The Internet, in a world where a malicious actor could compromise hundreds of millions of computers, is often an untapped resource for network engineers and network admins to monitor and manage.
But with so many security risks in the wild, and no clear understanding of how to best mitigate them, the Internet has become an untrustworthy place for network administrators.
The New York Times has an extensive list of the most common vulnerabilities that are exploited by hackers, and how to mitigate them.
But there are also many more that are hidden and poorly documented.
This is a rush transcript.
Please check your Recorder for an audio quality that’s closer to the original broadcast.
I’ve just come back from an attack on the network I’m working on, which is a very large network.
There are probably around 100 million devices on this network.
We’re talking about servers that are running a very, very old version of Windows.
And we’re also talking about a large number of network traffic coming from all sorts of sources.
And so it was, I think, one of the biggest attacks I’ve ever seen, which was in fact the first time that a large network was targeted by a large attack in my life.
The attackers were in China, and they had some kind of remote access device that they were able to remotely access.
And they were targeting these servers in China with malicious code.
And I had the capability to see what they were doing and to look for vulnerabilities in the code.
And so we were able, as a network engineer or network administrator, to write a program that was able to detect and take care of this attack.
We wrote a program to look at the code that was in the attack and find any vulnerabilities that could be exploited by the attackers to take advantage of them.
And that program actually did detect the vulnerabilities and patched them.
And this was actually a fairly sophisticated attack, so it’s not really surprising that it did succeed.
I mean, it was the most sophisticated attack I’ve seen.
And, you know, it’s a great example of the power of network security in the Internet of Things.
And the attack that we discovered was in our network that was really a very old Windows version of the operating system.
And the attackers had access to a large amount of traffic that was coming from the Internet, so they were exploiting the same vulnerabilities in our system as the attackers were exploiting in their attacks.
And when they got into our system, they used a lot of resources, and we were aware of this, because we were actively monitoring that traffic coming into our network.
And what we did, we started a network diagnostic tool that was used to look into the code running in the network.
And what we found was that there was a number of security vulnerabilities that were not disclosed in the Windows security bulletin.
So they were not visible to our system.
They were not known to our users.
And it turns out that, you might expect, because that’s a very common thing that network administrators are looking at, the first thing that they look at is if there are vulnerabilities that they don’t know about.
And in this case, that was a huge problem because there were many different vulnerabilities that we had never discovered, and were not exposed to the network administrators that we’re trained to be.
So this is a big story, and it’s really the first real example of a network attack that’s really out of the ordinary.
And this is what happens when we have this many vulnerabilities in a network, especially when you have so many different types of devices connected to the Internet.
And it can be really hard to detect them and to mitigate the threat, especially in a large system that’s not designed for high-profile network attacks.
So I think it’s good that we know about those vulnerabilities, and that we’ve put them out there, and to have that kind of information in the hands of network administrators is a really big deal.