Question: This is a high level extract of case study from an article. Please read the case study and answer the questions below: The revelation that
This is a high level extract of case study from an article. Please read the case study and answer the questions below:
The revelation that Home Depot's breach resulted from the compromise of a thirdparty vendor is "eerily" similar to the circumstances of the Target data breach. The two megabreaches point to the need for retailers to more closely monitor the security measures of their vendors and ramp up breach detection efforts.
The Home Depot attack vector is due to "This is fundamentally due to cybercriminals doing their homework on organizations and waging a fierce, persistent campaign to find any possible way to get a foothold in the organization" says JD Sherry, vice president of technology and solutions for Trend Micro.
Home Depot said that criminals used a thirdparty vendor's username and password to enter the perimeter of its network From there, hackers acquired "elevated rights" that allowed them to navigate portions of Home Depot's network and to deploy custombuilt malware on the retailer's selfcheckout systems in the US and Canada, the company says.
According to Home Depot, the malware used in the attack has not been seen in any prior attacks and was designed to evade detection by antivirus software.
The home improvement retailer did not reveal the nature of its thirdparty vendor whose credentials were used in the breach.
In the Target breach, in which million payment cards and personal details on million customers were compromised, the retailer acknowledged that the incident was the result of hackers stealing electronic credentials from one of its vendors. From there, attackers used "sophisticated malware" to evade detection and obtain the card details and other sensitive information.
Following a Script? Home Depot asset has a value of $ and has one vulnerability, which has a likelihood of with current control that addresses of its risk Your assumptionsdata are accurate.
The Home Depot breaches demonstrate just how vulnerable retailers are to attacks waged by compromising the credentials of third parties, says Rebecca Herold, a partner at the consulting firm Compliance Helper.
One reason for that vulnerability, Herold says, is that so many retailers fail to conduct due diligence investigations of the security practices of their vendor partners, relying solely on security clauses in contracts.
The breached Home Depot vendor's apparent reliance on username and password for authentication was clearly inadequate, says Tsion Gonen, chief strategy officer at SafeNet, a data protection firm. "This massive breach reinforces why more companies need to implement multifactor authentication, not only for their own employees, but for third parties that access their data systems," he says.
Organizations that outsource any type of information processing, access or storage must perform due diligence to ensure the contracted entities to whom they are entrusting this access have appropriate safeguards in place," Herold says.
In announcing the apparent cause of its breach last week, Home Depot also revealed that some million customer email addresses were stolen in the attack, in addition to the compromise of million payment cards.
Question to Answer
What are the steps Home Depot can take to help customer whose data have been breach to prevent phishing attack marks
List fundamental strategies who depot can adopt moving forward to prevent breach. marks
Based on this case study, culculate the extend risk. marks
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
