Reference no: EM131429803
Case Study
A recent theft of Cisco Systems Inc,'s Internet Operating System source code could have far reaching security implications for the entire Internet, since much of the backbone is formed using Cisco infrastructure. The FBI has been working with Cisco systems to trace the thieves after samples of the source code appeared on a Russian Web site. The thief allegedly compromised a Sun Mircosystems server on Cisco's network and then posted a link to the source code files at an FTP site in the Netherlands. According to a Russian security firm, 800 MB of source code from Cisco, which included developmental-version software, was stolen and posting on www.securitylab.ru, malicious hackers made off with code versions 12.3 of IOS after "breaking the Cisco corporate network." Internet Operating System (IOS) is a proprietary operating system for routers and similar networking hardware made by Cisco.
The release of the Cisco IOS source code came only months after someone illegally posted an incomplete version of Microsoft 2000 source code on the Internet. While Windows 2000 has been replaced by XP, it still shares some source code with 2000. It's uncertain what the motive behind either attack might be, but the data may make it easier to exploit vulnerabilities in the software.
Police in the U.K have arrested a 20-yearold man in connection with the case who is suspected of committing "hacking offenses" under the country's Computer Misuse Act of 1990. The suspect has been released on bail, but computer equipment has been seized to discover forensic evidence. Police have not released further details since the investigation is ongoing.
It's unclear what the ramifications are regarding the stolen sourecode, and whether a hacker may use it to exploit systems in the future. Normally, networking software can only be manipulated using a management terminal located inside the site. A hacker would likely require considerable knowledge of a network to make use of the sourcecode. It may be more of a PR problem for Cisco, since their current branding slogan describes a Self-Defending Networking and their image could be tarnished by such attacks on their network.
1. What implications are there for Cisco if trade secrets were compromised in the hacker's release of the sourcecode?
2. How was the hacker able to breach the network defenses at Cisco?
3. Have there been any network attacks using the stolen software since the hacker's attack in 2004?
Policy concerning the indians unfold
: Under President Washington, Secretary of War Henry Knox had hoped to pursue a more peaceful policy with the Indians. How did U.S. policy concerning the Indians unfold in the 1790s?
|
How many stories does the residence have
: The street with the residences will appear. You need to use the pan bottom, located on the map and above the zoom tab. Pan to the right and the residence will appear. Note: The aerial view of the residence will be from the rear. Any views of ..
|
How did women react to the language of freedom and liberty
: How did women react to the language of freedom and liberty? Be sure to include in your response Abigail Adams's opinions that appear in "Voices of Freedom."
|
Explain the initial goals of the colonists
: Revolution is a dynamic process with consequences no one can anticipate. Explain the initial goals of the colonists in 1765 at the time of the Stamp Act and the evolution of their ultimate decision to declare independence in 1776. What were the po..
|
What implications are there for cisco
: What implications are there for Cisco if trade secrets were compromised in the hacker's release of the sourcecode? How was the hacker able to breach the network defenses at Cisco
|
Promote citizens knowledge about the criminal justice system
: Your text discusses several problems with the bail system in the United States. Identify the most serious problem and explain why this problem is so serious. Imagine you are a lawmaker in your state. How might you recommend that this problem be fi..
|
Major commercial centers in the afro-eurasian world
: 1. What were the major commercial centers in the Afro-Eurasian world? How did they fostercommercial exchange and establish a new commercial class?
|
Which of the following assumptions is most clearly violated
: The effect of a training program concerned with educating heart attack patients to the benefits of moderate exercise was examined. A group of recent heart attack patients was randomly divided into two groups; one group received the training progra..
|
Proposed builders of the impressive earthwork mounds
: 1. Who were some of the proposed builders of the impressive earthwork mounds found throughout the Mississippi and Ohio river valleys? Why were the ancestors of the Native Americans not considered legitimate candidates?
|