health
December 3, 2020
The case of Jim Peterson
December 3, 2020
Show all

info sec

from the yahoo article discuss the following:
from http://www.nytimes.com/2016/09/23/technology/yahoo-hackers.html?_r=0

What breach did you select?
What is the background of the attack?
Was the breach detected right away?
How much time (approximately) went by before the breach was discovered and reported?
Did the victim organization determine the extent of the breach? If so, explain.
What was the response? (Think about the various types of response and comment Political/Diplomatic/Legal, Technical, Corporate).

Finally, when considering response and recovery, it can be important to understand how to address security flaws. Cryptography is important but can be difficult to implement. There are also ways to bypass authentication. Select two flaws from the article below and discuss how to avoid them. Do you have any recommendations regarding the attack you selected?

Leave a Reply

Your email address will not be published. Required fields are marked *