Azumer Water

in Other (Other) by vomms
Favorite Add it to your favorites and revisit later
  • Azumer Water
Instant Download
Previewing 1 of 1 total pages.
Trouble downloading?
Copyright complaint
Instant download
Money-back guarantee
Regular Price: $2.14
Your Price: $1.50 (30% discount)
You Save: $0.64

Description

The success of the attack on Azumer Water shows many instances of improper mitigating controls, user accountability and awareness, as well as not following policy and regulations that could have prevented the deletion of 1,073 volunteer profiles from the database.  The attack started from a simple click of a link that was part of a phishing email scam brought on by the attackers.  John Smith, volunteer coordinator, did not pay attention in reading the phishing email and clicked on the link.  This set the course of events in which many volunteers fell on the attack and led to the attackers gaining entry into the companys database and deleting the entire thing.  
Azumer Waters IT infrastructure does not have a Demilitarized Zone (DMZ) separate from their internal infrastructure. ...

Comments (0)

You must sign in to make a comment.
vomms
@dgoodz
220710
4060
Rating:
Published On:
01/05/2020
Last Updated:
01/05/2020
Print Length:
1 page(s)
Word Count:
260
File Name:
c843-casestudydocx-46.docx
File Size:
15.67 KB (0.02 MB)
Sold By:
vomms
Purchased:
0 times
Best Seller Ranking:
#

Other items from vomms

Customers also bought

Customers also viewed