StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Choose a recent IS security breach or service outage that has been in the media - Essay Example

Cite this document
Summary
Basically, security attacks and breaches may or may not depend on what is included within the term “security breach.” In this scenario, the majority of information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Choose a recent IS security breach or service outage that has been in the media
Read Text Preview

Extract of sample "Choose a recent IS security breach or service outage that has been in the media"

ID # A security breach or service outage that has been in the media In the past few years, information security has become a serious challenge for the business organizations. Basically, security attacks and breaches may or may not depend on what is included within the term “security breach.” In this scenario, the majority of information security laws and regulations describe “security breach” as an illegal access to a particular set of personal data and information (in the US, typically  information employed to produce or get access to financial accounts) (Nash; Cate).

For this paper, I have chosen a latest security issue that is known as RSA Security breach, which took place in March 2011. As a result of this breach records of more than 40 million workers were stolen. Additionally, the significant influence of such cyber attack that stole data and information on the businesss Secur-ID verification tokens is yet being debated. According to the management of RSA, two separate hacker groups working in the organization with an overseas supervision to begin a set of spear phishing based security attacks beside RSA workers, demonstrating like people the workers relied, to infiltrate the businesss network.

In this scenario, EMC stated that in last July it had used-up as a minimum $66 million on remediation. However, RSA administrative staff believes that there was no harm to clients networks. Additionally, the management of RSA has not supported the matter by initially being unclear regarding both the security based attack vector and (more notably) the information that was stolen (Armerding; Bell; Cate). In addition, it was simply a matter of time previous to following security based attacks on Lockheed-Martin, L3, and others happened, all of those are supposed to be particularly supported by RSA breach.

In this scenario, many people believe that it is just a psychological damage. Without a doubt, this security breach was very harmful and critical just not simply because of the damage it caused, however as well in the scenario of the miserable danger that it drove into each CIO who misplaced the warm-and-fuzzy situation that the reliability of his/her enterprise verification model was undamaged (Armerding; Bell; Cate). Moreover, the bank had to face the loss of more than $100 to put back identification tokens that left their computers susceptible to spying.

According to the management of RSA, clients have suggested them to follow a number of prevention practices. However, the bank is seriously considering the suggestions of their customers. And it is currently determining the security based breach with higher authorities; there is no hesitation more data will be published soon (Egusa; King).Furthermore, the bank has warned their customers to pay particular attention to information security especially while using social media systems and Web sites, implement powerful password, using various combinations and PIN policies, and be reminiscent workers to get rid of opening suspicious emails or do not share their log-in details with people or any other web sites.

In addition, customers should as well pay particular concentration to protecting their dynamic directories, "make complete use of their SIEM products," employ two-factor verification to manage access to dynamic directories, check for transformations in user privilege levels and access level privileges, restrict remote and physical access to structure hosting information security software. The bank has decided to implement these kinds of strategies as well. Though, the initiatives taken by the bank are appropriate, but I would suggest them to be more inventive in the future and implement lessons learned from serving its customers with its own inner enterprise technology based systems.

And it should also implement an information security contingency plan in the future that will help the bank quickly recover from these breaches (Rashid; Schwartz; Rashid, RSAs SecurID Breach Started with Phishing Email).Works CitedArmerding, Taylor. The 15 worst data security breaches of the 21st Century. 15 February 2012. 12 December 2012 .Bell, Stephen. Lessons From the RSA Breach. 04 October 2011. 14 December 2012 .Cate, Fred H. Information Security Breaches: Looking Back & Thinking Ahead. 2008. 14 December 2012 .

Egusa, Conrad. RSA security breach leaves data for 40M employees vulnerable. 18 March 2011. 14 December 2012 .King, Rachael. EMC’s RSA Security Breach May Cost Bank Customers $100 Million. 08 June 2011. 15 December 2012 .Nash, Jason. Networking Essentials, MCSE Study Guide. California: IDG Books Worldwide, Inc, 2000.Rashid, Fahmida Y. RSA Warns SecurID Customers of Data Breach. 18 March 2011. 17 December 2012 .—. RSAs SecurID Breach Started with Phishing Email. 04 April 2011. 14 December 2012 .

Schwartz, Mathew J. RSA SecurID Breach Cost $66 Million. 28 July 2012. 15 December 2012 .

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Choose a recent IS security breach or service outage that has been in Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1611880-choose-a-recent-is-security-breach-or-service-outage-that-has-been-in-the-media
(Choose a Recent IS Security Breach or Service Outage That Has Been in Essay)
https://studentshare.org/information-technology/1611880-choose-a-recent-is-security-breach-or-service-outage-that-has-been-in-the-media.
“Choose a Recent IS Security Breach or Service Outage That Has Been in Essay”, n.d. https://studentshare.org/information-technology/1611880-choose-a-recent-is-security-breach-or-service-outage-that-has-been-in-the-media.
  • Cited: 0 times

CHECK THESE SAMPLES OF Choose a recent IS security breach or service outage that has been in the media

Medicare Part D Policy Analysis

Generally, any person who is 65 years of age or above and has been a legal resident of the United States of America for at least five years is eligible for the Medicare part D coverage.... However, the plans do not cover all prescription drugs, thus it is important that the users choose a program that meets their needs.... The program has received praises because it more affordable than the other Medicare programs; the program cuts into half the drug expenditures of beneficiaries....
10 Pages (2500 words) Term Paper

Hackers That Breached the Eidos Montreal Website

2 Ethics Statement Hacking is related to explore a security flaw that has not been addresses before.... The statement given by the concerned personnel of the organization was not credible as the security breach clearly demonstrated loopholes in their security architecture.... hellip; We immediately took the sites offline to assess how this had happened and what had been accessed, then took further measures to increase the security of these and all of our websites, before allowing the sites to go live again"(Square enix confirms data lifted in website raids • the register )....
6 Pages (1500 words) Assignment

IPad's Security Breach

iPad's security breach Introduction A security hole in Apple's iPad, stormed the technology industry about the threats which can affect an individual or an entire nation.... AT&T, the service provider for Apple iPad accounted for a security breach as the email-ids' of more than 1,00,000 users got exposed by a group of hackers called Goatse Security.... This issue has a great impact on the technological industry as leakage of information and personal data is an unethical practice under law which can create serious threat if not dealt seriously by the security authority....
5 Pages (1250 words) Coursework

IPad's Security Breach

Running Head: iPad's security breach AT&T‘s iPad's security breach [Name of Student] [Name of Institution] Introduction In June 2004, Apple suffered an embarrassment when a security breach exposed personal details of its iPad's owners, among them influential politicians, businessmen, corporate CEOs, and the U.... However, the website security firm informed AT&T of the security breach, which was immediately rectified.... hellip; This hacking was the work of a website security group called Goatse Security, which shared the iPad's users IDs and personal information with a media firm called Gawker media, LLC (Tate, 2011)....
4 Pages (1000 words) Essay

Network Security: Opening to the World

Network Security: Opening to the World Name Institution Network Security: Opening to the World Web conferencing The main element that has been discussed when it comes to network security is whether the Internet-based conferencing is as safe as face-to-face meetings.... Network Security: Opening to the World Network Security: Opening to the World Web conferencing The main element that has been discussed when it comes to network security is whether the Internet-based conferencing is as safe as face-to-face meetings....
3 Pages (750 words) Essay

IPad's Security Breach

The author of the paper "iPad's security breach" touches upon the idea of security of "iProducts".... The security breach that occurred in Apple iPad's was first disclosed by Gawker Media, an online media, and blog network company.... Goatse Security released the itineraries of the security breach to Gawker Media who subsequently made the information public through their blog.... nbsp;… Goatse Security reported to Gawker that using a script available at AT&T's website, they were able to hack into the iPad and retrieve email addresses of possibly 11,4000 people including top celebrities, politicians, media personalities and also military personnel....
5 Pages (1250 words) Research Paper

How Far Does the Description of Totalitarianism in Nineteen Eighty-Four Fit Reality

he principle of “initial” panopticism is as follows: there is a building that has a circular form (a ring), and in its center, there is a tower.... The tower has big windows that face the interior side of the ring.... The "How Far Does the Description of Totalitarianism in Nineteen Eighty-Four Fit Reality " paper describes what is “disciplinary” society, M....
6 Pages (1500 words) Assignment

IPads Security Breach

This paper, iPads security breach, declares that group of expert hackers breached Eidos Montreal website compromising 25,000 email addresses along with 350 resumes dated May 13, 2011.... nbsp;… As the paper highlights, the statement given by the concerned personnel of the organization was not credible as the security breach clearly demonstrated loopholes in their security architecture.... The statement given by the concerned personnel of the organization was not credible as the security breach clearly demonstrated loopholes in their security architecture....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us