|
Denial of service attacks, Lewis said, don't leave detailed forensic clues that a more directed intrusion, such as an effort to breach a sensitive government program, might leave. Still, officials worry that even a large, well executed attack against critical controlling computer servers could interrupt service if directed at a power company or utility. A strike could disrupt financial markets if directed at Wall Street or hinder travel if aimed at transportation sectors. Those systems tend to be more heavily protected. But an attack against a bank's website could prevent customers from having online access to their accounts and prevent them from paying bills. Such attacks can prove lucrative as an extortion tool, when hackers take down popular gambling sites and demand payment to end the disruption. Despite the lack of a clear culprit, there are things investigators do know about last year's denial of service attack. The malicious computer code was distributed through nine main control servers in four countries. It fanned out to infect about 60,000 computers around the world. Those computers
-- likely on the desktops of innocent victims -- were linked together in what is called a botnet, and they flooded government websites with traffic, knocking them offline or slowing them down over the Independence Day holiday weekend. Altogether, 43 sites were targeted, and the size of the attack suggested it required several people to carry it out. While some Treasury, FTC and State Department sites were slowed or shut down by the software attack, others such as the White House and Department of Homeland Security were able to fend it off with little disruption. Other targets included Nasdaq and New York Stock Exchange, Voice of America, U.S. Postal Service, and Amazon and Yahoo. Government officials and analysts say there has been some improvements in dealing with future strikes. Private contractors, such as the web hosting giant Akamai, has a redundant system that will move government sites to other servers if one is seeing an unusual or massive flow of traffic. Agencies are now better prepared. But, Jackson said, "as far as any better capability in tracking down actors or in attributing attacks to any individual or group, I don't know that we're any further along. I would seriously doubt it." ___ Online: Department of Homeland Security: SecureWorks: http://www.secureworks.com/
http://www.dhs.gov/index.shtm
[Associated
Press;
Copyright 2010 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
News | Sports | Business | Rural Review | Teaching & Learning | Home and Family | Tourism | Obituaries
Community |
Perspectives
|
Law & Courts |
Leisure Time
|
Spiritual Life |
Health & Fitness |
Teen Scene
Calendar
|
Letters to the Editor