RE: Navy Marine Corps Internet hit

On Tue, 19 Aug 2003, Scott Weeks wrote: -> on the .pif, .scr, etc. attachments...) Maybe I was just lucky. Most -> likely, though, they did not create "security zones" to keep problems -> contained within certain network segments and not let them out to destroy -> other networks. -Luck is very important. -Like most other people I have no knowledge about how the Navy Marine -Internet works, but that won't stop me from commenting. -It sounds like a "turnkey" operation, with EDS managing everything. They -may have 100,000 users with identical configurations (software, patch -levels, etc) in one big flat network. A large homogeneous population is -vulnerable to a common infection. Nachia has a very effecient scanning -and infection process, particularly if your entire network uses RFC1918 -address space internally. As a former Marine, and IT support staff member.. The Military uses REAL WORLD IP's on ALL systems. I won't mention IP's. BUT they have all RW on every system. Not quite a flat net either... It is rather a unique system, to say the least..... J

On Wed, 20 Aug 2003, McBurnett, Jim wrote: : -It sounds like a "turnkey" operation, with EDS managing everything. They : -may have 100,000 users with identical configurations (software, patch : -levels, etc) in one big flat network. A large homogeneous population is : -vulnerable to a common infection. Nachia has a very effecient scanning : -and infection process, particularly if your entire network uses RFC1918 : -address space internally. : : As a former Marine, and IT support staff member.. : The Military uses REAL WORLD IP's on ALL systems. : I won't mention IP's. BUT they have all RW on every system. : Not quite a flat net either... : It is rather a unique system, to say the least..... Do you know if they segment the network into the zones I spoke of? Why would they be so ravaged as to have a network which could "become so congested by worm traffic it can not be used for useful work" if the security was in place at the ingress/egress of each security area? Special policy that wouldn't allow proper technological solutions? scott
participants (2)
-
McBurnett, Jim
-
Scott Weeks