Module 7 DB

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

-640

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by Pebbles019021

Report
Cyberattacks against major businesses, colleges, and the federal government have dramatically increased in recent years. In most cases, the cyberattack ended in massive breaches and leaks of personal information. Here are a few examples for you to review: Here's What Happened to Your Target Data That Was Hacked Home Depot Hackers Exposed 53 Million Email Addresses U of Nebraska Data Breach Affects 650,000 Students Cybersecurity Resource Center In each of these cases, the organization noted possible causes for its security breach. For your main post, select one of these examples, or find an example of your own noting the same type of security breach, and identify the most probable cause in security that allowed the breach. If you choose a different example, be sure you provide a link to the story at the end of your initial post. An incident involving unauthorized access to computer data, applications, networks, or devices is considered a security breach. Data is accessed without authorization. It usually happens when an intruder bypasses security measures. One security breach happened to Adobe in 2013. The Adobe data breach is recognized as one of the most major incidents of the twenty-first century (Alharbi , 2020 ). The breach occurred after attackers compromised one of Adobe's public-facing web servers and then used that access to move laterally through its network. Cybercriminals stole login credentials from the company's system and gained unauthorized access to approximately 153 million records during this breach. As a result of the hack, 152 million usernames, poorly encrypted passwords, and credit and debit card details were published in a 3.8GB file found on a backup server raided by hackers (Pauli, 2015). Developers in the company reported that hackers gained access to Photoshop editing source code, which is often used by professional photographers. There was also a theft of the source code for ColdFusion, Acrobat, and ColdFusion Builder (Pauli, 2015). Since the company used the same encryption key for all passwords, security practices were poor at the time. At the time of the breach, the company had not implemented a new encryption system nor removed the old backup server (Pauli, 2015). This was the probable cause of the breach. Following the violation of the Customer Records Act in 2015, Adobe was ordered to pay $1.1 million in legal fees and $1 million in compensation to the affected users.
The link to this breach is: https://www.theregister.com/2015/08/17/adobe_settles_claims_for_data_br each/ Reference Alharbi, F. S. (2020). Dealing with Data Breaches Amidst Changes In Technology.  International Journal of Computer Science and Security  [IJCSS],  14 (3), 108+. https://link.gale.com/apps/doc/A682507250/AONE? u=nhc_main&sid=googleScholar&xid=702ed798 Pauli, D. (2015, August 18). Adobe pays US$1.2M plus settlements to end 2013 breach class action . The Register® - Biting the hand that feeds IT. Retrieved December 19, 2022, from https://www.theregister.com/2015/08/17/adobe_settles_claims_for_dat a_breach/
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help