CIS 502 MENTOR Great Stories/cis502mentor.com CIS 502 MENTOR Great Stories/cis502mentor.com | Page 33

Authentication breach by impersonation or password crack has been popular for attackers to breach our assets. The latest RSA APT attack to breach one of the most secure RSA tokens alerted the industry and reminded all of us that there is no security that can last forever. We must remain vigilant and stay ahead of the game. Read the following documents:  “APT Summit Findings” located in the onli ne course shell  “RSA Security Brief” located in the online course shell 
Write a five to eight (5-8) page paper in which you: 1. Analyze the Advanced Persistent Threats (APT) Summit Findings article as well as the RSA Security Brief article and identify the vulnerabilities that existed in the system. 2. Analyze the attack methods carried out in pursuit of the authentication breach and explain which methods were successful and why.