logo

Cyber Attack at Adobe

11 Pages2363 Words455 Views
   

Added on  2022-12-01

About This Document

This study discusses the cyber attack at Adobe, including the target, how the attack worked, the damage caused, and the detection of the attack. It also explores the perpetrator and the implications for cybersecurity. Suitable for cybersecurity courses.

Cyber Attack at Adobe

   Added on 2022-12-01

ShareRelated Documents
Running head: CYBER ATTACK AT ADOBE
CYBER ATTACK AT ADOBE
Name of the Student
Name of the University
Author Note
Cyber Attack at Adobe_1
CYBER ATTACK AT ADOBE1
Executive summary
Adobe Inc. is a leading and popular multinational organization of software. This is based on
the city of San Jose at the Californian state of America. It is found that various accounts of it
were impacted due to the accounts of cyber-attacks for a large amount of 2.9 million. It is
also found that the incident was admitted by Adobe and revealed that the hackers were
beyond the cyber-attack. They stole a large quantity of credential of those clients. Moreover,
the event has turned out to be the greatest beach in the century’s history. Here, in this study,
the primary target of the cyber-attacks has been discussed. They have also demonstrated the
manner how the attack has been deployed with damage due to the attacks. Thus, the attacks
have been found re also analyzed in the study.
Cyber Attack at Adobe_2
CYBER ATTACK AT ADOBE2
Table of Contents
1. Introduction............................................................................................................................3
2. Discussion..............................................................................................................................3
2.2. The target of the attack....................................................................................................3
2.3. How the attack worked....................................................................................................3
2.4. The damage caused by the attack:...................................................................................5
2.5. The detection of the attack..............................................................................................6
2.6. The perpetrator of this incident.......................................................................................7
3. Conclusion..............................................................................................................................7
4. References..............................................................................................................................9
Cyber Attack at Adobe_3
CYBER ATTACK AT ADOBE3
1. Introduction
Adobe Inc. is a multinational software organization which is based in the city of San
Jose in the Californian state of United States of America.. The number of an account which
was affected by the cyber-attack accounts to a huge number of 2.9 million 1. Adobe admitted
this incident and they also revealed that the hackers who were behind this cyber-attack stole a
huge amount of credentials of their customers. This incident became one of the biggest
breaches in the history of this century. This report will discuss the main target of this cyber-
attack and it will also discuss the way in which the attack was implemented along with
damage caused by this attack. The ways in which the attack was detected will also be
discussed.
2. Discussion
2.2. The target of the attack
The cyber-attack incident on the famous software development firm named Adobe,
which took place in 2013 mainly targeted the customers of this organization. It was
considered as one of the largest data breaches of this century 2. The personal data of the
customers of this organization were leaked due to this attack. The main target of this attack
was the customers of Adobe, whose Debit card or credit card details were leaked.
2.3. How the attack worked
It is estimated that the attackers eradicated particular information from the systems. These are
related to 2.9 million customers of Adobe. This has involved encrypted debit or credit card
1 Syed, Z., Padia, A., Finin, T., Mathews, L. and Joshi, A., 2016, March. UCO: A unified cybersecurity
ontology. In Workshops at the Thirtieth AAAI Conference on Artificial Intelligence.
2 Ryan, N., Coughlan, S., Silfversten, E., Reeves, H., Lu, H., Pye, D., Nederveen, F., Creese, J. and Persi Paoli,
G., 2019. LGA Cyber Security Stocktake.
Cyber Attack at Adobe_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Affected Computer Systems - Doc
|8
|518
|28

Understanding and Preventing Cyber Fraud
|9
|2125
|442

cyber security threats and attacks
|4
|749
|141

Case Study: The Home Depot Data Breach
|7
|1152
|186

Marriott Data Breach: Impact and Prevention
|6
|1591
|48

Sony PlayStation Breach: A Case Study on Security Breaches
|22
|1620
|280