Three thousand engage in mock online attacks

Powered by SC Magazine
 

Second event tackles 1000 cyber incidents.

The European Network and Information Security Agency (ENISA) organised a simulated distributed denial of service (DDoS) attack last week involving more than 3000 information security professionals.

The Cyber Europe 2012 exercise was the second of its kind for European Union member states and European Free Trade Association (EFTA) countries.

It was designed to stress-test security capabilities and identify gaps and challenges on how large-scale cyber incidents could be handled more effectively in Europe.

It was also designed to test the effectiveness and scalability of existing mechanisms, procedures, information flow and cooperation between public authorities and all stakeholders in Europe.

Some 25 countries participated in the simulated attack and four observed.

“This was a collective effort with members of the organisations working with a friendly botnet to strike the services of members and point them in the right direction," Corero Network Security international operations vice president Paul Lawrence told iTnews' sister site SC Magazine.

"It was much more controlled than a standard attack as you can see where the traffic is coming from and see the levels of vulnerability.”

He pointed to the attack on Russia Today in August, which he said showed the newspaper did not have the right level of protection in place to deal with such an attack.

“They likely had a firewall and intrusion prevention system, but that is not enough to mitigate against a DDoS attack. This would have given organisations the ability to protect themselves and understand where the weaknesses are,” he said.

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


Three thousand engage in mock online attacks
 
 
 
Top Stories
How hard do you hack back?
[Blog post] Taking the offensive could have unintended consequences.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1019

Vote