Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
The European Network and Information Security Agency (ENISA) organised a simulated distributed denial of service (DDoS) attack last week involving more than 300 cyber security professionals.
The Cyber Europe 2012 exercise was the second of its kind organised by European Union member states and European Free Trade Association (EFTA) countries.
It was designed to stress test capabilities and identify gaps and challenges on how large-scale cyber incidents could be handled more effectively in Europe.
It was also designed to test the effectiveness and scalability of existing mechanisms, procedures, information flow and cooperation between public authorities and public and private stakeholders in Europe.
Twenty five countries participated in the simulated attack and four observed.
“This was a collective effort with members of the organisations working with a friendly botnet to strike the services of members and point them in the right direction," Corero Network Security international operations vice president Paul Lawrence told SC.
"It was much more controlled than a standard attack as you can see where the traffic is coming from and see the levels of vulnerability.”
He pointed at the attack on Russia Today in August which he said showed that it did not have the right level of protection to deal with a DDoS attack, and it most likely had a standard security architecture.
“They likely had a firewall and intrusion prevention system, but that is not enough to mitigate against a DDoS attack. This would have given organisations the ability to protect themselves and understand where the weaknesses are,” he said.
This article originally appeared at scmagazineuk.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.