Chapter 6. Technology

A multibillion-dollar international oil company discovered that one of its internal file servers had been compromised. Had an internal employee compromised the system, or had the network been compromised by an external party? The company didn't know, and it opened an investigation to find out. The credentials used to gain access to the system were fraudulent, so the investigation focused on the authentication servers and discovered that two of them had been compromised.

The company's internal network was complex, and critical nodes were not adequately secured, so the authentication systems served little purpose. The soft, chewy center of the large, complex network was unprotected.

It took months to trace the sequence of ...

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.