Discussion Report 2

docx

School

Kaplan University *

*We aren’t endorsed by this school

Course

3020

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

4

Uploaded by wambnziok

Report
1 Discussion Topic Report 2 INFS6830 Your Name November 27, 2023
2 Identification of Vulnerabilities Verdana is a cloud-based video surveillance company that was hacked in March 2021. Administrator account credentials found on the internet were used to gain access to the Verdana surveillance cameras. The attackers gained access to private data from the Verdana clients. Over 150000 clients were affected by this breach ranging from hospitals, prisons, schools, and other major clients of Verdana (Gartenberg, 2021). The vulnerabilities in this case applied to both the consumers and the company. A second IoT attack happened in Ring Home – Security Camera Breach happened in 202 when hackers again successfully hacked into the doorbells and monitoring systems of family homes. The hackers used trackers that are found in the Ring home system to access user login credentials. As a result, the family’s privacy was invaded, others received racial slurs and some consumers even got death threats from the hackers (Paul, 2020). The vulnerabilities in this case were again applicable to both the consumers and the company. Identification of Mitigation Strategies The applicable mitigation strategy in the case of the Verdana attack is employee and user education whereby individuals are taught not to share their credentials online. Another mitigation strategy is using strong passwords and two-factor authentication to minimize the chances of being hacked (Gartenberg, 2021). These mitigation strategies apply to both the consumer and the organization. In the Ring Home case, strong user passwords and multifactor authentication are some of the mitigation strategies that apply to both the consumers and the organization. Regular updates by the consumer can also be key to preventing this type of attack. Another mitigation strategy
3 that is only applicable to the company is the elimination of trackers which are a vulnerability to the system (Paul, 2020). Reflection The vulnerabilities such as sharing user credentials and trackers are also a threat to secure programming. These vulnerabilities cause data to fall into the wrong hands and this increases the chances of attacks. Mitigation strategies such as regular security updates, strong passwords, multifactor authentication, and avoiding sharing credentials on public forums are also some of the most appropriate security measures which can ensure secure programming.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 References Gartenberg, C. (2021). Retrieved from https://www.theverge.com/2021/3/9/22322122/verkada- hack-150000-security-cameras-tesla-factory-cloudflare-jails-hospitals Paul, K. (2020). Retrieved from https://www.theguardian.com/technology/2020/dec/23/amazon- ring-camera-hack-lawsuit-threats