Professional Documents
Culture Documents
Running Head: BREACH 1: Breach Student's Name Institutional Affiliation
Running Head: BREACH 1: Breach Student's Name Institutional Affiliation
Breach
Student’s Name
Institutional Affiliation
BREACH
2
The worst case scenario of a cyber attack that took place recently happened on the Fortune 500
tech company, Tech Data Corporation, where there was a data breach. The company specializes
in IT services and products which as survived a breach on its security. As a result of the data
breach, billing and customer data were potentially compromised (Charlie Osborne, 2019). The
company was able to recover the exposed computer after the breach was recognized. The issue
here is that, Tech Data did not support password protection but also did not encrypt the data
stored in its system. Thus, any person could have access to these files of internal work functions.
v=RhU8MXGbfYA&feature=youtu.be
The best case scenario of cyber attack was that of Citrix data breach. This is because, Citrix
published the first of several vulnerabilities in its Application Performance Controller as well as
Gateway products detected by security analysts in December. This is an issues that also the
security personnel assume is already being corrupted in the natural environment and that could
enable the attacker execute random code executions as well as gain entry to computer systems
v=LCv02q4ygI4&feature=youtu.be
The worst case scenario of Tech Data could learn from the best case scenario of Citrix by
ensuring that, Tech Data should ensure that there is limited access to the company’s network by
having strong passwords. Also, Tech Data should ensure that it configures protection monitoring
BREACH
3
across external authentication end devices in order to search for password spray threats and other
vulnerabilities.
BREACH
4
References
Charlie Osborne. (2019). These are the worst hacks, cyberattacks, and data breaches of 2019.
cyberattacks-and-data-breaches-of-2019/
Patrick Flesch. (2019). 5 Biggest Cyberattacks of 2019 and Lessons Learned. Retrieved from
https://www.gflesch.com/elevity-it-blog/biggest-cyberattacks-2019