Analyze A Cybersecurity Scenario And Identify Which Tenets Were Violated

Overview: This case study will help you . Each skill in this paper is an essential part ofthe final project and the accompanying milestones in this course.Prompt: Use the information provided in the scenario to analyze the cybersecurity occurrence and determine which tenet(s) were violated.The required resources for this module detail a scenario at RSA that is similar to the one you will analyze for this assignment. Review each module resource andanalyze the security breach that occurred with RSA. Note similarities between this example and the provided scenario for this assignment.Scenario: In late May of 2011, Lockheed-Martin was targeted by a cyberattack. Lockheed-Martin claimed that they discovered the attack early and reactedquickly, with the result that no real harm was done.The basis for this breach was with two-factor authentication, where a “factor” in authentication can be something you know, something your are, or somethingyou have. A two-factor authentication system requires you to present instances of two of these three to authenticate with a system. Lockheed-Martin employeda two-factor authentication system that combined a password (something you know) with SecurID, a system produced by RSA labs that provides the “somethingyou have” factor.A SecurID is a small key fob that displays a number, which changes every 60 seconds. Each key fob has a unique number called its seed, which determines whatnumber is shown in the fob at any given point in time. The server stores your username, password hash, and the seed value for your key fob, and this allows it todetermine what number is showing on your key fob (as the fob is synched with your account). When you authenticate, you enter your username and regularpassword, then you look at the key fob and enter in the number shown there. The authentication server knows what number should be shown at that time onthe key fob, and so can verify that the key fob is indeed a thing you have. This is called a one-time password (OTP) system.In March of 2011, someone attacked RSA with a relatively unsophisticated phishing attack with an attached Excel file with embedded code that exploited a zerodayvulnerability in Adobe Flash.This enabled attackers to set up a “backdoor”—a way for them to get into the computer—where the attackers were able to steal from RSA the seed values ofSecurID key fobs.In late May of 2011, the attack moved to Lockheed-Martin, where attackers managed to get a keylogger onto a company system. The keylogger recorded theusername, password, and SecurID OTPs used by the victim when he or she authenticated, along with the date and time of the log in.Two-factor authentication is designed for just this kind of scenario. The attacker cannot authenticate because knowing the username, password, and an old OTPis not enough; the current OTP is required. However, these attackers stole seed values. For a given seed value and date/time, they could calculate the numberthe key fob with that seed value would display at that date and time. All the attackers had to do was to write a program that would compute, for every stolenseed value, the number that would have been showing at the date and time the keylogger recorded the victim’s login. Once they found a match with the OTPthe keylogger recorded, they would have matched a seed value with a username. This appeared as if the attackers actually had the key fobs themselves.Critical ElementsYour paper should include these critical elements: Identification of cybersecurity tenets that were violated and rationale of cause Analysis of cybersecurity occurrence and data defense Recommendation of best practices to prevent further recurrenceRubricGuidelines for Submission: Your paper should be submitted as a 2- to 3-page Microsoft Word document with double spacing, 12-point Times New Roman font,and one-inch margins. All sources must be cited in APA format if used.

Elite Writer Help
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.


Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.


Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.


Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.


Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.