DOD-CERT Y2K Planning
Maintain Normal Operations at a heightened readiness state
Y2K Roles:
- Y2K versus Computer Security
- ID computer security related events from the noise of Y2K events
- Strategic assessment of computer security events to one another and Y2K events
- Increased incident response capability
- Update OSD with CERT/CC & FIRST information
Event Expectations:
- May mimic a Denial of Service attack
- May see an increase in “noise” (probes/scans) or may experience silence
- May see an increase in malicious code infection (virus/trojan horse/worms)
- Will exploit System Administrators’ fears that a Y2K fix did not work or testing was incorrect