Temple University

Week 13!

Regardless of how many security products and procedures you put in place there will still be ways to get around them and cover the tracks. Evasion techniques are used to accomplish these goals. Our reading is an introductory piece to evasion techniques and lists obfuscation, encryption and tunneling, fragmentation, and protocol violations as evasion techniques.

Evasion is incredibly dangerous because it is an attack that you’re unable to trace. It would be like the IT version of a stealth bomber flying into your airspace without you being able to track it on radar. Since these techniques are so dangerous it’s important to test your ability to launch one of these attacks on your systems. The suggested method in the reading was to set up a test network that simulates the real environment and is off the grid.

Article for the week: Anonymous declares cyber war on ISIS http://fortune.com/2015/11/16/anonymous-cyber-war-isis/?xid=soc_socialflow_twitter_FORTUNE

I thought this was of note because as we shift to more and more cyber risk in society there is a chance that individuals can play unsolicited roles in military type actions that used to be exclusive to the government.

Leave a Reply

Your email address will not be published. Required fields are marked *