Abstract
This chapter reviews three well-known attacks and identifies some of the referenced controls that could have been implemented to prevent or reduce the impact of these attacks. The case studies describe the incidents based on reports, interviews, or official investigations. Each attack differs in its nature, and the suggested controls were based on the reviewed information for each case, not meaning that other controls could have been applied.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
Mulligan, J. (2014, February 4). Written Testimony of John Mulligan. Target.Com. https://corporate.target.com/_media/TargetCorp/global/PDF/Target-SJC-020414.pdf
- 3.
- 4.
- 5.
- 6.
US Senate Committee on Commerce, Science, and Transportation. “A “Kill Chain” Analysis of the 2013 Target Data Breach.” www.commerce.senate.gov/services/files/24d3c229-4f2f-405d-b8db-a3a67f183883. March 2014.
- 7.
- 8.
Ibid. 6, page 3.
- 9.
- 10.
- 11.
US Senate - Committee on Commerce, Science, and Transportation. (2014, March). A “Kill Chain” Analysis of the 2013 Target Data Breach. US Senate. www.commerce.senate.gov/services/files/24d3c229-4f2f-405d-b8db-a3a67f183883
- 12.
- 13.
- 14.
- 15.
Ibid.
- 16.
- 17.
- 18.
- 19.
- 20.
- 21.
Wikimedia Commons. “File: Level3 Outage Map (US) - 21 October 2016.png. https://commons.wikimedia.org/w/index.php?title=File:Level3_Outage_Map_(US)_-_21_October_2016.png&oldid=565260119. May 27, 2021.
- 22.
- 23.
- 24.
- 25.
Security professionals should set an appropriate value for RRL, as it may increase the likelihood of a DNS cache poisoning attack to a legitimate requestor.
- 26.
- 27.
- 28.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Viegas, V., Kuyucu, O. (2022). Case Studies. In: IT Security Controls. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-7799-7_8
Download citation
DOI: https://doi.org/10.1007/978-1-4842-7799-7_8
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-7798-0
Online ISBN: 978-1-4842-7799-7
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)