In this video, Emmanuel Henri discusses a case study surrounding data breaches and losses.
- [Narrator] There are many examples of recent data breach…such as Equifax, eBay, Facebook and Home Depot.…But Yahoo was the victim of a huge data breach.…In 2013, hackers obtained real names, email addresses,…date of birth, and telephone numbers of three billion users.…Yahoo reported they had been using bcrypt…for hatching their passwords, a popular encryption library.…And this was all happening while Verizon…was considering purchasing the company.…So when I say that most companies are over confident…about their security measures, I'm not kidding.…
In most cases, companies that are effected…by data breaches revisit their security measures…and protocols after the fact.…It might have been prevented if the security measures…were always revisited, tested and improved.…A simple penetration test might have uncovered…there are open doors in the system to access this data…and improve the measures used to protect it.…All companies need to have a plan in place…to constantly validate what access exists around their data.…
Author
Released
12/5/2018- What types of systems are at risk?
- What are the most common security threats?
- Data breaches and losses
- Denial-of-service attacks
- Internet of Things (IoT) risks
- Unsecured applications
Skill Level Intermediate
Duration
Views
Related Courses
-
Implementing an Information Security Program
with Kip Boyle2h 33m Intermediate -
Learning the OWASP Top 10
with Caroline Wong43m 57s Beginner
-
Introduction
-
Selling cybersecurity1m 11s
-
-
1. Overview of Systems and Threats
-
Resources for educating you2m 58s
-
Fictional vs. reality1m 27s
-
Top security threats1m 52s
-
2. Data Breaches and Losses
-
Why do data breaches matter?1m 31s
-
Case study: Data breach1m 40s
-
3. Denial of Service
-
4. Internet of Things
-
Overview of IoT risks1m 36s
-
Why does it matter?1m 42s
-
How to sell IoT risks1m 42s
-
-
5. Unsecured Applications
-
Why does it matter?1m 29s
-
Conclusion
-
Next steps1m
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Case study: Data breach