How did the perpetrator authenticate the system?
Length Requirements:
· 2–3 pages
· Coversheet
· List of References Page.
· Proofread – Edit for spelling, grammar, punctuation, etc.
· Use only course text, professional journal articles, or other reputable resources
Complete the following using the course text, professional journal articles, or other reputable resources. (NO Wikipedia) Research a recent attack on an organization that involved passwords.
· Name the organization, date of the attack, and loss to the company.
· Describe the attack in detail. (i.e., type of password attack – brute force, phishing, etc.)
· How did the perpetrator authenticate the system?
· Did the organization have a password policy in place?
· Recommend measures to protect against this type of attack in the future. Be specific – that is, don’t just say develop a policy. What should be in the policy?
