Ask a question to Desklib · AI bot

Ask NowBETA

IT Security Breach Study

Added on -2019-09-23

This study delves into the infamous RSA security breach of 2011 and its impacts on the IT security industry. It explores the reasons behind the breach, its negative and positive impacts, and the remedies that emerged as an aftermath. The study provides insights into the world of cybercrime and prevention strategies. The case study is relevant for IT aspirants and professionals dealing with cybersecurity.
| 9 pages
| 1815 words
| 239 views

Trusted by 2+ million users,
1000+ happy students everyday

IT Security Breach Study IT Security Breach StudyName of the student1
IT Security Breach Study Table of ContentsAbstract.......................................................................................................................................................3Justification for the Choice..........................................................................................................................4The Reasons behind this historical breach..................................................................................................5Impacts of the RSA hacking trail..................................................................................................................6Negative Impacts.....................................................................................................................................6Positive Impacts.......................................................................................................................................7Remedies emerged as an aftermath of the attack.......................................................................................7Bibliography................................................................................................................................................82
IT Security Breach Study Abstract It might sound like a tale from Arabian Nights where a simple password can open the doors of a treasure for you. It was a thing of fantasyland during the 18th century, however, now the things have changed. In his novel “Digital Fortress” author Dan Brawn mentioned about a firewall setting that has the power to rob the digital privacy of every single human being living in the USA. [ CITATION Dan13 \l 1033 ]What they have mentioned in these fictional stories has become the truth of current day society. Now right from your simple digital wallet to your companies’ secret data of customer base, everything is a treasure and hackers are all on the hunt to rob it from it from you. In the course ofthis study, we will decipher some landmark cases that changed the perspective of people about the powers of a hacker. Here we will study these cases on technical and non-technical merits and try, to sum up, a precaution plan to prevent these hacking crimes in future. Our point of focus is infamous RSA case. We selected this case because it became a cynosure of controversy when various rival firms said that it was a complete disaster for RSA, however, RSA came out clean by reinstating the fact that their system survived from Major Attacks or it was only a security breach, not a data breach. [ CITATION Jac15 \l 1033 ]3

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Students who viewed this