2 hours 13 minutes
Welcome to the Palo Alto Networks. Cyber Security Academy, Secure Business Systems Administration presentation on cybercrime Looking at notable business cybercrimes incidents in history.
First off, let's look at the exploit that was leveraged against Target Corporation in 2013. It was a major long term attack affected upwards of 40 million customers
with an acknowledge cost of more than $290 million.
Attacker's first exploited an H back Contractors computer then escalated their attack through a poorly designed Target Store wireless network, and eventually they compromise the payment card point of sale terminals.
So in improved wire with security model, along with closer inspection of the trusted contractors, network activities could have reduced the severity of this event.
Home Depot corporations suffered a similar attack, also against their point of sale systems. It was an exploit of a vendor's credential that progressed for five months before detection.
56 million customer credit cards were compromised. The acknowledge cost of the breach was close to $300 million. Again, an inspection of the trusted contractors network activities, as well as more effective monitoring and credential management would have reduced the severity of this event as well
Sony Pictures suffered a system wide takeover attack that exposed confidential data customer information and also destroyed thousands of their corporate computing systems. Sony was unable to control the event. Their only recourse was damage control, and they faced a serious uphill public campaign battle
to restore customer confidence.
Health insurance company Anthem suffered a database breach that continued for several months before being detected.
Attackers used a database administrators credential to launch queries that exported 80 million customers personally identifiable information.
The breach cost is estimated at over $30 billion. A more stringent password policy may have reduced the severity of this event.
The United States Central Intelligence Agency fell victim to a social engineering attack that was performed by a spoof third party hacker.
It exposed the private email account of the C I. A. Director.
Improve social engineering, training and awareness could have prevented this attack.
Yeah, who suffered a data breach attack that compromise the personally identifiable information of some 500 million users.
This data breach is considered the largest compromise of any disclosure attack. To date,
Attackers were able to decrypt passwords that were supposedly highly encrypted, leading experts to deduce that the attack was performed by a state sponsored actor
similar to the Sony attack. Yahoo's only remedy was a public campaign to restore customer confidence.
Credit bureau company Equifax suffered a data breach that exposed approximately 150 million customers personal data with an estimated cost of more than $500 million.
The attack exploited an unpatched Apache Web server. Vulnerability,
adequate server maintenance and patching should have prevented this attack.
Clothing company under ARMORS website was compromised, resulting in a data disclosure for 150 million user accounts.
Fortunately there, Web application did not directly expose customer Social Security numbers or payment card information.
The concept of defense in depth or layering actually was employed and helped reduce the impact of this breach.
Facebook users who installed a plug in exposed their personal data as what was their Facebook friends. Personal data to a political consulting firm.
The breach affected some 87 million users. This attack exposes the vulnerabilities associated with trusting a service such as Facebook.
Users should not assume that the activities that take place within a service network provider are protected.
Mary A corporation disclosed that a breach of their reservation system compromised the personal data of 500 million guests,
it is significantly alarming that the attack continued for approximately four years.
All of these attack examples outlined some of the major security challenges that administrators face when attempting to protect company data, customer information and services. Many of these events could have been prevented or diminished through diligent cybersecurity monitoring, effective patching and also training and awareness.
Getting Started with Palo Alto Networks
In this course brought to you by Palo Alto Networks, you will learn how to ...
Certificate of Completion Offered
Cloud Architecture Foundations
In this Cloud Architecture training, students learn the basics of cloud computing across three platforms ...
8 CEU/CPE Hours Available
Certificate of Completion Offered