У нас вы можете посмотреть бесплатно 🏦🧐 Case Study: Capitol One Data Breach 2019 | Cloud Security & Lessons Learned или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this video, we explore the July 2019 Capitol One data breach, one of the most notable incidents involving cloud infrastructure vulnerabilities. The breach exposed sensitive personal information of hundreds of thousands of customers, including names, addresses, dates of birth, and social security numbers. This is not an official NCFE course or workbook. Everything here is my own digested understanding of the subject, written in my own words, and should not be treated as required study material. Some parts are repetitive on purpose to support better understanding, as repetition helps reinforce and fix key terminology in your mind. You’ll learn: How the breach occurred: the attacker, Paige Thompson (aka Erratic), exploited a misconfigured AWS server to gain access to customer data. Attack method and detection: although no profit was sought, Thompson posted breached directories on GitHub, which led to discovery and her arrest. Key characteristics: the stolen data did not appear on the dark web, and there was no industrial espionage or competitor involvement. Impact: exposure of sensitive information, reputational damage for Capitol One, and regulatory scrutiny. Lessons learned: 1. Cloud security is critical; misconfigurations can create serious vulnerabilities. 2. Strict access control and monitoring on cloud systems are essential. 3. Insider knowledge can be misused; former employees may know system weaknesses. 4. White-hat intentions do not prevent data exposure. 5. Prompt detection and reporting are key to minimising damage. 💡 This case demonstrates the importance of robust cloud security, continuous monitoring, and proactive incident response in protecting sensitive customer data. 🎓 Ideal For: ✔ NCFE Level 3 Cyber Security students ✔ Beginners wanting structured understanding of standards ✔ Anyone preparing for assessments or assignments ✔ Learners exploring cyber frameworks 👍 Support the Channel ✔ Like the video ✔ Subscribe for more units ✔ Comment which control you want demonstrated