How did the perpetrator authenticate the system?

Length Requirements:

· 2–3 pages

· Coversheet

· List of References Page.

· Proofread – Edit for spelling, grammar, punctuation, etc.

· Use only course text, professional journal articles, or other reputable resources

Complete the following using the course text, professional journal articles, or other reputable resources. (NO Wikipedia) Research a recent attack on an organization that involved passwords.

· Name the organization, date of the attack, and loss to the company.

· Describe the attack in detail. (i.e., type of password attack – brute force, phishing, etc.)

· How did the perpetrator authenticate the system?

· Did the organization have a password policy in place?

· Recommend measures to protect against this type of attack in the future. Be specific – that is, don’t just say develop a policy. What should be in the policy?

× How can I help you?