Task Description -Review the links below and other Internet sources on the Anthe

Task Description -Review the links below and other Internet sources on the Anthem and Premera data breaches. Also research ways in which identity credentials are used by attackers (for example, how they are “monetized” on the Dark Web, even if not directly used for identity theft, or used for advanced persistent threat attacks). Write a case study analysis that looks at countermeasures (measures that should be implemented to prevent future similar occurrences) and the impact to both individuals and to the organizations affected. Consider long-term and short-term impact. Make sure you cover the types of access control, and how password theory has evolved.Kelly Jackson Higgins (12 February 2015), “How Anthem Shared Key Markers of Its Cyberattack,” Information Week. http://www.darkreading.com/analytics/threat-intelligence/how-anthem-shared-key-markers-of-its-cyberattack/d/d-id/1319083?
Jeremy Kirk (18 March 2015), “Secure Analysts Last Year Saw a Fake Domain Spoofing Premera’s Name,” Computerworld. http://www.computerworld.com/article/2898419/data-breach/premera-anthem-data-breaches-linked-by-similar-hacking-tactics.html
Brian Krebs (9 February 2015), “Anthem Breach May Have Started in April 2014,” KrebsonSecurity. http://krebsonsecurity.com/2015/02/anthem-breach-may-have-started-in-april-2014/#more-29825
Steve Ragan (9 February 2015), “Anthem: How Does a Breach Like This Happen?” CSO. http://www.csoonline.com/article/2881532/business-continuity/anthem-how-does-a-breach-like-this-happen.html?page=2
Deliverable – Your Research Paper should be written following APA guidelines, using 12-point font, and including a title, abstract, and reference page. The content of your paper should be at least 5 pages in length, excluding the title and reference pages.
Requirements: 5 pages

Leave a comment

Your email address will not be published. Required fields are marked *