This paper concentrates on the primary theme of Case study on Home Depot Security breach in which you have to explain and evaluate its intricate aspects in detail. In addition to this, this paper has been reviewed and purchased by most of the students hence; it has been rated 4.8 points on the scale of 5 points. Besides, the price of this paper starts from £ 40. For more details and full access to the paper, please refer to the site.
Case study on Home Depot Security breach, attached file, please include:
1. Identification and explanation of the vulnerability(s) exploited.
2. Identification and explanation of the attack vector(s) used.
3. Identification and explanation of the security property(s) compromised.
4. Identification and explanation of the incurred impact.
5. Proposed countermeasure.
Home Depot Security Breach
Identification and explanation of the vulnerability(s) exploited
Home depots as Shelly (para 5) notes has been blamed by most computer security officer for failing to set proper mechanisms in a bid to isolate those sensitive components of their networks which possess the customers information’s and which may be accessible by the outsiders. Interestingly, the company executives believe that much of their fault can be blamed on the fact that the company focused on being in line with the standards focused on security detection rather than focusing setting mechanism to exploit the retailers. The vulnerability has however been noted to have occurred since the was not proactive to vault their customer data in the different compartments of their system.
Identification and explanation of the attack vector(s) used
The hackers would use the credentials from the outside vendors logging on to the systems and by passing any of the barriers set on the third party vendor system heading for the computers network. This they would do by exploiting the vulnerabilities that exist on the Microsoft windows operating system. In each of these instances, the hackers would clear themselves as if they were the company’s executives gaining access to all the points of the systems they wanted to have access to. One of the areas they ventured further……………….