Five Network Security Breaches

1555 Words4 Pages

Five Network Security Breaches
Network breaches are an ever-present and growing threat to network security. There are many ways that such breaches can occur, and the following material will analyze five case studies. The issues to be addressed will include, what went wrong, how could it have been prevented, and what measures could be instituted to prevent a reoccurrence.
Naoki Hiroshima’s Twitter Handle
Naoki Hiroshima was the owner of a rare Twitter handle of just one letter, @N. The handle is rare enough that he had been offered as much as fifty thousand dollars for it (Naoki Hiroshima, 2014). His account was often the target of theft via password reset attempts, so he thought nothing of it when on January 20th 2014, he got a text from PayPal with an account change validation code, but later that day when he checked his email, Naoki saw an email with a confirmation from GoDaddy stating that his account settings were successfully changed. When he called GoDaddy, he discovered that he no longer owned his registered domain, and they would not speak to him about it because he could not verify ownership information – it had already been changed.
Naoki’s email was linked to his domain, so the hacker had control of his email and websites. Naoki quickly changed the email for his Twitter account, which prevented its theft, but his websites were used by the hacker as a bargaining tool to trade for the @N username. After the hacker got the Twitter account, which was the actual target, he detailed how he had social engineered a PayPal phone operator to give him the last four digits of the account card number. The hacker then called GoDaddy, and told them that he lost his card, but he remembered the last four digits of it. The representat...

... middle of paper ...

...rity Law Resource Center. (2014). Target Reports Direct Financial Impact From Customer Payment Card Breach. Retrieved January 30, 2014 from http://www.bna.com/target-reports-direct-n17179881326/
Rashid, F. (2011). Anonymous Claims Network Breach of FBI Security Contractor ManTech. Retrieved February 1, 2014 from http://www.eweek.com/c/a/Security/Anonymous-Claims-Network-Breach-of-FBI-Security-Contractor-ManTech-693504/
Rouse, M. (2005). SCADA (supervisory control and data acquisition). Retrieved January 29, 2014 from http://whatis.techtarget.com/definition/SCADA-supervisory-control-and-data-acquisition
WatchGuard Technologies. (2014). Learning From the Target Data Breach: How Businesses and Consumers Can Protect Against Today's Top Security Threats. Retrieved January 30, 2014 from http://ca.finance.yahoo.com/news/learning-target-data-breach-businesses-183000420.html

More about Five Network Security Breaches

Open Document