NASA Logo

NTRS

NTRS - NASA Technical Reports Server

Back to Results
Cyber-Attack Methods, Why They Work on Us, and What to DoBasic cyber-attack methods are well documented, and even automated with user-friendly GUIs (Graphical User Interfaces). Entire suites of attack tools are legal, conveniently packaged, and freely downloadable to anyone; more polished versions are sold with vendor support. Our team ran some of these against a selected set of projects within our organization to understand what the attacks do so that we can design and validate defenses against them. Some existing defenses were effective against the attacks, some less so. On average, every machine had twelve easily identifiable vulnerabilities, two of them "critical". Roughly 5% of passwords in use were easily crack-able. We identified a clear set of recommendations for each project, and some common patterns that emerged among them all.
Document ID
20170008244
Acquisition Source
Jet Propulsion Laboratory
Document Type
Conference Paper
External Source(s)
Authors
Byrne, DJ
(Jet Propulsion Lab., California Inst. of Tech. Pasadena, CA, United States)
Date Acquired
September 1, 2017
Publication Date
August 31, 2015
Subject Category
Computer Systems
Meeting Information
Meeting: AIAA SPACE Conference and Exhibition
Location: Pasadena, CA
Country: United States
Start Date: August 31, 2015
End Date: September 2, 2015
Sponsors: American Inst. of Aeronautics and Astronautics
Distribution Limits
Public
Copyright
Other
Keywords
cybersecurity

Available Downloads

There are no available downloads for this record.
No Preview Available