3000 EU infosec pros engage in mock attacks

Powered by SC Magazine
 

Cyber Europe 2012 tackles 1000 cyber incidents.

The European Network and Information Security Agency (ENISA) organised a simulated distributed denial of service (DDoS) attack last week involving more than 300 cyber security professionals.

The Cyber Europe 2012 exercise was the second of its kind organised by European Union member states and European Free Trade Association (EFTA) countries.

It was designed to stress test capabilities and identify gaps and challenges on how large-scale cyber incidents could be handled more effectively in Europe.

It was also designed to test the effectiveness and scalability of existing mechanisms, procedures, information flow and cooperation between public authorities and public and private stakeholders in Europe.

Twenty five countries participated in the simulated attack and four observed.

“This was a collective effort with members of the organisations working with a friendly botnet to strike the services of members and point them in the right direction," Corero Network Security international operations vice president Paul Lawrence told SC

"It was much more controlled than a standard attack as you can see where the traffic is coming from and see the levels of vulnerability.”

He pointed at the attack on Russia Today in August which he said showed that it did not have the right level of protection to deal with a DDoS attack, and it most likely had a standard security architecture.

“They likely had a firewall and intrusion prevention system, but that is not enough to mitigate against a DDoS attack. This would have given organisations the ability to protect themselves and understand where the weaknesses are,” he said.

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


3000 EU infosec pros engage in mock attacks
 
 
 
Top Stories
How hard do you hack back?
[Blog post] Taking the offensive could have unintended consequences.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1024

Vote