Gaining unauthorized access to a computer or a system is called hacking. Hackers usually try to gain access in to steal sensitive information for personal use or to be used as ransom. This is unethical and in many cases unlawful. Recently the rise of hackers has caused great concern in the cyber security space, with the rise in digitization especially during COVID there has been a rise in cyber security breaches as well. One such well known breach that caused great havoc in and around the southern region of United States of America is the Colonial Pipeline breach (Bambauer, 2020)
In April of 2021, hackers gained access to the colonial pipeline systems by means of an old password to an account that was not in use but was still accessible. It was accessed in the same way that employees would access the colonial pipeline network, remotely. The password was obtained from the dark web from a list of stolen passwords; this may have been a password that the user used in multiple places. Additionally, the colonial pipeline network did not have multi factor authentication. Hackers then went to demand a ransom in cryptocurrency, which prompted immediate reaction from the cybersecurity team of the colonial pipeline to shut down all of its operations.
This caused the transport of 2.5 million barrels of gasoline per day to come to a halt for few days, causing huge losses for the company as well as causing public inconvenience. Colonial pipeline also paid around $4.4 million in France and to the hackers who had stolen 100 gigabytes of sensitive data from them. The hackers are known to be linked with a Russian group called the dark side; this has warranted action from the U S government to stop perpetrators from accessing key operational computer networks in the US so as to safeguard the country (Mehrotra, Turton, 2021).
Reference
Mehrotra, K., Turton, W. (2021). Hackers Breached Colonial Pipeline Using Compromised Password.Bloomber News. https://www.bloomberg.com/news/articles/2021-06-04/hackers-breached-colonial-pipeline-using-compromised-password
Bambauer, D E.(2020). Information Hacking. Utah Law Review, no. 4 (August): 987–1007. http://search.ebscohost.com/login.aspx?direct=true&AuthType=sso&db=a9h&AN=144574920.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more