information assurance
using independent research to write a 2 to 3 page paper answering the following questions:
1. Unusually, Google publicly disclosed the intrusion and named other companies that had been attacked. Other sources have reported that more than 34 organizations were targeted. List several of the companies reported to have been involved.
2. Describe the suspected method of intrusion. In particular, explain the vulnerability that was exploited by the Hydraq (also known as Aurora) Trojan Horse. The vulnerability affecting Internet Explorer was identified by Microsoft in an advisory on January 14, 2010.
3. What was the affect or loss reported by Google?
4. What evidence was reportedly used in attribution of the intrusions?