Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Don't Panic. Plan: Page 5 of 8



Vulnerabilities by Error class
click to enlarge

Thanks to ISS; the NIST ICAT team; Johannes Ullrich, CTO for the Internet Storm Center; CAIDA; and the Bugtraq community for supplying data and answering (often numerous) questions during the preparation of this article.

Mike fratto is a senior technology editor based in Network Computing's Syracuse University Real-World Labs®; he covers all security-related topics. Prior to joining this magazine, Mike worked as an independent consultant in central New York. Write to him at [email protected].

Post a comment or question on this story.

When you connect to the Internet, you are going to be scanned and attacked--but you can fight back and win. The key: Be consistent and methodical in your response. Keep current on patching, implement sound network-configuration practices, and keep up to date on current dangers. These organizations can help:

• CAIDA: The Cooperative Association for Internet Data Analysis is a group of commercial, government and research entities working to build a robust and scalable global Internet infrastructure.

• ICAT Metabase: A searchable index on computer vulnerabilities, ICAT provides very granular search capabilities and links to vulnerabilities and patch information.