Credentials vulnerability is the primary example that comes to mind
docx
keyboard_arrow_up
School
University of Maryland, University College *
*We aren’t endorsed by this school
Course
660
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
2
Uploaded by nalalover1992
Credentials vulnerability is the primary example that comes to
mind. No matter how secure a system is, if the credentials
used to access the system fall into the wrong hands, a lot of
damage can happen. The case that comes to mind is Target
data breach. Back in early 2014, it was revealed that Target
has had a breach. Hackers exploited a vulnerability in one of
their third-party vendor’s systems and obtained credentials
that were then used to access the payment and personal
information of Target’s customers numbering in the 100
million (Wallace, 2014). The vendor’ credentials allowed for
more access than it should have, and it was only after the
breach that Target was made aware of it. An IT security risk
survey conducted in 2017 by Kaspersky found out that
incidents affecting suppliers whose data was shared with
accounted for 43% of the answers when asked where
businesses feel vulnerable at (Kaspersky, 2017).
The same survey revealed that inappropriate IT used by
employees made up 44% of vulnerability felt by businesses
and they are right to be (Kaspersky, 2017). The majority of
breaches have a human factor behind it. It is the most
common. There are countless examples out there of this
happening every day. A Scam of Twitter users that thanks to a
successful Spear phishing campaign on Twitter employees,
Dallas Police department data leaks because of an employee
negligence, Marriott Data breach because of a compromised
third-party vendor (Ekran System, 2023). These are just a
handful of cases to illustrate.
References
Ekran System. (2023, March 22).
Top 5 Real-Life Examples of
Breaches Caused by Insider Threats
. Ekransystem.com.
https://www.ekransystem.com/en/blog/real-life-examples-
insider-threat-caused-breaches
Kaspersky. (2017).
The Human Factor in IT Security: How
Employees are Making Businesses Vulnerable from Within |
Kaspersky official blog
. Kaspersky.
https://www.kaspersky.com/blog/the-human-factor-in-it-
security/
Wallace, G. (2014, February 6).
Target breach highlights
possible major vulnerability
. CNNMoney.
https://money.cnn.com/2014/02/06/technology/security/target-
breach-hvac/index.html
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help