Ask a question from expert

Ask now

IT Security Breach Study

9 Pages1815 Words239 Views
   

Added on  2019-09-23

About This Document

This study delves into the infamous RSA security breach of 2011 and its impacts on the IT security industry. It explores the reasons behind the breach, its negative and positive impacts, and the remedies that emerged as an aftermath. The study provides insights into the world of cybercrime and prevention strategies. The case study is relevant for IT aspirants and professionals dealing with cybersecurity.

IT Security Breach Study

   Added on 2019-09-23

BookmarkShareRelated Documents
IT Security Breach Study IT Security Breach StudyName of the student1
IT Security Breach Study_1
IT Security Breach Study Table of ContentsAbstract.......................................................................................................................................................3Justification for the Choice..........................................................................................................................4The Reasons behind this historical breach..................................................................................................5Impacts of the RSA hacking trail..................................................................................................................6Negative Impacts.....................................................................................................................................6Positive Impacts.......................................................................................................................................7Remedies emerged as an aftermath of the attack.......................................................................................7Bibliography................................................................................................................................................82
IT Security Breach Study_2
IT Security Breach Study Abstract It might sound like a tale from Arabian Nights where a simple password can open the doors of a treasure for you. It was a thing of fantasyland during the 18th century, however, now the things have changed. In his novel “Digital Fortress” author Dan Brawn mentioned about a firewall setting that has the power to rob the digital privacy of every single human being living in the USA. [ CITATION Dan13 \l 1033 ]What they have mentioned in these fictional stories has become the truth of current day society. Now right from your simple digital wallet to your companies’ secret data of customer base, everything is a treasure and hackers are all on the hunt to rob it from it from you. In the course ofthis study, we will decipher some landmark cases that changed the perspective of people about the powers of a hacker. Here we will study these cases on technical and non-technical merits and try, to sum up, a precaution plan to prevent these hacking crimes in future. Our point of focus is infamous RSA case. We selected this case because it became a cynosure of controversy when various rival firms said that it was a complete disaster for RSA, however, RSA came out clean by reinstating the fact that their system survived from Major Attacks or it was only a security breach, not a data breach. [ CITATION Jac15 \l 1033 ]3
IT Security Breach Study_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
One of the Privacy Violation Incidence of Yahoo
|6
|2097
|434

Critical Thinking Internet of Things
|2
|725
|35

Assignment on Ethical Hacking
|8
|2303
|56

Symantec Data Breach: Causes and Critical Security Controls
|6
|1510
|86

Yahoo Data Breach Case Assignment
|9
|3207
|30

Canva under Cyber-Attack
|6
|1400
|34