Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Running head: BREACH

Breach

Student’s Name

Institutional Affiliation
BREACH
2

Network Security Breach

The worst case scenario of a cyber attack that took place recently happened on the Fortune 500

tech company, Tech Data Corporation, where there was a data breach. The company specializes

in IT services and products which as survived a breach on its security. As a result of the data

breach, billing and customer data were potentially compromised (Charlie Osborne, 2019). The

company was able to recover the exposed computer after the breach was recognized. The issue

here is that, Tech Data did not support password protection but also did not encrypt the data

stored in its system. Thus, any person could have access to these files of internal work functions.

The video URL for this information is retrieved from https://www.youtube.com/watch?

v=RhU8MXGbfYA&feature=youtu.be

The best case scenario of cyber attack was that of Citrix data breach. This is because, Citrix

published the first of several vulnerabilities in its Application Performance Controller as well as

Gateway products detected by security analysts in December. This is an issues that also the

security personnel assume is already being corrupted in the natural environment and that could

enable the attacker execute random code executions as well as gain entry to computer systems

and applications of the its target (Patrick Flesch, 2019).

The video URL for this information is retrieved from https://www.youtube.com/watch?

v=LCv02q4ygI4&feature=youtu.be

The worst case scenario of Tech Data could learn from the best case scenario of Citrix by

ensuring that, Tech Data should ensure that there is limited access to the company’s network by

having strong passwords. Also, Tech Data should ensure that it configures protection monitoring
BREACH
3

across external authentication end devices in order to search for password spray threats and other

vulnerabilities.
BREACH
4

References

Charlie Osborne. (2019). These are the worst hacks, cyberattacks, and data breaches of 2019.

Retrieved from https://www.zdnet.com/google-amp/article/these-are-the-worst-hacks-

cyberattacks-and-data-breaches-of-2019/

Patrick Flesch. (2019). 5 Biggest Cyberattacks of 2019 and Lessons Learned. Retrieved from

https://www.gflesch.com/elevity-it-blog/biggest-cyberattacks-2019

You might also like