Friday, May 22, 2020

Essay about The Impact of the RSS Breach on Critical...

RSA is a division of EMC Corporation that offers security products to businesses and government agencies. RSA’s flagship product is SecurID, a combination of two-factor authentication tokens (hardware and software) and the associated server software used in their implementation. This product aims to deliver secure remote access, including access to critical infrastructure. In 2009, it was estimated RSA had â€Å"about 40 million tokens and 250 million mobile software versions deployed in over 25,000 organizations†, including banks, government, manufacturing, and pharmaceutical companies (Rashid, 2011). In this paper we will examine the 2011 breach of RSA involving the SecurID product, the incident response and recovery, mitigation strategies,†¦show more content†¦Through a coordinated effort, RSA worked with law enforcement, the intelligence community, and other commercial entities. RSA’s actions stand in contrast to many corporations that do not acknowledge breaches of sensitive information systems for fear of alarming shareholders and exposing the corporation to lawsuits (Gross, 2011). Even when evidence points to nation-state involvement (most often China), many companies still refuse to acknowledge breaches. The â€Å"fear of offending the Chinese and jeopardizing their share of that country’s exploding markets† is reason enough to remain quiet (Gross). Despite mounting evidence, the â€Å"U.S. government, for its part, has been fecklessly circumspect in calling out the Chinese† (Gross). Incident Recovery Recovery after the breach at RSA was not limited to the RSA environment. Due to the widespread implementation of RSA tokens across industry and government agencies (and its contractors) the breach had far-reaching implications across multiple sectors. In an attempt to mitigate potential attacks on its customers’ environments related to the stolen information, RSA outlined nine steps customers could take to harden their IT infrastructures and reduce their chances of being breached (Gov InfoSecurity). While the recommended steps were followed by defense contractor Lockheed Martin, they were later breached in an attack related to the initial RSA breachShow MoreRelatedCSEC 610 Individual Assignment Essay3186 Words   |  13 PagesImportant Vulnerability, Impact Solutions †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8 References †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 12 Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure theRead MoreBusiness Information Systems31162 Words   |  125 Pagesion%20Systems.pdf Text Book: Laudon amp; Laudon, Essentials of Business Information Systems, 7th Edition, Pearson (Prentice Hall), 2007 Chapter 1 Business Information Systems in Your Career Multiple Choice Questions 1. One of the recent critical challenges facing Major League Baseball was: a. poor coordination between local and national sales channels. b. poorly managed sales channels. c. outdated information systems. d. decreasing ticket sales. Answer: d Difficulty: Medium Reference:Read Moremarketing plan Essay21150 Words   |  85 Pagesto assess 1.3: provide selected data and ask students to undertake quantitative analysis and interpret their findings 50 1.2 Analyse market trends and developments for their potential impact on business Group task: access information undertake analysis of information determine potential impact of identified trends 1.3 Use measures of central tendency or dispersion and correlations between sets of data for quantitative interpretation of comparative market data Introduce, withRead MoreManaging Information Technology (7th Edition)239873 Words   |  960 Pages The Clarion School for Boys, Inc.– Milwaukee Division: Making Information Systems Investments CASE STUDY IV-2 FastTrack IT Integration for the Sallie Mae Merger CASE STUDY IV-3 IT Infrastructure Outsourcing at Schaeffer (A): The Outsourcing Decision CASE STUDY IV-4 IT Infrastructure Outsourcing at Schaeffer (B): Managing the Contract CASE STUDY IV-5 Systems Support for a New Baxter Manufacturing Company Plant in Mexico CASE STUDY IV-6 The Challenges of Local System

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.