[Get Solution] Emerging Trends
My initial discussion should be at least 2 paragraphs. I will post 2 peers discussions at the bottom. A response to my peers should be at least 1 paragraph. Very simple In this discussion, you will demonstrate the knowledge and skills you feel inform you as an IT professional. You will first conduct research in finding an article or story that you feel illustrates security breaches of data. In your initial post, share an article or story that you feel illustrates security breaches of data. Identify what connections you see between the breach and aspects of the labs and project you engaged in during this module. In responding to your peers, identify what current or emerging technologies or trends may exacerbate or mitigate security breaches like the one your peer has identified and explain why. ///// peer: Virgil In September 2017, Equifaxs database was breached and exposed personal information of over 147 million people. Names, DOB, SSNs and credit card numbers are just a few examples of what was stolen from these individuals. Even the CEO was a victim of this attack. The company failed to patch a known vulnerability within the server, which allowed the attackers to create a web shell over the server and continuously gather information on users for over two months and ultimately gain access to an encrypted file. This file gave the intruders access to consumer credit report data. There were over 9,000 queries on the databases and 265 separate occasions when information was downloaded. The deadline to file a claim in this settlement was January 22, 2020, this settlement includes up to $425 million to help the affected individuals. After this date, a claim can still be filed if someone incurs any unusual expenses starting from the deadline to file until January 22, 2024. The connection I see in this article/situation to the labs throughout this course is patching. The company knew about a vulnerability, on an older machine, and chose not to patch it. Also, monitoring your network. Equifax could not see the attackers because the machine used to monitor their network was not compliant nor active due to expired certifications. Paying attention to your network and recognizing anomalies is important in intrusion detection/prevention. Adhering to recommended patches distributed by vendors is essential in hardening your network. References Whittaker, Z. (2018, December 10). Equifax breach was entirely preventable had it used basic security measures, says House report. Retrieved from https://techcrunch.com/2018/12/10/equifax-breach-preventable-house-oversight-report/ peer: Robert Hello class, One of the more well known breaches was the Target breach in 2013. Originally, a phishing email led to malware being installed through a vendor that worked with Target. Rights were then elevated and the malware worked through systems until a program was installed on Target’s POS credit card machines. The labs where we were able to use exploits definitely showed how easy it is to get malware on a system once you find a vulnerability. Hence us learning how to do vulnerability testing and closing those vulnerabilities! https://krebsonsecurity.com/2013/12/sources-target-investigating-data-breach/