Capital One Breach: An Analysis of Impact and Remediation Strategies

Verified

Added on  2022/08/29

|4
|368
|18
Report
AI Summary
This report analyzes the Capital One data breach, focusing on the event that occurred in 2019. The breach involved the theft of sensitive data, including personal and financial information. The report delves into the root causes of the breach, such as improper web application firewall configurations and infrastructural vulnerabilities. It explores potential mitigation strategies, including firewall updates and infrastructure improvements, to prevent similar incidents. Furthermore, the report examines the broader implications of the breach, highlighting the potential for data misuse, secondary attacks, and international ramifications. The report references relevant sources to support its analysis and conclusions, providing a comprehensive overview of the Capital One data breach and its implications.
Document Page
Running head: TERRORISM
TERRORISM
Name of the Student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
TERRORISM
PLATFORM BUSINESS
Zaidoon Barham
Manchester Business School
Document Page
2
TERRORISM
Background of the case
The event that is chosen for completion of the report is Capitol One breach. In the year of
2019, this attack took place. It have been observed that there have been hundreds and thousands
of application data have been breached. These data includes the likes of birth date, security
numbers (Capital One breach — Krebs on Security. Krebsonsecurity.com. 2020). The major
issue considered was that banking details were stolen as well. The data that were stolen were
presented in dark web as well.
How to mitigate similar situations
It have been seen that this issue have arisen due to improper configuration of the web
application firewall. It have been seen that the underlying infrastructure was not located in a
proper manner. With proper updating of the firewall, this issue can be eliminated. This
elimination of issues will be helping in bettering of the framework. This might be eliminating the
chances of breach in further cases. Again the infrastructure of the entire setting is needed to be
considered for mitigation of these kind of issues.
What is the broader impact?
There will be 2 kinds of issues that are expected in the process. The very 1st issue that
will take place is that the data that are once stolen can be used for gaining other data as well. In
that case it will be acting as meta data and victims might get victimized in repetitive manner
(Sharkey 2017). As the victims are located internationally as well, these data can be acting as a
source to anther global cyber attack.
Document Page
3
TERRORISM
References
Capital One breach — Krebs on Security. Krebsonsecurity.com. (2020). Retrieved 16 April
2020, from https://krebsonsecurity.com/tag/capital-one-breach/.
Sharkey, C. M. (2017). Can Data Breach Claims Survive the Economic Loss Rule?. DePaul Law
Review, 66(2), 17-30.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]