Wednesday, March 23, 2016

So turn out the sites in an attack – Helsingborgs Dagblad

However is not site hacked; any information will not be attackers access.

See also: “How did the community reacted to an analogue version of this kind of attack?”

Who is behind?

the attacks made by agent, network of computers, each of which accounts for some of the questions to the server. “Zombie” -datorerna can stand anywhere in the world and is often hijacked by viruses. That is to say, it is not certain that the computer owner is involved. This kind of network can be rented for astoundingly low cost, like an army of digitized mercenaries.

See also: IT manager: We learn of the attack

As long as no one takes responsibility or can be tracked digitally, it is very difficult to know who is behind the DDoS attack.

DDoS means “distributed denial of service”, which focuses on the performance is precisely distributed, that is handled by lots of proxy computers.

See also: Coordinated attack on news sites

If you can not protect themselves?

Yes. Technical solutions are, but they are costly. In principle, it is about creating filters – software – capable of sorting out the “bad” orders from the good.

One problem is that the most common solution is to control the load in a “black hole” . This clears the load, but in return, it is not retrospective analysis from which the attack came, and how it was built.

To guarantee the operation go but can be cost as well, says Anne-Marie Eklund-Löwinder, security manager at the Foundation for Internet infrastructure, ISS.

– It’s about what demands you place on availability. Is the 99.999 percent or more? How much is it okay for us to stand still? And that’s a risk you have to make yourself from media companies page.

See also: Löfven: Media attack severe

How is the situation in Sweden?

Government authorities have made some investigations into cyber security in general, and from 4 april there is a new registry that will collect all iT incidents.

In the long term, the register shall provide a better overview and to provide facts about trends and tendencies, which the Authority for Civil Contingencies Agency called for for years.

– So far we have only had a small part, some police, SAPO another. Now, let’s first get a complete picture, says Anne-Marie Alverås Loven, who works with the incident register for the MSB, the Swedish Civil Contingencies Agency.

A problem is , many companies are reluctant to talk about attacks, because it deemed harmful to both the reputation and trust of customers.

See also: freedom of speech is under attack. The protection must be strengthened. Now.

Used attacks politically?

It has happened. Among other things, the hacker network Anonymous assumed responsibility for DDoS attacks in conducted to revenge on the authorities acted against WikiLeaks (2010).

the targets were, among others, Paypal, Mastercard and Visa. Also pornographic sites have been attacked.

Like conventional terrorist act can also DDoS attacks are seen as attempts to destabilize and undermine confidence in the important social functions, such as authorities, payment or news services.

Often, however, “ordinary” criminals behind the attacks.

See also: Olle Lönnaeus: IT attack fits well into the pattern of Russian psychological warfare

LikeTweet

No comments:

Post a Comment