CIS 502 MENTOR Great Stories/cis502mentor.com CIS 502 MENTOR Great Stories/cis502mentor.com | Page 33
Authentication breach by impersonation or password crack has
been popular for attackers to breach our assets. The latest RSA
APT attack to breach one of the most secure RSA tokens alerted
the industry and reminded all of us that there is no security that
can last forever. We must remain vigilant and stay ahead of the
game. Read the following documents:
“APT Summit Findings” located in the onli ne course
shell
“RSA Security Brief” located in the online course
shell Write a five to eight (5-8) page paper in which you:
1. Analyze the Advanced Persistent Threats (APT) Summit
Findings article as well as the RSA Security Brief article and
identify the vulnerabilities that existed in the system.
2. Analyze the attack methods carried out in pursuit of the
authentication breach and explain which methods were
successful and why.