logo

The RSA Hacking Trail: A Study of Cybersecurity Breaches and Remedies

   

Added on  2019-09-23

9 Pages1815 Words239 Views
 | 
 | 
 | 
IT Security Breach Study IT Security Breach StudyName of the student1
The RSA Hacking Trail: A Study of Cybersecurity Breaches and Remedies_1

IT Security Breach Study Table of ContentsAbstract.......................................................................................................................................................3Justification for the Choice..........................................................................................................................4The Reasons behind this historical breach..................................................................................................5Impacts of the RSA hacking trail..................................................................................................................6Negative Impacts.....................................................................................................................................6Positive Impacts.......................................................................................................................................7Remedies emerged as an aftermath of the attack.......................................................................................7Bibliography................................................................................................................................................82
The RSA Hacking Trail: A Study of Cybersecurity Breaches and Remedies_2

IT Security Breach Study Abstract It might sound like a tale from Arabian Nights where a simple password can open the doors of a treasure for you. It was a thing of fantasyland during the 18th century, however, now the things have changed. In his novel “Digital Fortress” author Dan Brawn mentioned about a firewall setting that has the power to rob the digital privacy of every single human being living in the USA. [ CITATION Dan13 \l 1033 ]What they have mentioned in these fictional stories has become the truth of current day society. Now right from your simple digital wallet to your companies’ secret data of customer base, everything is a treasure and hackers are all on the hunt to rob it from it from you. In the course ofthis study, we will decipher some landmark cases that changed the perspective of people about the powers of a hacker. Here we will study these cases on technical and non-technical merits and try, to sum up, a precaution plan to prevent these hacking crimes in future. Our point of focus is infamous RSA case. We selected this case because it became a cynosure of controversy when various rival firms said that it was a complete disaster for RSA, however, RSA came out clean by reinstating the fact that their system survived from Major Attacks or it was only a security breach, not a data breach. [ CITATION Jac15 \l 1033 ]3
The RSA Hacking Trail: A Study of Cybersecurity Breaches and Remedies_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents