Order for this Paper or Similar Assignment Writing Help

Click to fill the order details form in a few minute.

Posted: August 15th, 2022

Organizational Hacking

Organizational Hacking
In this day and age, data breaches have increased in quantity and intensity. Therefore, it is essential that the security professional assess situations which could threaten the security of an organization’s intellectual property. Students will then gain the knowledge, tools, and resources to recognize and mitigate real time attacks.

Research a data breach, ransomware, or data exfiltration attack that has occurred within the last 6 months that successfully compromised an organization.

In 500-750 words, address the following:

1. Describe in detail how the attacker made the breach. Specifically, how was the attacker able to get in and out of the system? What was the threat vector?

2. Explain what the attacker did during the breach.

3. Describe the effects of the attack on the various stakeholders. Be sure to include non-technical elements of the entire corporation (e.g., public relations, marketing, and/or sales).

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Organizational Hacking
Data breaches have significantly increased in the quantity and intensity thus negatively affecting organizations and businesses and there is a need to counter such a situation. Data breaches compromise the operations of organizations to the point of such organization recording failure. Therefore, security professionals need to arm themselves resources, tools and knowledge to counter data breach attacks to ensure that organizations can handle their operations and activities without being compromised. Adidas an athletic apparel firm is one organization that experienced data breach from third parties thus compromising the business and such attacks need to be prevented in the present and future.
2. Describe in detail how the attacker made the breach. Specifically, how was the attacker able to get in and out of the system? What was the threat vector?
Hackers adopt different techniques and process in getting access to a website and getting out. The hackers at the Adidas website used a combination of technique to get access to the system. In this case, the hackers used session management, broken authentication and social engineering attacks (Bohnsack and Liesner, 2019). The hackers in begin by establishing a password as the first step of cracking network security of an organization or a website. The hackers exploit the administrators or website users to enable them to gather vital information that enables them to exploit the website to gain the necessary credentials to illegally access the websites and the computer systems (Sandhya et al., 2017). The hacker being a third party gets an identity that enables them to access the access of a website in different capacities such as being a user, administrator and other related parties. This enables them to exploit the website such as gaining confidential files and information at the expense of legitimate users. This approach was used by hackers that gained access to the Adidas website and exploit it at the expense of the organization and the users.
2. Explain what the attacker did during the breach.
According to a press release from the Adidas, the hackers were in a position to gain access to critical and confidential data relating to some of their customers. The attack exposed the customers that used the addidas.com to access the services and make purchases from the apparel retailer (Sundar, 2015). Addidas noted that on June 26 noted the illegal access of some of the data of their customers and this attacked millions of the customers. The hackers were able to retrieve information on the customers’ encrypted password, contact information and their usernames. Additionally, Addidas was quick to note that the information on the customer’s credit card and their fitness was not accessed by the hackers. More so, the attack made Addidas lose four million dollars as the average cost of the data hack for e-commerce.
3. Describe the effects of the attack on the various stakeholders.
The data breach attack had adverse effects on a wide range of parties affecting their operations and wellbeing. In this regard, the customers were highly affected as their confidential information was accessed thus subjecting them to mental stress and torture (Gupta and Nene, 2016). The customers were in fear that their credit information could have been retrieved thus compromising their finances. Consequently, Addidas was affected as customers were in fear of transacting with them in fear of their confidential information being compromised thus making Adidas record low profit and revenue levels (Lee and Lee, 2015). Additionally, public relations and marketing departments faced a hard time in convincing customers to purchase their products.

References
Bohnsack, R., & Liesner, M. M. (2019). What the hack? A growth hacking taxonomy and practical applications for firms. Business Horizons.
Gupta, P., & Nene, M. J. (2016). CyberPsycho attacks: techniques, causes, effects and recommendations to end-users. International Journal of Computer Applications, 156(11).
Lee, M., & Lee, J. (2012). The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet. Information Systems Frontiers, 14(2), 375-393.
Sandhya, S., Purkayastha, S., Joshua, E., & Deep, A. (2017, January). Assessment of website security by penetration testing using Wireshark. In 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS) (pp. 1-4). IEEE.
Sundar, R. (2015). Parameters Considered by Consumers Shopping and Issues at Adidas Online Store: A Case Study.

Check Price Discount

Study Notes & Homework Samples: »

Why Choose our Custom Writing Services

We prioritize delivering top quality work sought by students.

Top Tutors

The team is composed solely of exceptionally skilled graduate writers, each possessing specialized knowledge in specific subject areas and extensive expertise in academic writing.

Discounted Pricing

Our writing services uphold the utmost quality standards while remaining budget-friendly for students. Our pricing is not only equitable but also competitive in comparison to other writing services available.

0% similarity Index

Guaranteed Plagiarism-Free Content: We assure you that every product you receive is entirely free from plagiarism. Prior to delivery, we meticulously scan each final draft to ensure its originality and authenticity for our valued customers.

How it works

When you decide to place an order with Dissertation Help, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We analyze your order and match it with a custom writer who has the unique qualifications for that subject, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00