Академический Документы
Профессиональный Документы
Культура Документы
Module 4 Assignment
Savannah Mills
University of Alabama
CS 391-908
MODULE 4 ASSIGNMENT
MODULE 4 ASSIGNMENT
documents and emails (Krebs, 2015). This information was not released, yet it still could be in
the future.
The Impact Team claimed in the manifesto that the cyber attack occurred in response to
Avid Life Media, the parent company of Ashley Madison, Established Men, and Cougar Life,
selling customers in 2014 a Full Delete feature. This feature would remove site usage history
and personally identifiable information from the site, for 19 dollars. The Impact Group claimed
that this income generator was a sham since users purchase details, real names, and addresses
were not removed post-transaction. The manifesto also included pointed language against the
male gender as well as powerful and rich clients, causing one to wonder if the attack was revenge
(Krebs, 2015). I personally believe the perpetrator was an insider seeking personal revenge or
acting based on skewed moral beliefs.
Avid Life Media admitted immediately that there was a breach in security and a thorough
investigation was being held. The investigation began with speculation of former Ashley
Madison employees or contractors, while a fleet of IT professionals worked quickly to patch the
system. Avid Life Media closed the cyber attacks access points and secured the websites. The
CEO, Biderman, released in a statement to the media and Ashley Madison clients stating that the
perpetrator was not an employee of Avid Life Media but certainly had touched our technical
services (Krebs, 2015). Some of the leaked documents revealed that Avid Life Media was aware
of the risks of a data breach and had invested in the latest privacy and security technologies.
Regardless, it was still not enough to keep the attack from occurring.
Ashley Madison tailored this website to encourage married people to commit adultery
with other married people. Therefore, exposure of the names of 37 million users meant that a lot
MODULE 4 ASSIGNMENT
of families were destroyed. While extra-marital affairs are never right and the homes of those
engaging in them are already damaged, this hack destroyed the reputation of many exposed
users. Their dirty laundry was aired to the public in the most embarrassing way. Children were
mortified by their parents/parents unfaithfulness on a public platform; spouses were caught off
guard and crushed by the weight of being cheated on and every one of their colleagues, friends,
and family knowing about it.
Case Study #2
Different from the Ashley Madison cyber attack yet equally devastating, Target was the
victim of a massive cyber attack where 40 million credit card numbers and 70 million other
customer records, including names, addresses, email addresses, and credit card expiration dates
were taken. The hack occurred between November 27, 2013 and December 15, 2013, a direct
result of stolen third-party vendor credentials. Fazio Mechanical, a refrigeration contractor,
opened a phishing email, which installed the Trojan, Citadel on his computer. This gave the
hackers access to Targets network, and they installed Trojan.POSRAM malware on Targets
Security and Payment Systems, specifically the Point-of-Sale. (Kassner, 2015). The credit/debit
card information swiped when purchasing items was then stolen from an estimated 110 million
customers of Targets 1,797 stores (Top Trending, 2015).
This attack could have been prevented several ways. Target chose to ignore malware
warning signs that its security system, Fireye, provided (Harris, 2014). If Target had made
security a higher priority and had heed the warning signs, this attack may not have occurred.
Another possible prevention method is the use two-factor authentication; Target lacked two-
MODULE 4 ASSIGNMENT
factor authentication, making it simple for the hackers to access the system using the third-party
vendor (Olavsrud, 2014).
I believe this attack could be the work of a cyber criminal seeking financial gain. The
Target cyber attack cost Target and its customers greatly. Target lost 105 million dollars, and
Target customers were each allowed to claim $10,000 maximum (Hackett, 2015). This largescale cyber attack is still affecting its victims and Targets reputation.
Conclusion
Each of these case studies demonstrates the harmful effects of cyber attacks. Whether an
innocent grocery shopper or a cheating spouse, humans are susceptible to attack at all times.
Cyber attacks go beyond the business being taken advantage of: it can destroy families and
individuals relationally and financially.
MODULE 4 ASSIGNMENT
References
Ghazi-Tehrani, A. (2016). CC 201: INTRO. TO CYBER CRIME Week 5, Class 7. The
University of Alabama, Tuscaloosa, IN. Lectures and Slides. Retrieved from
https://ualearn.blackboard.com/
Hackett, R. (2015). How much do data breaches cost big companies? Shockingly little. Fortune.
Retrieved from http://fortune.com/2015/03/27/how-much-do-data-breaches-actually-costbig-companies-shockingly-little/
Harris, E. A. & Perlroth, N. (2014). Target Missed Signs of a Data Breach. The New York Times.
Retrieved from http://www.nytimes.com/2014/03/14/business/target-missed-signs-of-adata-breach.html
Kassner, M. (2015). Anatomy of the Target data breach: Missed opportunities and lessons
learned. ZDNet. Retrieved from http://www.zdnet.com/article/anatomy-of-the-target-databreach-missed-opportunities-and-lessons-learned/
Krebs, B. (2015). Online Cheating Site AshleyMadison Hacked. KrebsOnSecurity: In-depth
security news and investigation. Retrieved from
http://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/
Olavsrud, T. (2014). 11 Steps Attackers Took to Crack Target. CIO from IDG. Retrieved from
http://www.cio.com/article/2600345/security0/11-steps-attackers-took-to-cracktarget.html?page=2
MODULE 4 ASSIGNMENT
Top Trending. (2015). 10 Biggest Computer Hacks Of All Time. Retrieved from
https://www.youtube.com/watch?v=oOoMqgnvZaY
Quick, M., Hollowood, E., Miles, C., & Hampson, D. (2016). World's Biggest Data Breaches.
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
which pulls date from this Google Doc:
https://docs.google.com/spreadsheets/d/1sJW1mbc-44xCNwRRGns5UuqhUSB8iZ8o2TrgQu4kJQ/edit?single=true&gid=2&range=A1:W400#gid=1640918774