SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThis paper is going to highlight the Code Red Worm as a specific example of an attack. It will demonstrate how a network can be set up to help limit exposure to it and other similar attacks. It will also look at how a network can be designed to reduce the chance of it being infected, and then go a step further to show how to limit the risk associated when one of the systems has become infected. It will touch briefly on hardening, as well as network and firewall configuration. While it will relate to most any attack, I will look specifically at the Code Red Worm as an example, showing how it infected systems and what could have been done to limit its ability to attack. Lastly, I will show how the systems could be set up to reduce the risk of exposing their data if they have been compromised.