0% found this document useful (0 votes)
9 views

NIS Microproject 5 by Campusify

The Adobe Cyber Attack in October 2013 resulted in the theft of account details from approximately 38 million users, including usernames, passwords, and credit card information. Initially reported as affecting 2.9 million accounts, the breach highlighted the increasing sophistication of hackers and the significant consequences for companies and consumers alike. The project aims to research and analyze the attack, its history, and its impact on Adobe and its users.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

NIS Microproject 5 by Campusify

The Adobe Cyber Attack in October 2013 resulted in the theft of account details from approximately 38 million users, including usernames, passwords, and credit card information. Initially reported as affecting 2.9 million accounts, the breach highlighted the increasing sophistication of hackers and the significant consequences for companies and consumers alike. The project aims to research and analyze the attack, its history, and its impact on Adobe and its users.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

A Project Report On

“Adobe Cyber Attack (2013)”

For more Free Study Material


Join Our Channel- https://t.me/campusifyy
PART A – PLAN
Micro Project Proposal
ADOBE CYBER ATTACK

1.0 Brief Introduction:

Adobe is a software application where users can perform graphical designs, editing of videos, and Web
development. It is a collection of applications and cloud services.
In October 2013, adobe was attacked by the attackers and around 38 million users' account details like
usernames, passwords, mobile numbers, and card details were stolen. Initially, Adobe said that 2.9
million accounts were attacked but afterwards, notified that 38 million and 3.8 GB of data were stolen.
Attackers also got access to the accounts which are inactive for many days. Attackers also stole the user's
credit card credentials that were used to create the accounts.

The breach at Adobe is one of a recent spate of hacking episodes at prominent organizations. Already
this year, hackers have infiltrated database aggregators like Lexis-Nexis and Dun & Bradstreet and the
security firm Kroll Background America, as well as the National White Collar Crime Center, which
helps businesses protect their computer systems.

2.0 Aim of the Micro Project:


To do the research and case study about ADOBE CYBER ATTACK(2013)
3.0 Action Plan:

Details of Activity Planned Name of Responsible


Sr. Planned Start Finish Team Members
No Date Date

1 Selection of topic :- All

Information collection from books


:
We collected information from
various books listed as, All

2 1. Principles of computer
Security By Greg White
2. Computer Security By
Atul Kahate
Information collection from web
resources:-
We collected information’s from
various site’s All
3
1) www.Google.com
2) en.wikipedia.org

Designing the project


4 All

5 Preparing the project All


6 Formatting the project All
7
Preparation of report All
4.0 Resources Required:

Sr. Name of
No Resource/Material Specifications Qty Remarks

1 MS Office 2010 For Window 1 Available

2 Internet Facility --- Available


Google Search Engine

3 Books and E-Books 1. Computer Security By Atul Kahate --- Available

*************
PART B – Plan
Micro Project Report
ADOBE CYBER ATTACK(2013)

1.0 Brief Introduction:


Every day, millions of people use debit and credit cards as a form of payment. Each time a card is
swiped or used on-line, the opportunity exists for hackers to breach security barriers and steal
personal and financial information. This information is then sold on the black market andused for
fraudulent activity, (unauthorized transactions).This information can include, but is not limited to,
names, phone numbers, addresses, email addresses, passwords, and credit and debit card
information. Obtaining this information often involves hacking into a system undetected,
installing malware to gather the information, and then transferring this information to a server. As
hackers become more sophisticated, major data breaches occur more frequently. What does this
mean for companies and consumers? When a breach occurs, companies lose time and money and
risk their reputation with customers, investors, insurers, and regulators. This can lead to a
reduction in the affected company’s customer base, resulting in a loss of profits.“According to
various estimates, at least 80 million insider attacks occur in the United States each year
(Upton).” A large data breach can have serious consequences for both the company and the
individual. The ways in which a company is affected by a data breach can vary.

2.0 Aim of the Micro Project:


To learn research and case study about ADOBE CYBER ATTACK(2013)

3.0 Course Outcomes Integrated:

a) Apply user identification and authentication methods.


b) Identify risk related to computer security and information hazards in various situations
c) Apply cryptographic algorithms and protocols to maintain computer security.
d) Apply measures to prevent attack on network using firewall.
e) Maintain secured networks and describe information security compliance standards.

4.0 Actual Procedure Followed:

1. Studied about The ADOBE CYBER ATTACK


2. Distributed the tasks among the group members.
3. Each group member searched for their respective topic assigned to them.
4. Searched the information and case study for ADOBE CYBER ATTACK
5. Started the documentation of the material.
6. Cleared all doubts related to project.
7. Made report and project report.
5.0 Actual Resources Required:

Sr. Name of
No Resource/Material Specifications Qty Remarks
1 MS Office 2010 For Window 1 Available
2 Internet Facility --- Available
Google Search Engine

3 Books and E-Books 1. Computer Security By Atul Kahate --- Available


6.0 Output of Micro project:

ADOBE CYBER ATTACK(2013)

Abstract:

In today’s modern world, companies store the majority of their business information on
computer systems. If not properly protected, private data such as customer financial records,
trade secrets, and company financials, can be easily compromised. Major data breaches are
becoming more frequent, as hackers are becoming more sophisticated. Cyber-attacks have a
negative impact on customers, shareholders, employees, and of course the company itself. This
paper examines several recent cyber-attacks and explores the reaction to these by the
corporations. It examines the potential and verifiable consequences of these attacks and
identifies a range of shareholders who can be injured by the attacks. It examines the adoption of
chip and PIN cards as a proposed solution to what appears to be an accelerating and almost
unstoppableattempt by criminals to steal personal and financial information.

Introduction:
Adobe Cyber Attack(2013)

In October 2013, adobe was attacked by the attackers and around 38 million users' account details
like usernames, passwords, mobile numbers, and card details were stolen. Initially, Adobe said that
2.9 million accounts were attacked but afterwards, notified that 38 million and 3.8 GB of data were
stolen. Attackers also got access to the accounts which are inactive for many days. This
information can include, but is not limited to, names, phone numbers, addresses, email addresses,
passwords, and credit and debit card information. Obtaining this information often involves
hacking into a system undetected, installing malware to gather the information, and then
transferring this information to a server. As hackers become more sophisticated, major data
breaches occur more frequently. What does this mean for companies and consumers? When a
breach occurs, companies lose time and money and risk theirreputation with customers, investors,
insurers, and regulators. This can lead to a reduction in the affected company’s customer base,
resulting in a loss of profits.“According to various estimates, at least 80 million insider attacks
occur in the United States each year (Upton).” A large data breach can have serious consequences
for both the company and the individual. The ways in which a company is affected by a data
breach can vary.

The History of Adobe Cyber Attack(2013)

In a breach first announced on this blog Oct. 3, 2013, Adobe said hackers had stolen nearly 3
million encrypted customer credit card records, as well as login data for an undetermined number
of Adobe user accounts.

At the time, a massive trove of stolen Adobe account data viewed by KrebsOnSecurity indicated
that — in addition to the credit card records — tens of millions of user accounts across various
Adobe online properties may have been compromised in the break-in. It was difficult to fully
examine many of the files on the hackers’ server that housed the stolen source because many of
the directories were password protected, and Adobe was reluctant to speculate on the number of
users potentially impacted.
Adobe spokesperson Heather Edell said the company has just completed a campaign to contact
active users whose user IDs with valid, encrypted password information was stolen, urging those
users to reset their passwords. She said Adobe has no indication that there has been any
unauthorized activity on any Adobe ID involved in the incident.

Evolution Of ADOBE CYBER ATTACK(2013)


Adobe has made the cloud an essential part of its business strategy, but today it's been dealt a
major blow thanks to cyber attackers. The company has revealed that an intrusion led to an
untold number of Adobe IDs and passwords falling into the hands of hackers. But it gets far
worse. Adobe says "certain information" on 2.9 million customers may have also been
compromised. Among that data set are customer names, encrypted credit / debit card numbers,
and expiration dates. Source code for "numerous Adobe products" was stolen in another recent
attack, and Adobe says the two are likely connected.

Arkin says that Adobe doesn't believe attackers made off with any decrypted financial
information. Nonetheless, the company will be notifying the many customers whose credit or
debit card information was involved. Those users will be eligible to receive one year of
complimentary credit monitoring "where available."Banks have also been notified to be on alert,
and Adobe says it's actively assisting federal law enforcement in their investigation.Lastly, the
company is in the process of resetting passwords for all impacted customers Cyber attacks and
hackers don’t seem to have a certain sector they prefer over another when it comes to
breaches.Small businesses, large companies, tech giants, and local banks are all just as
vulnerable as each other to attacks. If you have data in your possession, you’re basically in the
crosshairs already.

Conclusion:
We learned about how Adobe Cyber Attack(2013) was created, how it evolved, and then later
how it came to an end.

7.0 Skill Developed/ learning out of this Micro-Project:


1. Learned more about the Adobe Cyber Attack.
2. We learned History of Adobe Cyber Attack.
3. We learned Evolution of Adobe Cyber Attack.

Reference

www.google.com
www.campusify.co.in

***************

You might also like