PPT Slide
Case #3 (3 of 3): Entering and Breaking
- Major break-in occurred through weaknesses in one vendor’s OS (SGI). Root compromises also exploited OS weaknesses (SGI and others).
- The combination of detectable and undetectable bomb attacks hampered DoD’s response in resolving attack.
- These attacks required the sophistication of a high school sophomore.