Credentials vulnerability is the primary example that comes to mind

docx

School

University of Maryland, University College *

*We aren’t endorsed by this school

Course

660

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by nalalover1992

Report
Credentials vulnerability is the primary example that comes to mind. No matter how secure a system is, if the credentials used to access the system fall into the wrong hands, a lot of damage can happen. The case that comes to mind is Target data breach. Back in early 2014, it was revealed that Target has had a breach. Hackers exploited a vulnerability in one of their third-party vendor’s systems and obtained credentials that were then used to access the payment and personal information of Target’s customers numbering in the 100 million (Wallace, 2014). The vendor’ credentials allowed for more access than it should have, and it was only after the breach that Target was made aware of it. An IT security risk survey conducted in 2017 by Kaspersky found out that incidents affecting suppliers whose data was shared with accounted for 43% of the answers when asked where businesses feel vulnerable at (Kaspersky, 2017). The same survey revealed that inappropriate IT used by employees made up 44% of vulnerability felt by businesses and they are right to be (Kaspersky, 2017). The majority of breaches have a human factor behind it. It is the most common. There are countless examples out there of this happening every day. A Scam of Twitter users that thanks to a successful Spear phishing campaign on Twitter employees, Dallas Police department data leaks because of an employee negligence, Marriott Data breach because of a compromised third-party vendor (Ekran System, 2023). These are just a handful of cases to illustrate. References Ekran System. (2023, March 22). Top 5 Real-Life Examples of Breaches Caused by Insider Threats . Ekransystem.com. https://www.ekransystem.com/en/blog/real-life-examples- insider-threat-caused-breaches
Kaspersky. (2017). The Human Factor in IT Security: How Employees are Making Businesses Vulnerable from Within | Kaspersky official blog . Kaspersky. https://www.kaspersky.com/blog/the-human-factor-in-it- security/ Wallace, G. (2014, February 6). Target breach highlights possible major vulnerability . CNNMoney. https://money.cnn.com/2014/02/06/technology/security/target- breach-hvac/index.html
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help