Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

choose a real world IT security breach, and perform a case study. Within this st

ID: 3834720 • Letter: C

Question

choose a real world IT security breach, and perform a case study. Within this study, analyze the method the attackers used to gain access, and the actions the attackers took once the network was penetrated. You should also identify the correct security procedures that should have been in place to prevent this breach. The choice of incident is completely up to you, but please keep in mind that it should reflect an actual breach and require research on your part. Please keep in mind that in many situations, details of the attack may not have been revealed due to our culture of corporate secrecy and/or pending litigation, so please choose a case wisely.

Explanation / Answer

I analyzed case study of security breach that occured at e-bay commerce. This data breach targeted the credentials pf the workers who are working in the e-commerce site. By means of Phishing the attcakers targeted to obtain sensitive information of the workers. They got successfull in this process snd sccording to
the officially anounced statstics displayed that an undisclosed slice of the +120 million users have been compromised for credentials and personal information.

e-Bay themselves acknowledged that one of their own has succumbed to a behavioral engineering trick known as Phishing, where the attacker would ask the
password from someone who knows it, either pretending to be the original site or another, completely irrelevant, site but relying on the fact that most of us use
the same password everywhere.

In this scenario, e-bay neglected two crucial security principals:
1. It did not provided its workers with two way authentication to log in
2. E-bay did not aware its employess towards pishing type of activities, this is the reason employees shared common password.

If these two principals had been followed security breach cannot had be happened.