SlideShare a Scribd company logo
1 of 1
In this day and age, data breaches have increased in quantity
and intensity. Therefore, it is essential that the security
professional assess situations which could threaten the security
of an organization's intellectual property. gain the knowledge,
tools, and resources to recognize and mitigate real time attacks.
Research a data breach, ransomware, or data exfiltration attack
that has occurred within the last 6 months that successfully
compromised an organization. In 500-750 words, address the
following:
Describe in detail how the attacker made the breach.
Specifically, how was the attacker able to get in and out of the
system? What was the threat vector?
Explain what the attacker did during the breach.
Describe the effects of the attack on the various stakeholders.
Be sure to include non-technical elements of the entire
corporation (e.g., public relations, marketing, and/or sales).

More Related Content

Similar to In this day and age, data breaches have increased in quantity and in

Journal+Feature-InsiderThreat
Journal+Feature-InsiderThreatJournal+Feature-InsiderThreat
Journal+Feature-InsiderThreat
Anthony Buenger
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
Ward Pyles
 

Similar to In this day and age, data breaches have increased in quantity and in (20)

Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House CounselAdam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability Management
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
A Review On Adapting Social Engineering Services—Aardwolf Security
A Review On Adapting Social Engineering Services—Aardwolf SecurityA Review On Adapting Social Engineering Services—Aardwolf Security
A Review On Adapting Social Engineering Services—Aardwolf Security
 
[Grom] Enabling the Protection, Detection, and Response to Cyber-Threats
[Grom] Enabling the Protection, Detection, and Response to Cyber-Threats[Grom] Enabling the Protection, Detection, and Response to Cyber-Threats
[Grom] Enabling the Protection, Detection, and Response to Cyber-Threats
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
 
Journal+Feature-InsiderThreat
Journal+Feature-InsiderThreatJournal+Feature-InsiderThreat
Journal+Feature-InsiderThreat
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection Recommendations
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 

More from latriced9tl

Write a learning outcome paper.In short this means what you expect.docx
Write a learning outcome paper.In short this means what you expect.docxWrite a learning outcome paper.In short this means what you expect.docx
Write a learning outcome paper.In short this means what you expect.docx
latriced9tl
 
Write a Dialogue.Goal Write a dialogue with the co-worker you.docx
Write a Dialogue.Goal Write a dialogue with the co-worker you.docxWrite a Dialogue.Goal Write a dialogue with the co-worker you.docx
Write a Dialogue.Goal Write a dialogue with the co-worker you.docx
latriced9tl
 
Write a 750-word (minimum) essay APA FormatFrom this two texts S.docx
Write a 750-word (minimum) essay APA FormatFrom this two texts S.docxWrite a 750-word (minimum) essay APA FormatFrom this two texts S.docx
Write a 750-word (minimum) essay APA FormatFrom this two texts S.docx
latriced9tl
 

More from latriced9tl (20)

Write a Java program (non-GUI preferred) to demonstrate the use of.docx
Write a Java program (non-GUI preferred) to demonstrate the use of.docxWrite a Java program (non-GUI preferred) to demonstrate the use of.docx
Write a Java program (non-GUI preferred) to demonstrate the use of.docx
 
Write a learning outcome paper.In short this means what you expect.docx
Write a learning outcome paper.In short this means what you expect.docxWrite a learning outcome paper.In short this means what you expect.docx
Write a learning outcome paper.In short this means what you expect.docx
 
Write a four page, double spaced, a paper analyzing the dual (double.docx
Write a four page, double spaced, a paper analyzing the dual (double.docxWrite a four page, double spaced, a paper analyzing the dual (double.docx
Write a four page, double spaced, a paper analyzing the dual (double.docx
 
Write a LEX program that does the following1. Reads a C++ pro.docx
Write a LEX program that does the following1. Reads a C++ pro.docxWrite a LEX program that does the following1. Reads a C++ pro.docx
Write a LEX program that does the following1. Reads a C++ pro.docx
 
Write a Dialogue.Goal Write a dialogue with the co-worker you.docx
Write a Dialogue.Goal Write a dialogue with the co-worker you.docxWrite a Dialogue.Goal Write a dialogue with the co-worker you.docx
Write a Dialogue.Goal Write a dialogue with the co-worker you.docx
 
write a 750-word paper using APA standards that includes discussion .docx
write a 750-word paper using APA standards that includes discussion .docxwrite a 750-word paper using APA standards that includes discussion .docx
write a 750-word paper using APA standards that includes discussion .docx
 
Write a 750-word (minimum) essay APA FormatFrom this two texts S.docx
Write a 750-word (minimum) essay APA FormatFrom this two texts S.docxWrite a 750-word (minimum) essay APA FormatFrom this two texts S.docx
Write a 750-word (minimum) essay APA FormatFrom this two texts S.docx
 
Write a 700- to 1050-word executive summary in which you compare d.docx
Write a 700- to 1050-word executive summary in which you compare d.docxWrite a 700- to 1050-word executive summary in which you compare d.docx
Write a 700- to 1050-word executive summary in which you compare d.docx
 
Write a 700- to 1,050-word paper that includes the followingA s.docx
Write a 700- to 1,050-word paper that includes the followingA s.docxWrite a 700- to 1,050-word paper that includes the followingA s.docx
Write a 700- to 1,050-word paper that includes the followingA s.docx
 
Write a 700- to 1,050-word paper that addresses the following topi.docx
Write a 700- to 1,050-word paper that addresses the following topi.docxWrite a 700- to 1,050-word paper that addresses the following topi.docx
Write a 700- to 1,050-word paper that addresses the following topi.docx
 
Write a 750- to 1,050-word paper on ways in which an organization ca.docx
Write a 750- to 1,050-word paper on ways in which an organization ca.docxWrite a 750- to 1,050-word paper on ways in which an organization ca.docx
Write a 750- to 1,050-word paper on ways in which an organization ca.docx
 
Write a 700- to 1,050-word paper that describes how the historical.docx
Write a 700- to 1,050-word paper that describes how the historical.docxWrite a 700- to 1,050-word paper that describes how the historical.docx
Write a 700- to 1,050-word paper that describes how the historical.docx
 
Write a 700- to 1,050-word paper which includes the following.docx
Write a 700- to 1,050-word paper which includes the following.docxWrite a 700- to 1,050-word paper which includes the following.docx
Write a 700- to 1,050-word paper which includes the following.docx
 
Write a 700- to 1,050-word research essay describing how the politic.docx
Write a 700- to 1,050-word research essay describing how the politic.docxWrite a 700- to 1,050-word research essay describing how the politic.docx
Write a 700- to 1,050-word research essay describing how the politic.docx
 
Write a 700- to 1,050-word paper summarizing the steps of photosyn.docx
Write a 700- to 1,050-word paper summarizing the steps of photosyn.docxWrite a 700- to 1,050-word paper summarizing the steps of photosyn.docx
Write a 700- to 1,050-word paper summarizing the steps of photosyn.docx
 
Write a 700- to 1,050-word paper describing the fictional business.docx
Write a 700- to 1,050-word paper describing the fictional business.docxWrite a 700- to 1,050-word paper describing the fictional business.docx
Write a 700- to 1,050-word paper describing the fictional business.docx
 
Write a 500-750 word essay on one of the following topics.Write a .docx
Write a 500-750 word essay on one of the following topics.Write a .docxWrite a 500-750 word essay on one of the following topics.Write a .docx
Write a 500-750 word essay on one of the following topics.Write a .docx
 
Write a 700- to 1,050-word paper on what the textbook author refer.docx
Write a 700- to 1,050-word paper on what the textbook author refer.docxWrite a 700- to 1,050-word paper on what the textbook author refer.docx
Write a 700- to 1,050-word paper on what the textbook author refer.docx
 
Write a 700- to 1,050-word paper describing how information systems .docx
Write a 700- to 1,050-word paper describing how information systems .docxWrite a 700- to 1,050-word paper describing how information systems .docx
Write a 700- to 1,050-word paper describing how information systems .docx
 
Write a 700- to 1,050-word paper describing how information syst.docx
Write a 700- to 1,050-word paper describing how information syst.docxWrite a 700- to 1,050-word paper describing how information syst.docx
Write a 700- to 1,050-word paper describing how information syst.docx
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 

In this day and age, data breaches have increased in quantity and in

  • 1. In this day and age, data breaches have increased in quantity and intensity. Therefore, it is essential that the security professional assess situations which could threaten the security of an organization's intellectual property. gain the knowledge, tools, and resources to recognize and mitigate real time attacks. Research a data breach, ransomware, or data exfiltration attack that has occurred within the last 6 months that successfully compromised an organization. In 500-750 words, address the following: Describe in detail how the attacker made the breach. Specifically, how was the attacker able to get in and out of the system? What was the threat vector? Explain what the attacker did during the breach. Describe the effects of the attack on the various stakeholders. Be sure to include non-technical elements of the entire corporation (e.g., public relations, marketing, and/or sales).