
344 CHAPTER 10 NETWORK SECURITY
10.1 AURORA ATTACK
MANAGEMENT
FOCUS
Even information technology giants, such as
Google, are not safe when it comes to cyber
security. The Aurora Attack began mid-2009 and
ended in December 2009 when it was discovered
by Google. The name Aurora is believed to be
an internal name that the attackers gave to this
operation. This attack is believed to be ordered
by the Chinese government and its goal was to
gain access and potentially modify source code
repositories of high-tech, security, and defense
contractors.
This wasn’t a simple attack done by script kid-
dies, young adults who download scripts written
by somebody else to exploit known vulnera-
bilities. Security experts were amazed by the
sophistication of this attack and some claim it
changed the threat model. Nearly a dozen pieces
of malware and several levels of encryption were
used to exploit a zero-day vulnerability in Internet
Explorer and to break deeply into the corporate
network while avoiding common detection meth-
ods.
This attack also hit 33 other companies in the
United States, including Adobe, Yahoo, Syman-
tec, and Dow Chemical. As a response to this
attack, governments of other foreign countries
publicly issued warnings to users of Internet
Explorer. The Aurora Attack only reminds us that
cyber security is a global problem and every-
body who uses Internet can and probably will be
under attack. Therefore learning about security
and investing in it is necessary to survive and
strive in the Internet era.
SOURCES:
http://www.wired.com/threatlevel/2010/01/
operation-aurora/
http://en.wikipedia.org/wiki/Operation Aurora
http://www.wired.com/threatlevel/2010/01/
google-hack-attack/
situation, or an intrusion, providing evidence for subsequent action against the individuals
or organizations involved or enabling corrective action to be taken. For example, the same
software that detects the problem must report it immediately so that someone or some
automated process can take corrective action.
Corrective controls remedy an unwanted event or an intrusion. Either computer
programs or humans verify and check data to correct errors or fix a security breach so
it will not recur in the future. They also can recover from network errors or disasters.
For example, software can recover and restart the communication circuits automatically
when there is a data communication failure.
The remainder of this chapter discusses the various controls that can be used
to prevent, detect, and correct threats. We also present a control spreadsheet and risk
analysis methodology for identifying the threats and their associated controls. The control
spreadsheet provides a network manager with a good view of the current threats and any
controls that are in place to mitigate the occurrence of threats.
Nonetheless, it is important to remember that it is not enough just to estab-
lish a series of controls; someone or some department must be accountable for the
control and security of the network. This includes being responsible for developing
controls, monitoring their operation, and determining when they need to be updated or
replaced.
Controls must be reviewed periodically to be sure that they are still useful and
must be verified and tested. Verifying ensures that the control is present, and testing
determines whether the control is working as originally specified.