FEATURE
FEATURE
power make it a major attack vector for
bad actors that are trying to subvert the
security of the data centre.
Advanced attackers aim low firewalls. At a fundamental level, the
attackers use rootkits that sit below the
level of the operating system, making
them extremely difficult to detect using
traditional methods.
Unfortunately, hardware problems in
the data centre don’t end with IPMI.
Advanced attackers, including nation-
states, increasingly target physical
servers, routers, switches and even These techniques allow attackers to infect
the very devices that are trusted and
charged with protecting the network, and
then use those devices to launch attacks
deeper into the network.
www.intelligentdatacentres.com
Keeping an eye on data
The ultimate goal of most attacks is to
steal data. Depending on their needs and
skill level, attackers can use a variety of
approaches to smuggle data out of the
data centre. The most obvious approach
involves moving data in bulk out of the
data centre, either directly to the Internet
or to an intermediate staging area in the
campus network.
Issue 14
37