Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Background: In Chapter 1 and 2 of the Corporate Security book, and during the lectures, we discussed threats, threat vectors, adversarial issues and social engineering

Background: In Chapter 1 and 2 of the Corporate Security book, and during the lectures, we discussed threats, threat vectors, adversarial issues and social engineering regarding information and information systems. Moreover, chapter 2 and the lectures dove further into understanding Information Assurance, policy and procedures.

Discussion: There are many kinds of Information Security Threats which are often categorized as Network Threats, Host Threats, and Application Threats. The information below provides a few types of threat which are not all inclusive.

Network Threats Host Threats Application Threats

Misconfiguration Physical Security Buffer Overflow Sniffing or eavesdropping Unauthorized Access Improper data/input validation Denial of Service Attack (DoS) Malware Attacks SQL injection DNS and ARP Poisoning Password attacks Information compromise/breach Password attacks Privilege Escalation Crypto attacks Spoofing Arbitrary Code Execution Authentication attacks Session Hijacking Backdoor attacks Outdated patches Man, in the middle attack Denial of Service Session attacks

Task:

Find a reported data breach and identify the weakness, strategy, tools etc. used to carry out the attack. You may want to use other sources for example, podcast, news articles, Information Security Websites etc. rather than Google alone.

Guidelines (remember what I said about guidelines):

1. Find a data breach reported within the last 5 years

a. Suggestions on how to find data breaches: Perform Google searches, listen to security podcast (Enterprise Security Weekly, GDPR Weekly Show with Keith Budden, etc.), review investigating news articles, research Security Websites.

b. Note: I am not affiliated or recommending any particular site (these are just examples). Be careful during your search, only used legitimate material

c. The data breach may come from any country, you are not limited to America.

2. Evaluate the breach by identifying methods, strategies, tools used to exploit the weakness.

3. Develop a report analyzing the breach and explaining the components of the breach in step 2 above. The report should be 2 pages and please cite the sources using APA.

a. Next, based on the information learned in class and in your own research, draft a countermeasure for your chosen attack that may have mitigated the amount, or type, of data comprised, but explain the countermeasure in detail.

b. Also, be sure to include the impact that the breach imposed either publicly or private. This may include, but is not limited to, customer or client reviews, opinions of journalist or newspapers that may have covered this breach, or even your own thoughts. (For example: according to the Washington post over 5,000 customers had their information leaked during the xxxxxxx breach. Long term customers like Janice Lordes, who has been doing business with xxxxxx for 20 years stated I am so afraid to do business with them now, I will now have to go elsewhere

*Keep in mind reputation is easy to lose and hard to rebuild*

4. Your conclusion should include an overview of your report without restating the original report word for word. In other words, do not plagiarize. Your conclusion should leave a reader considering your report long after reading. You can achieve this by giving a statistical or opinion-based idea regarding securing data that either should be adopted by all businesses that handle PII or that should no longer be used by them for securing purposes

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

From Zero To Data Hero With Chatgpt

Authors: Andrew Wu

1st Edition

B0CQRJPXD9, 979-8989523009

More Books

Students also viewed these Databases questions