11 Oct
2004
11 Oct
'04
6:12 a.m.
1. Do BCP38. http://rfc.net/bcp0038.html
Have your CFO read SAC004. http://www.icann.org/committees/security/sac004.htm
Implement source address validity checks. http://www.cisco.com/en/US/tech/tk828/tk363/technologies_tech_note09186a0080...
2. Filter aggressively. Run a dark-net, http://www.cymru.com/Darknet/
Hunt down documents like these, post links to them on your intranet, print them out and post them in your offices, write executive summaries of them, i.e. one short paragraph that managers can understand, and then email these summaries to decision makers. Eventually people do act on this knowledge. They may think it was their own idea, but that isn't as important as making the effort. --Michael Dillon