Some IT Security Incidents from 2008

登録は簡単!. 無料です
または 登録 あなたのEメールアドレスで登録
Some IT Security Incidents from 2008 により Mind Map: Some IT Security Incidents from 2008

1. incident classification

2. minor

2.1. BT security upgrade outage

2.1.1. art

2.2. online gambling DDoS

2.3. harvard

2.3.1. art

2.4. Florida power outage

2.5. hackers buy up tickets

2.6. dutch tax record deletion

2.7. china mobile SPAM

2.7.1. art

2.7.2. art

2.8. email exposure

2.8.1. MS and Vista

2.9. iFrame injection

2.10. Trend Micro

2.10.1. art

2.10.2. art

2.10.3. art

3. notable

3.1. RIM Blackberry

3.1.1. art

3.1.2. art

3.1.3. art

3.1.4. good earnings

3.1.5. 2008-Feb

3.1.5.1. The secret of the BlackBerry's success is security, according to Research In Motion's co-chief executive, Jim Balsillie, but social networking is its future

3.1.5.2. having security validations worldwide, and features such as built-in firewalls and the ability to remotely lock and wipe devices, are key.

3.1.5.3. carriers have come to a fork in the road that will see them either become pipes or platforms. They must therefore provide a managed service to users, seamlessly integrating Web services and desktop applications onto handsets. "This is not a concept. This is a reality

3.1.5.4. Once social networking becomes a B2B phenomenon--not unlike IM and texting--I believe every single social-networking user will want a data plan

3.1.6. 2008 Feb: outage

3.1.6.1. seems RIM has a NOC that is a single point of failure

3.1.6.1.1. RIM's service is centralized and works by routing all BlackBerry e-mails through one of two main network operations centers, which are essentially large data centers. One center is located in Canada and primarily serves the Western Hemisphere as well as parts of Asia. The other data center, located in the U.K., handles e-mail traffic in Europe, Africa and the Middle East. Analysts had speculated that since most of the people affected by the outage were based in North America that it was likely the problem occurred in the center located in Waterloo, Ontario.

3.1.6.1.2. The New York Times notes that the “finding appears to contradict assurances from RIM that it had resolved last year’s problems. It also raised questions about the company’s highly centralized approach to handling e-mail messages, a stark contrast to the extremely diffuse structure of the Internet.”

3.1.6.2. 3 hours

3.1.6.2.1. A three-hour service problem left subscribers across the Americas with spotty or nonexistent access to wireless e-mail on Monday.

3.1.6.3. The company said in a statement that it had ruled out security and capacity issues as a cause of the outage that left millions of so-called "CrackBerry" addicts without access to their e-mail for several hours. The company also said the incident was not caused by any hardware failure or core software issue.

3.1.6.4. failure from change management

3.1.6.4.1. Ruling out those causes, the company has "determined that the incident was triggered by the introduction of a new, noncritical system routine that was designed to provide better optimization of the system's cache." In computing terms, a cache is a temporary storage area for that allows data to be served up quickly.

3.1.6.4.2. Despite previous testing, the new system routine produced an unexpected effect that set off a chain reaction, triggering a series of interaction errors between the system's operational database and the cache.

3.1.6.4.3. "Although the backup system and failover process had been repeatedly and successfully tested previously, the failover process did not fully perform to RIM's expectations in this situation and therefore caused further delay in restoring service and processing the resulting message queue," the company said in the statement.

3.1.6.5. SPOC too much risk

3.1.6.5.1. The bigger concern should will be on longer term growth. I said on Monday that enterprises would have canned any voice provider who experienced the kinds of outages that have hit the RIM network this year. If nothing else, IT leaders should be considering other options and if they don’t then it’ll be their job on the line next time. “Information-technology managers should be looking for alternatives, said Avi Greengart, research director at Current Analysis,” reports Reuters.

3.1.6.6. reputational damage

3.1.6.6.1. Research In Motion's BlackBerry could lose its iconic status in the eyes of corporate and retail subscribers alike if it doesn't manage to stem service problems such the ones that led to two major outages in less than a year, analysts say.

3.1.6.6.2. The outage hit RIM's most important market, with about two-thirds of its roughly 12 million subscribers in North America.

3.1.6.6.3. Now, two major outages have occurred in the space of 10 months.

3.1.6.6.4. While many IT managers have some fallback options in place, the latest outage could spur more to find alternatives, he said, but added that handing employees two different devices could be impractical.

3.1.6.6.5. We have some gnashing of teeth, and we move on," said Iain Grant, managing director at SeaBoard Group in Montreal. "If another one happens relatively soon, I think...some harder questions will be asked."

3.1.7. some data

3.1.7.1. RIM reported it had added 1.02 million new subscribers, taking its total to 8 million. This is a huge increase from the 2 million subscribers the company reported a year ago, when it settled a patent infringement case with NTP. The company expects to add between 1.12 million and 1.15 million subscribers during the current quarter.

3.1.7.2. The outage hit RIM's most important market, with about two-thirds of its roughly 12 million subscribers in North America.

3.1.7.3. growth good

3.1.7.3.1. The service disruption last year didn't deter investors. Shares of Waterloo, Ontario-based RIM more than doubled in 2007 amid impressive growth in its subscriber base and profits that beat analyst expectations.

3.1.7.4. recession

3.1.7.4.1. However, the stock has had a rough start in 2008, falling about 20 percent so far amid worries over a possible U.S. recession and its potential impact on BlackBerry orders.

3.2. Undersea cables

3.2.1. art

3.2.2. art

3.2.3. art

3.2.4. art

3.2.5. animation

3.3. $54 million laptop suit

3.4. Soc Gen

3.4.1. art

3.4.2. art

3.4.3. art

3.4.4. art

3.4.5. art

3.4.6. art

3.4.7. IT comments

3.4.8. art

3.4.9. kenny

3.4.9.1. Soc Gen suggests biometrics

3.4.10. art

3.5. Lichenstein

3.5.1. art

3.5.2. art

3.6. TJX

3.6.1. art

3.6.2. art

3.6.3. TJX profit soar

3.6.3.1. steinnon

3.6.4. art

3.6.5. art

3.6.6. art

3.7. Youtube and Pakistan

3.7.1. art

3.7.2. art

3.7.3. art with tool analysis

3.7.4. art

3.7.4.1. should business rely on YT

3.7.5. art

3.7.5.1. internet routing insecurity

3.7.6. can we trust the internet?

3.8. Brazil Oil IP

3.9. Swedish passwords

3.9.1. art

3.10. Stolen FTP accounts

3.10.1. art

3.10.2. Crimeware as a Service

3.10.3. art

3.11. 10,000 accounts thing

3.11.1. art

3.12. billion dollar email

3.13. tibet

3.13.1. exampe of targetted attack

3.13.2. art

3.13.3. art

3.13.4. art

3.14. keeloq

3.14.1. art

3.14.2. art

3.15. Hannaford

3.15.1. art

3.15.2. art

3.15.3. lessons

3.15.4. art

3.15.5. art

3.15.6. art

3.15.7. art

4. data breach

4.1. MoD

4.1.1. human error

4.2. Monster site