Abstract
Along with the rising demand for companies to facilitate business functions more efficiently, information technology has increasingly become a vehicle to bring about the convenience and efficiency that companies require to promote effective business operations. With such reliance upon information technology solutions comes the potential for companies to become more vulnerable to possible security incidents with their increased reliance upon third-party vendors for software solutions. This paper seeks to explore the software company SolarWinds and analyze its 2020 security breach. This paper will discuss how the SolarWinds breach occurred, how IT Security Professionals perceived it, and the vulnerabilities within the SolarWinds system before the breach. It will also analyze and evaluate the lessons learned from the SolarWinds breach and explore security measures implemented after the attack
Highlights
Overview of SolarWinds company and breach infiltrated the SolarWinds network monitoring software and SolarWinds is a company focused on developing used that foothold to monitor the affected organizations
In even obtained access to Department of Homeland Security the year 2020, the company was the subject of a data breach email accounts. (Associated Press, 2021) The attack was which led to one of the most sophisticated and broad-reaching especially nefarious given that the SolarWinds software was attacks in cybersecurity history
MITRE has assigned the vulnerabilities associated the California Department of State Hospitals and Kent State with the SolarWinds hack the CVE-IDs of CVE-2020-10148, University (Jibilian & Canales, 2021)
Summary
Overview of SolarWinds company and breach infiltrated the SolarWinds network monitoring software and SolarWinds is a company focused on developing used that foothold to monitor the affected organizations. Software for businesses to help them manage their networks, (Center for Internet Security, 2021). Hackers broke into their systems, and Information Technology infrastructure. The system and added malicious code into the company’s software company’s products include network management, systems system, Orion ( Jibilian & Canales, 2021). It allowed hackers to creates network monitoring and logs analysis tools to detect spy on organizations( Jibilian & Canales, 2021). Homeland Security and the Treasury Department (Jibilian & et al, 2021) It can lay dormant and hidden while it is inactive, Canales, 2021)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Business and Applied Social Science
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.