoring the right sources to detect an attack. "A proactive security posture... means you have a well-developed response plan and keep looking for the early indications of an attack," explained Mogull. For more information on Gartner's business symposiums visit www.gartner.com/symposium. Yahoo! Groups SponsorADVERTISEMENT ------------------ http://all.net/ Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do You Yahoo!? Yahoo! Shopping - Mother's Day is May 12th! [Non-text portions of this message have been removed] ------------------------ Yahoo! Groups Sponsor ---------------------~--> Tied to your PC? Cut Loose and Stay connected with Yahoo! Mobile http://us.click.yahoo.com/QBCcSD/o1CEAA/sXBHAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT