Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Stonesoft Comments On MOD Security Breach

Stonesoft Networks : 07 May, 2012  (Technical Article)
Highly Security Systems in Military Organisations could be successful targets for Advanced Evasion Techniques says Stonesoft
Stonesoft Comments On MOD Security Breach
The MoD has admitted that hackers have breached top secret systems. An MoD spokesman said: "The MoD takes all possible precautions to defend our system from attack from both unsolicited, for example 'spam' email, and targeted sources. It would be both misleading and naïve to assume that any system is 100% secure against all possible threats which is why we take additional steps to detect suspicious activity within our own systems.”

In light of this, Ash Patel, country manager for UK & Ireland of Stonesoft commented, “A cyber-attack on the MoD’s computer systems throws up an interesting question. There is no doubt that the level of security that the MoD will have in place is very high, so whilst it hasn’t been confirmed who was behind the attack – the question on everybody’s lips is: how did a virus infiltrate the systems in the first place?

“One answer to this, is the use of techniques such as Advanced Evasion Techniques (AETs), which allow hackers the opportunity to deliver malware to targeted devices, easily manoeuvring past security systems, without being detected. As such, hackers then have the ability to manipulate systems, and can even steal data without being traced. Unfortunately, inadequate protection against AETs means that it can often take some time before companies notice if a hacker was there to either wreak havoc or to take valuable information.

“However, there are solutions to this problem – the best thing to do would be to evaluate the current security in place and then for the MoD to speak with their security provider about how to increase the level of protection they receive.”
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo