
10.4 INTRUSION PREVENTION 361
10.5 DISASTER RECOVERY HITS HOME
MANAGEMENT
FOCUS
‘‘The building is on fire’’ were the first words she
said as I answered the phone. It was just before
noon and one of my students had called me from
her office on the top floor of the business school at
the University of Georgia. The roofing contractor
had just started what would turn out to be the
worst fire in the region in more than 20 years
although we didn’t know it then. I had enough time
to gather up the really important things from my
office on the ground floor (memorabilia, awards,
and pictures from 10 years in academia) when
the fire alarm went off. I didn’t bother with the
computer; all the files were backed up off-site.
Ten hours, 100 firefighters, and 1.5 million gal-
lons of water later, the fire was out. Then our work
began. The fire had completely destroyed the top
floor of the building, including my 20-computer
networking lab. Water had severely damaged the
rest of the building, including my office, which, I
learned later, had been flooded by almost 2 feet of
water at the height of the fire. My computer, and
virtually all the computers in the building, were
damaged by the water and unusable.
My personal files were unaffected by the loss of
the computer in my office; I simply used the back-
ups and continued working—after making new
backups and giving them to a friend to store at
his house. The Web server I managed had been
backed up to another server on the opposite side
of campus 2 days before (on its usual weekly
backup cycle), so we had lost only 2 days’ worth
of changes. In less than 24 hours, our Web site
was operational; I had our server’s files mounted
on the university library’s Web server and redi-
rected the university’s DNS server to route traffic
from our old server address to our new temporary
home.
Unfortunately, the rest of our network did not
fare as well. Our primary Web server had been
backed up to tape the night before and while the
tapes were stored off-site, the tape drive was not;
the tape drive was destroyed and no one else
on campus had one that could read our tapes; it
took 5 days to get a replacement and reestablish
the Web site. Within 30 days we were operating
from temporary offices with a new network, and
90 percent of the office computers and their data
had been successfully recovered.
Living through a fire changes a person. I’m
more careful now about backing up my files, and
I move ever so much more quickly when a fire
alarm sounds. But I still can’t get used to the
rust that is slowly growing on my ‘‘recovered’’
computer.
SOURCE: Alan Dennis
10.4 INTRUSION PREVENTION
Intrusion is the second main type of security problem and the one that tends to receive
the most attention. No one wants an intruder breaking into their network.
There are four types of intruders who attempt to gain unauthorized access to com-
puter networks. The first are casual intruders who have only a limited knowledge of
computer security. They simply cruise along the Internet trying to access any computer
they come across. Their unsophisticated techniques are the equivalent of trying door-
knobs, and, until recently, only those networks that left their front doors unlocked were
at risk. Unfortunately, there are now a variety of hacking tools available on the Internet
that enable even novices to launch sophisticated intrusion attempts. Novice attackers that
use such tools are sometimes called script kiddies .
The second type of intruders are experts in security, but their motivation is the
thrill of the hunt. They break into computer networks because they enjoy the challenge