Autodesk Software Hack of 2020

Submit a written report on main findings about AutoDesk Software hack of 2020. Must write from perspective of hack/breach.(definitions provided below)

The first page of the report should provide some general coverage of the incident, while the reminder of the report should give very specific answers about the following:

Don't use plagiarized sources. Get Your Custom Essay on
Autodesk Software Hack of 2020
Get an essay WRITTEN FOR YOU FOR YOU, Plagiarism free, and by an EXPERT!
Order Essay

1) Was this incident a hack or a breach? Justify your answer!

2) Who are the main ‘stakeholders’ in this incident (who is the adversary & who is the victim)? Note: In cases when there are multiple adversaries and/or victims, they all have to be clearly enlisted.

3) When did the incident happen? When was it discovered?

4) Which vulnerability in the target system was exploited by the adversary during the incident?

5) How, exactly, did the adversary exploit the vulnerability? What was the main attack vector? Note: For an exhaustive list of attack vectors see: https://www.upguard.com/blog/attack-vector

6) What did this breach/hack target in terms of CIA?

7) What has been the actual loss suffered by the victim due to the incident (monetary, functional, reputational, … )? Note: In most cases the victim suffers a combination of different types of loss, and they all should be enlisted. Also, if there are multiple victims, the losses of each particular victim should be specified.

8) How did/can the victim ensure that the same type of breach/hack does not happen again?

9) Was the adversary prosecuted, and if so what were the penalties (if known)?

10) What can other similar potential victims learn from this incident?

 

Three initial references for this project include:

https://www.infosecurity-magazine.com/news/mercenary-apt-group-targeting/

https://threatpost.com/hackers-exploit-autodesk-flaw-in-recent-cyberespionage-attack/158669/

https://www.bitdefender.com/files/News/CaseStudies/study/365/Bitdefender-PR-Whitepaper-APTHackers-creat4740-en-EN-GenericUse.pdf

 

IMPORTANT:

The list of all researched references should be included in the report. The minimum acceptable number of references is 10!

 

Definitions to use:

Data Breach-

exposing of sensitive, confidential and/or protected data to someone who should not have access to that data

* could be deliberate or unintentional !

* common type of leaked information: 1. financial data (e.g., credit card numbers) 2. medical or personal health information 3. personally identifiable information (PII) 4. intellectual property

most common causes / actors:

* an accidental insider e.g., an employee using a co-worker’s computer & reading files without having proper authorization, NO information is leaked outside the company e.g., an employee fooled into disclosing data to a malicious actor – information leaked outside …

* a malicious insider e.g., an employee purposely accesses and/or shares data with the intent of causing harm to an individual or company – may have legitimate authorization

* a malicious outsider e.g., a hacker uses various attack vectors to gather information from a network or an individual

common costs / damages:

* direct, short term 1. operational disruption 2. cyber-security investigations 3. attorney fees 4. government fines 5. drop in stock price, …

* indirect, long term 1. damage to brand and reputation 2. loss of intellectual property 3. increased insurance premium, …

 

Hack-

identification & exploitation of weaknesses in a computer system or a network in order to achieve a nefarious objective

* an intentional attack typically conducted by a malicious outsider

* could, but does not have to, result in a data breach / leak (e.g., ransomware, DDoS)

* weaknesses commonly exploited in a hack:

1. weak or compromised credentials

2. careless / untrained employees (social engineering)

3. missing or poor encryption

4. misconfiguration

5. vulnerabilities

6. third- or fourth- party vendors,

 

**There could be overlap between Hack and Data Breach

 

The report will be evaluated for the following: 1) Clarity of communication (Does the provided information render a clear understanding of the incident? Are the report’s organization and grammar satisfactory?) 2) Completeness (Is all relevant information included in the report?) 3) Correctness (Is the information provided in the report actually correct?)

Emergency Homework
Order NOW For A 10% Discount!
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.

Admissions

Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.

Reviews

Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.

Reviews

Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.