Enter Your Details to Register

Please enter your official e-mail ID. Kindly do not use a personal ID like GMail, Yahoo etc.,
Please do not enter +91 or 0.
Image CAPTCHA
Enter the characters (without spaces) shown in the image.

Enter Your Log-in Details

This add will automatically close in seconds Close
%%CLICK_URL_UNESC%%

War Gaming: Necessary Exercises

Published 13th Apr 2009 | Source - Intel | Pages - 4

In the old days, there were white hat hackers who put their skills to use helping organizations understand and prevent vulnerabilities. At Intel, there's a 21st century version playing out under the auspices of Intel's Information Security team. Read how Intel approaches war gaming and creates a companywide security force.

Several times a year, Intel employees meet and plot how to hijack shipments of microprocessors, sell our intellectual property to competitors, blackmail our coworkers, and hack our networks. And we pay them to do it. We even provide lunch.

This is war gaming. For a few days we give the group a hypothetical target-some asset we want to protect - and ask them to think like blackmailers, hackers, terrorists, and hijackers. Intel's Information Security team uses those malicious plots to identify holes in our defenses and patch them, so that Intel assets remain safe.

Who are Threat Agents, and What Do They Want?
We have identified numerous archetypes, called threat agents, that differ in intent, capability, and resources. They all endanger your assets.The lone teenage hacker proving his acumen is a stereotype from the 1980s (think of Matthew Broderick in the 1983 film called, coincidentally, "WarGames"), and is a minor threat today. Now, other threat agents like terrorists and disgruntled employees are out to cause your company embarrassment or financial damage. Organized crime or hostile governments might want your property or secrets for resale. An attacker might be part of a well-resourced, ultra-sophisticated syndicate, or a lone opportunist from inside your company.

But not all threat agents are attackers. Some are simply untrained employees who create security gaps, or honest people with more network access than they require to do their jobs.

Every threat agent, hostile or not, endangers a company's assets. For a bank, the asset is obviously money. For a tobacco company, it is cartons of cigarettes, and for years those companies were targeted by hijackers who knew when and where to intercept trucks.

Intel produces microprocessors, which are like gemstones in terms of high value in a small package. So our assets are our products, as well as our product designs, high-value equipment, financial databases, and employee records. Indeed, employee records are a very attractive target for organized crime intent on identity theft.

 

Sponsored Content

Sign In

Please sign in and you will have access to all the content available on CIO.in

Username


Password




Forgotten password?

One Time Registration Only !

Register now For your free CIO.in account and avail the following key benefits:
  • Never fill up any form to download whitepapers and case studies
  • Special invitations to CIO events
  • Be the first to get CIO reports & analysis
  • CIO special offers... and much more!

latest whitepapers

  • Chart your path to the cloud with tactical steps and clear business outcomes

    When you’re venturing into new territory, you want to be sure to have the right guide. Whether your approach is evolutionary or revolutionary, Dell consultants can help you define a strategy that includes the right technology, operational considerations, actionable plan and financial justification for your transition to the cloud.

    Source Dell
  • What Makes a Private Cloud a CLOUD?

    Organizations of every size have the capability to build a private cloud, and frankly, they should. Private clouds are the means for IT to re-establish its value back to the business — enabling productivity, competitive advantage, and increased customer service.

    Source Dell
  • Accelerating business responsiveness through Dell private cloud solutions

    Building a private cloud with Dell will help your organization empower users and customers with the right service levels, optimize application delivery total cost of ownership, and enable service-centric IT that accelerates business responsiveness.

    Source Dell