Close

Reply To: OCU ISSO Week 4 Lesson 15 Discussion

#85682
Kevin Mehok
Participant

IST3100 Information Systems Security Officer
Week Four
Discussion #3
WK4 Breaching Discussion
Kevin Mehok

Hey Class,

Breaching is real, and I do think as future professional, we need to understand the mind of a hacker. In June of 2021 Hackers broke into the systems of Electronic Arts, one of the world’s biggest video game publishers, and stole source code used in company games (Vallinsky, 2021). The company made the announcement in June of 2021, which may or may not have shocked the world. I say this, sadly, we are like sitting ducks and we wait for the next digital breach.

As for EA, an online forum posts reviewed by CNN Business and vetted by an independent cybersecurity expert show that on June 6, hackers claimed to have obtained 780 gigabytes of data from EA, including source code for Frostbite, the game engine that powers games that include titles in the FIFA, Madden and Battlefield series (Vallinsky, 2021). In a digital era, to me, this should not be a surprise. The audience surrounding EA are tech savvy, and they are looking to gain ways in, and perform better in gaming sectors.

Interestingly enough, Mr. Brett Callow, a threat analyst at cybersecurity software maker Emsisoft, said losing control over source code could be problematic for EA’s business (Vallinsky, 2021). You think? Of course, it is. How could it not be?

“Source code could, theoretically, be copied by other developers or used to create hacks for games,” Callow said (Vallinsky, 2021). we has Security Professionals need to be in front of these attacks and be better prepared, and well informed.

An EA spokesperson said “no player data was accessed, and we have no reason to believe there is any risk to player privacy. Following the incident, we’ve already made security improvements and do not expect an impact on our games or our business” (Vallinsky, 2021). The time spent and the value that needs to be reassured in these attacks destroy businesses.

This has been an awesome discussion.

God Bless,

Kevin

References:

Vallinsky, J. (2021) https://www.cnn.com/2021/06/26/tech/cyberattacks-security-breaches-june/index.html

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!