Discussion Report 2
docx
keyboard_arrow_up
School
Kaplan University *
*We aren’t endorsed by this school
Course
3020
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
4
Uploaded by wambnziok
1
Discussion Topic Report 2
INFS6830
Your Name
November 27, 2023
2
Identification of Vulnerabilities
Verdana is a cloud-based video surveillance company that was hacked in March 2021.
Administrator account credentials found on the internet were used to gain access to the Verdana
surveillance cameras. The attackers gained access to private data from the Verdana clients. Over
150000 clients were affected by this breach ranging from hospitals, prisons, schools, and other
major clients of Verdana (Gartenberg, 2021). The vulnerabilities in this case applied to both the
consumers and the company.
A second IoT attack happened in Ring Home – Security Camera Breach happened in 202
when hackers again successfully hacked into the doorbells and monitoring systems of family
homes. The hackers used trackers that are found in the Ring home system to access user login
credentials. As a result, the family’s privacy was invaded, others received racial slurs and some
consumers even got death threats from the hackers (Paul, 2020). The vulnerabilities in this case
were again applicable to both the consumers and the company.
Identification of Mitigation Strategies
The applicable mitigation strategy in the case of the Verdana attack is employee and user
education whereby individuals are taught not to share their credentials online. Another mitigation
strategy is using strong passwords and two-factor authentication to minimize the chances of
being hacked (Gartenberg, 2021). These mitigation strategies apply to both the consumer and the
organization.
In the Ring Home case, strong user passwords and multifactor authentication are some of
the mitigation strategies that apply to both the consumers and the organization. Regular updates
by the consumer can also be key to preventing this type of attack. Another mitigation strategy
3
that is only applicable to the company is the elimination of trackers which are a vulnerability to
the system (Paul, 2020).
Reflection
The vulnerabilities such as sharing user credentials and trackers are also a threat to secure
programming. These vulnerabilities cause data to fall into the wrong hands and this increases the
chances of attacks. Mitigation strategies such as regular security updates, strong passwords,
multifactor authentication, and avoiding sharing credentials on public forums are also some of
the most appropriate security measures which can ensure secure programming.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
References
Gartenberg, C. (2021). Retrieved from https://www.theverge.com/2021/3/9/22322122/verkada-
hack-150000-security-cameras-tesla-factory-cloudflare-jails-hospitals
Paul, K. (2020). Retrieved from https://www.theguardian.com/technology/2020/dec/23/amazon-
ring-camera-hack-lawsuit-threats