1q) Search “scholar.google.com” for a company, school, or person that has been the target of a network
or system intrusion? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion.
Indicate at least one source or reference .
2Q) Provide a Reply of below Post by 200 words.
In 2015, Primera Blue Cross was a target of a network or system intrusion. Yes, the attack was successful, and the company did not even notice the breach for 9 months. The attackers gained unauthorized access to the company computers and stole approximately 11 million customers information even though it was encrypted such as their names, social security numbers, date of birth, phone numbers, email addresses, bank account details, mailing addresses, and clinical information (Granville, 2015). After this attack, to ensure that the vulnerability was controlled the company provided giving various services for free to the customers who were affected by this attack such as identity theft protecting and credit controlling (Jones, 2016).
According to Bhatti et al, 2015 the chief compliance officer focused on the overall security chain of the company by tracking access and logging the information of the employees who accessed the records of the customer’s personal health but still this attack occurred. Later after the attack, to remove the infected software from their system Primera Blue Cross hired the FireEye cybersecurity firm.
Potential damage will occur when the network credentials are stolen in order to prevent this it is important that the Primera Blue Cross deploys active and context-aware access management mechanism. By doing this the company would have the rights to remove the access to the servers or applications to which the attacker gets connected (Toulouse et al, 2015).