Computer Science Homework Help
Cyber Security Question
Task Description –
Review the links below and other Internet sources on the Anthem and Premera data breaches. Also research ways in which identity credentials are used by attackers (for example, how they are “monetized” on the Dark Web, even if not directly used for identity theft, or used for advanced persistent threat attacks). Write a case study analysis that looks at countermeasures (measures that should be implemented to prevent future similar occurrences) and the impact to both individuals and to the organizations affected. Consider long-term and short-term impact. Make sure you cover the types of access control, and how password theory has evolved.
- Kelly Jackson Higgins (12 February 2015), “How Anthem Shared Key Markers of Its Cyberattack,” Information Week. http://www.darkreading.com/analytics/threat-intelligence/how-anthem-shared-key-markers-of-its-cyberattack/d/d-id/1319083?
- Jeremy Kirk (18 March 2015), “Secure Analysts Last Year Saw a Fake Domain Spoofing Premera’s Name,” Computerworld. http://www.computerworld.com/article/2898419/data-breach/premera-anthem-data-breaches-linked-by-similar-hacking-tactics.html
- Brian Krebs (9 February 2015), “Anthem Breach May Have Started in April 2014,” KrebsonSecurity. http://krebsonsecurity.com/2015/02/anthem-breach-may-have-started-in-april-2014/#more-29825
- Steve Ragan (9 February 2015), “Anthem: How Does a Breach Like This Happen?” CSO. http://www.csoonline.com/article/2881532/business-continuity/anthem-how-does-a-breach-like-this-happen.html?page=2