StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Hackers Gain Access to RSAs SecurID Tokens - Essay Example

Cite this document
Summary
The article “Hackers Gain Access to RSA’s SecurID Tokens” reveals that hackers have breached the security of the renowned security and cryptography Company RSA. The attack has targeted the SecurID two-factor authentication product used for bank accounts and network access…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.2% of users find it useful
Hackers Gain Access to RSAs SecurID Tokens
Read Text Preview

Extract of sample "Hackers Gain Access to RSAs SecurID Tokens"

The article also quotes the statements made by RSA on this issue. They have stated that APTs becoming a significant challenge for all large corporations. Also, the statements made by RSA’s CEO at the RSA Security Conference in San Francisco earlier this year describes that such attacks as part of an evolving threat landscape that has shifted from wholesale crime to targeted attacks that steal high-value information (Jackson, Hackers gain access to RSAs SecurID security tokens, 2011). The incident at RSA has also urged the government to work collaboratively with the private sector to address all kinds of cyber threats.

And the importance of comprehensive cybersecurity legislation is also understood by the authorities according to Sen. Susan Collins, Senate Homeland Security, and Governmental Affairs Committee.In general, the article has explained the scenario in a manner in which any novice person can understand what has happened. I feel very little technical information has been provided on, how the hackers got through the defenses of the RSA system. It seems the author may have thought that discussing such details will further damage the company’s reputation and security.

Since the damage has already caused by the incident, it is better to discuss the matter in more detail in the context of how they stopped the malicious activity.RSA should be given credit since they have taken measures to notify the public in time about the situation, where most other companies do not do. They have not been reluctant to accept that they have been beaten in their own backyard. In other words, it is a surprise for a company considered as the best in the business in developing security systems against hacking to face this type of situation.

The article strongly presents the confidence of the company in this critical situation by quoting the open letter and the CEO’s statements. From analyzing the statements of RSA’s CEO it is clear that they were aware of advanced persistent threats for some time. I think these comments also give the impression that they have not done enough to prevent such activity even though they knew what was coming. Clear evidence of the impact made by this incident felt by the government and related authorities is illustrated by bringing the new Cyber Security and Freedom act.

The article points out the importance of a collaborative effort between the government and the private sector to address all cyber threats that are essential in parallel to the strengthening of laws.In the RSA’s customers’ point of view, the article provides a good insight into the situation. Since the writer has been less critical of the company which will earn them some sympathy. Addition of technical details on the incident would have made the article more interesting for advanced readers as well.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Hackers Gain Access to RSAs SecurID Tokens Essay, n.d.)
Hackers Gain Access to RSAs SecurID Tokens Essay. Retrieved from https://studentshare.org/sociology/1576505-computer-hacking-or-hacker
(Hackers Gain Access to RSAs SecurID Tokens Essay)
Hackers Gain Access to RSAs SecurID Tokens Essay. https://studentshare.org/sociology/1576505-computer-hacking-or-hacker.
“Hackers Gain Access to RSAs SecurID Tokens Essay”. https://studentshare.org/sociology/1576505-computer-hacking-or-hacker.
  • Cited: 0 times

CHECK THESE SAMPLES OF Hackers Gain Access to RSAs SecurID Tokens

Advanced Persistent Threats against RSA Tokens

The paper ''Advanced Persistent Threats against RSA tokens'' tells that Today, where every technology interrelated to Information technology involves the '.... The number of RSA tokens implemented up till now exceeds 40 million and another 250 million are mobile software, as that leads the market for enabling two-factor authentications (Dumas, 2012).... Also, hackers and cybercriminals are exploring efficient codes day by day to advance the hacking tools, to breach into classified information, banks and website customer details, steal emails, etc....
5 Pages (1250 words) Essay

Advanced Persistent Threats Against RSA Tokens

The number of RSA tokens implemented up till now exceeds 40 million and another 250 million are mobile software, as that leads the market for enabling... Likewise, a new class of challengers called now as ‘Advanced Persistent Threats' (APT) demonstrates a well-planned and sponsored, highly skilled hackers targeting highly classified data for gaining competitive edge specifically in corporate businesses, law firms, military networks, national or international politics (Cole, 2012)....
5 Pages (1250 words) Case Study

The Ethical Aspect of Hacking

1030 prohibits any unauthorized access to the government systems.... The crackers access, retrieve and interfere with a company's data without any consent.... 1029, which prohibits any unauthorized access of secured systems.... This law justifies authorized access but does not provide for people who have a moral intent (Legal Information Institute).... There are however situations that may lead one to access systems without authorization in order to acquire essential data without committing fraud, for example in the literature work, The Girl with the Dragon Tattoo (Larsson), Lisbeth broke some laws in order to retrieve information that would bring justice, which gave her credit for the unlawful act....
6 Pages (1500 words) Research Paper

Information Security of Business

Tokens come in various shapes and sizes and they are mainly of two types; "passive tokens" are storage devices that contain a secret code that allows users to gain access to a network, whereas "active tokens" are usually small stand-alone electronic devices that generate a one-time password that is only useful for a single log-on and the user logs on to the system using this one-time password.... A new technology that has come up to secure information is the use of "tokens"....
3 Pages (750 words) Term Paper

When Hackers Turn to Blackmail

The hackers demand $100,000 in ransom money to regain access to the system.... The hackers demand $100,000 in ransom money to regain access to the system.... Layman is faced with the following alternative courses of action: (1) pay the ransom fee of $100,00 to the hackers to immediately regain access to the system; (2) improve security system by changing access controls, installing power backups, increase defense in depth strategy, employ encryption of data during transmission, strengthen antivirus, power and data back-up systems, firewalls, employs a highly competent human resource, passwords, and other computer security software, as needed; (3) disclose critical information to stakeholders; and (4) go back to manual processing of health care records....
2 Pages (500 words) Article

Network Security from Hackers

The user downloaded the Excel spreadsheets from the emails titled as “2011 Recruitment Plan”… With this opening to the RSA system, the attackers extracted the information until they obtained access to their targeted system where the data files were stolen. According to the details of the In order to prevent such attacks in the future the following measures should be thoroughly applied.... The employees should be educated on how to avoid suspicious emails (Minimizing the impact of the RSA securid breach, 2011)....
4 Pages (1000 words) Essay

Who Are the Hackers and What Do They Do

All they require in return is unlimited access to all the possible internet they can have.... Even the Encarta dictionary tells about the difference between them: “cracker is someone who is a computer user, and who gains unauthorized access, to a computer or system data, belonging to someone else, and the hacker is somebody who is interested or skilled in computer technology and programming.... This paper "Who Are the hackers and What Do They Do" discusses the technology that has flourished so much, that all homes have more computers than at least one each, that student's program like professional programmers, and that even exams are sometimes conducted online....
8 Pages (2000 words) Case Study

The Use of Hacking

For the purposes of this paper, hacking will be used to refer to access to information that is not readily available to the public by means of unauthorized access to computer systems.... Taylor describes the fourth generation of hackers as the people “who illicitly access other people's computers” (23).... Knittel and Soto (2003) disagree with the media's description of hacking as attacking other people's computers with the intention of causing harm (6) and instead describe hackers as overly talented persons who use their talents to explore innovative ways of improving how the computers operate by improving the software and hardware of the computers (8)....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us