Running Head: CYBER-ATTACK CASE STUDY
1
Cyber Attack
Daryl Snipes Jr
ISSC 361 Information Assurance
March 10, 2019
2
CYBER-ATTACK CASE STUDY
Introduction
CYBER-ATTACK CASE STUDY
3
Cyber-attack involves any attack to expose or gain illegal approach to or make unlawful
use of an aid. It is a type of abusive manner which marks computers info systems, computers
grids or intimate computer appliances. The person involved in the attack attempts to access data
without the authorization, potentially with malicious intent. When the attacker hacks the
sensitive system, he or she has an aim to destroy or steal a specified target. The process of cyber
attacking ranges from inaugurating spyware on an intimate computer to attempting to dismantle
the framework of whole nations.
The ace who is legally involved is always probing to cap the use of the term of episodes inducing
substantial bruise and establishing it from the more conventional data breached and expansive
hacking enterprises. They are also cyber warful who uses their techniques to defend and attack
info and computer structures that populate computer network. The process goes through the dull
cyber drive and a related array of disks. The cyber-attack is contributed by factors such as the
spectacular factor which measures the actual damage achieved by an attack. Whenever there is
an attack, it creates many losses and gathers negative publicity. Another factor is the
vulnerability factor which involves exploiting the vulnerable companies or any state
establishment, (Dasgupta, D., & Wu, Q., 2014, June).
The state can be obliterated on a web page, and a company can be liable to a rebuttal of
service incursion. The cyber-attack reduces the integrity and the credibility of data which
happens through nasty code which emends program sanity and curbs the data thus causing errors
in the output. Every year, the cybercrimes have increased as people have tried to benefit from
vulnerable business systems. The cyber-attacks are always launched through ulterior motives as
other loose to annihilate schemes and data as a mode of hacktivism. There are several types of
cyber-attacks such as the malware which is described as viruses or ransomware, (Arlitsch, K., &
Edelman, A., 2014). The attack ruptures a network through amenability whenever the user bangs
a critical link which later installs risky software.
The malware software does the following when it gets into the system:
1. It blocks access to critical components of the network.
2. It adds more adverse software.
3. It surreptitiously gets info by convey data from the hard drive.
Another type of cyber-attacks is the phishing which comprises the sending of deceitful
communications which appear to come from an important source. The phishing attack steals
sensitive data such as the login information. Another cyber-attack is zero-day exploit which
involves hitting after a network vulnerability is announced. The attackers target the described
weakness during the window time.
There was a cyber-attack which happened to the Adobe Company. The Adobe announced
that they had a massive hacking of its IT infrastructures. The software engineers of the company
confirmed that the usernames and encrypted passwords were stolen for about 50 million users.
The attackers also pervaded details from an undefined number of accounts that had been unused
for more than two years. More so, some source code was stolen for the Photoshop which is their
picture editing program.
CYBER-ATTACK CASE STUDY
4
The antecedent code for its Acrobat PDF document filing software and cold fusion web
application items has been immensely accessed. The attackers stole the program so that they can
analyses how Adobe software works and copy its technique. The attack made the Adobe
Company to shift its devices to an acceptance model whereby their consumers required to roster
an account and give their fee card minutiae to entitle for upgrades. However, the adobe
spokesperson guarded the matter that it is antecedent affidavit did not affirm the full scale of the
incident. The company validates the information they could be able to communicate. The
management admitted that the encrypted acclaim and debit cards numbers, item cessation dates
had been an arbiter in the case of the authentic 2.9 million users diagnosed.
The passwords were afterward rejected as a caution across the encryption being hacked.
But resetting the passwords would not help to protect their customers from that of having their
accounts on other benefits being hacked whenever they use similar usernames and passwords.
The Adobe commodities are equipped on many end users’ computers and used on many joint
and state attendants around the globe companies’ fear.
The leak on encryption data and any other insurance designs and the software
amenability can be used to bypass safeguard for individuals and amalgamated data. The
encryption can create a chance for a new bearing of viruses and escapades. Adobe Company
value the trust of their consumers and thus they work oppressively to counter any other type of
attack from happening in the future. Adobe regretted the in concinnities which were caused by
the cyber-attack. The cyber-attack made adobe to face criticism of how they secure their data.
All the identical customers’ passwords arose exactly when encrypted which made it simple for
the hackers to detect devices and guess passwords accurately. The company contacted the banks
to work on the fee card organizations and card-issuing banks to help customers account. The
company offered the customers whose debit card information was affected to enroll in one-year
appreciatively credit auditing enrollment where convenient.
There is a global shortage of cybersecurity skill which makes many organizations more
desirable targets for hacking. Since many companies have realized their current IS strategy is not
sufficient, there will be high demand for expertise. Companies have been in surging their
security requirements, internal training and skills growth has to continue to expedite. The AIpowered attacks of the next generation will be astute enough to mimic the behaviors of specific
users to fool unskilled security personnel. The capacity to art intricate and bespoke phishing
campaigns will strongly fool the most menace cognizant among us, (Hathaway, & Nix, H.,
2012).
The cyber attackers will continue becoming more organized and more commercialized
whereby they might even have their call centers. The cyber attackers will look for the base such
as a country where cybercrime is barely regarded as a crime; thus they place themselves away
from their victim’s police arbitrations. To maintain participation in the digital society, there
should be trust as essential for growth.
Companies should build systems which are reliable and secure which will make them
earn trust. The company should provide credible and comprehensive information so that they
help people to fathom and assess how confident they are. The research and contraption generate
advances which help cybersecurity keep up with the evolving cyber risks. The advances create a
trusted and buoyant digital environment. Research organizations should be developed to help
5
CYBER-ATTACK CASE STUDY
support the process in cyber security and also the research should be perused such that it blends
acumens from different disciplines and around the world.
References
Hathaway, O. A., Crootof, R., Levitz, P., & Nix, H. (2012). The law of cyber-attack. Calif. L.
Rev., 100, 817.
Simmons, C., Ellis, C., Shiva, S., Dasgupta, D., & Wu, Q. (2014, June). AVOIDIT: A cyberattack taxonomy. In 9th Annual Symposium on Information Assurance (ASIA’14) (pp. 212).
Arlitsch, K., & Edelman, A. (2014). Staying safe: Cyber security for people and
organizations. Journal of Library Administration, 54(1), 46-56.
Purchase answer to see full
attachment