Preview

Security Breach

Good Essays
Open Document
Open Document
856 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Breach
CASE WRITE-UP
Case: Adobe Data Breach

1. About the Case
On October 3, 2013, The Adobe Systems Incorporated in the United States of America discovered that there was a cyber-attack on their network during its regular monitoring of security check. The hackers made it through breaking in to the network and stole the sensitive and personal data of the customers which includes encrypted credit and debit card information, illegal access of customer ID 's and also source code of other various Adobe products like Adobe Acrobat and ColdFusion, ColdFusion Builder. On the companies saying that the hackers got access to the encrypted customers passwords and debit and credit card numbers too. There is also a huge loss of data occurred during this data breach which impacted immense number of people internally and externally.[1][2][3]

2. Financial Loss
According to Adobe initially it was said that over 2.9 million customers personal data has been breached during the cyber-attack by the hackers and is also believed to be that there is some data deletion done relating to the 2.9 million customers who were affected by this breach. The cyber-thieves stole the customer sensitive and personal data which also includes encrypted credit card information of many customers. After a few days the company confirmed that over 38 million active users have been affected and the attackers got access to their IDs and encrypted passwords and also to many Adobe accounts which are inactive. A 3.8 GB data was stolen from the Adobe by the attackers which includes of 152 million usernames. As a part of compromise the company is resetting the passwords for all the customers who are suspected of being attacked by the hackers, by sending them an alerting email notification which consists of the process of changing the passwords for the accounts. The company is also offering a one year complimentary subscription to a credit-monitoring program for the US customers whose debit/credit card details



References: [1] ^ BBC News technology http://www.bbc.co.uk/news/business-24392819 [2] ^ Digital Photography Review http://www.dpreview.com/news/2013/10/03/adobe-accounts-hacked-data-exposed-for-2-9-million-customers?ref=related-news [3] ^ Adobe Blogs http://blogs.adobe.com/security/2013/10/illegal-access-to-adobe-source-code.html [4]^Computerworld.com http://www.computerworld.com/s/article/9243010/Adobe_hack_shows_subscription_software_vendors_lucrative_targets?pageNumber=1 [5] ^ Tripwire.com The state of Security http://www.tripwire.com/state-of-security/vulnerability-management/adobe-data-breach-compromised-234379-military-government-accounts/ [6] ^ Adobe.com http://helpx.adobe.com/x-productkb/policy-pricing/customer-alert.html/ [7] ^ Adobe.com http://helpx.adobe.com/x-productkb/policy-pricing/customer-alert.html/ [8] ^ ZDNet http://www.zdnet.com/adobe-investigated-by-data-watchdog-over-massive-security-breach-7000024973/ [9] ^ kroll cyber security http://www.krollcybersecurity.com/resources/data-security-resources/data-breach-prevention-tips.aspx

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    Fourth, in the aftermath of the attack, the risks and threats that the company is exposed are further security breaches that could expose critical and private secret trading information of the company. This could lead to financial loses since hackers can…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The theft of the records was caused by installing malware on the orgaznization's point of sales systems. These systems were used via third party vendors and had various security issues. This was the reason the hackers were able to break into their systems. The file that contained all the records started taking rounds in the market and was being sold in black. These records were then used to steal money from customer's accounts. There were several fake cards made and identity theft took place. The details were stolen from Faziio Mechanical. The malware was then sent to all the employees in an email. There was a possibility that Citadel malware, a program that steals passwords, was involved.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Week 5 Checkpoint

    • 272 Words
    • 2 Pages

    The banks have been affected the most by the stolen data more so than the retailers, the credit card companies or TJX, and may have to pay up to $300 million to recover stolen credit cards in addition to covering fraudulent purchases. TJX is being sued for not protecting their customers’ information and estimates losses at $1 billion over 5 years. The customers have lost trust in TJX and those polled said they would never again shop at the effected retail stores.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    The ChoicePoint data breach occurred in 2005. This insider data breach brought to light how a company can still be vulnerable to having data stolen from its databases even without any type of hacking of their system. By not properly vetting request for new accounts and request for information led to the theft of over a hundred thousand records of people’s personal information.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Checkpoint: Tjx Companies

    • 326 Words
    • 2 Pages

    The cost associated with data breaches can be enormous and infinite. A data breach can have severe repercussions including reputational costs to organization and brand. A data breach can also cause the loss of confidence and apprehension in consumer. This in turn will cause less people to shop with TJX companies which can create a loss in revenue. The consumer can also have charges and unauthorized use of their credit information. Banks and issuers of credit and debit cards were forced to replace the stolen cards and refund any money that was stolen due to fraudulent credit or debit charges.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It is almost impossible to find the top reasons why most security breaches happen on a secure network compromising hundreds to thousands of users’ personal information. This happens today more often than one would like to think and the consequences are astronomical for users, employees and customers of the companies. To protect a network and thoroughly secure confidential information, one has to examine the top vulnerabilities and think outside of the normal box to protect the network. When a security breach happens, there is usually a pretty simple reason why it has happened. This paper will discuss one of the highly publicized security breaches to happen in years, the Sony PlayStation Network & Qriocity music and video service that occurred early this year. There will be a discussion on the actual breach that occurred, what caused the breach and how this could have been prevented, and finally, how Sony plans to recover from this monumental loss of confidential data it caused its customers.…

    • 1165 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Choicepoint Attack

    • 401 Words
    • 2 Pages

    The data theft identified by the various organizations is not uniform. Some of the steps that can be implement by organizations such as:…

    • 401 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Role of Federal Agencies

    • 802 Words
    • 4 Pages

    The recent security breach by unauthorized intruders into the parent company of NASDAQ is an example of the kind of breaches directed against important financial infrastructure and illustrates the difficulty of determining clear attribution. As we would in response to any such breach, the FBI is working to identify the scope of the intrusion and assist the victim in the remediation process.…

    • 802 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    While the effects of one of these attacks is realized at a much higher price point for larger businesses, smaller companies are actually targeted more often because of their lack of security infrastructures and data monitoring systems. In fact, Horton claims that more than 90% of data breaches affect small businesses. (Horton, 2014) These startling numbers leave many small business owners wondering what they can do to reduce the risk associated with cyber-attacks.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    After a thorough investigation by federal law enforcement it had been determined that hackers were able to infiltrate the network and place malware on several pieces of the companies Point of Sale (POS) systems. The attackers were meticulous and thought through their attack, attempting to…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Hacks of this nature do not just have an affect on the targets. Customers also bear some of the burden. Not all of the impacts will be clearly defined or immediately obvious. While credit card companies may reimburse a customer for their stolen money, they do not have the ability to pay for the time the customer spends trying to get their money back, the confidence lost in the security practices of corporations, and most importantly, the emotional impact of dealing with the…

    • 724 Words
    • 3 Pages
    Good Essays