U.S. flag

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

https://www.nist.gov/itl/smallbusinesscyber/cybersecurity-basics/case-study-series

Small Business Cybersecurity Corner

Small business cybersecurity case study series.

Ransomware, phishing, and ATM skimming are just a few very common and very damaging cybersecurity threats that Small Businesses need to watch out for. The following Case Studies were created by the National Cyber Security Alliance , with a grant from NIST, and should prove useful in stimulating ongoing learning for all business owners and their employees.

  • Case 1: A Business Trip to South America Goes South Topic: ATM Skimming and Bank Fraud
  • Case 2: A Construction Company Gets Hammered by a Keylogger Topic: Keylogging, Malware and Bank Fraud
  • Case 3: Stolen Hospital Laptop Causes Heartburn Topic: Encryption and Business Security Standards
  • Case 4: Hotel CEO Finds Unwanted Guests in Email Account Topic: Social Engineering and Phishing
  • Case 5: A Dark Web of Issues for a Small Government Contractor Topic: Data Breach

A Study of Cyber Security Issues and Challenges

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

  • Skip to main content
  • Skip to search
  • Skip to footer

Products and Services

Contact cisco.

To get global contact information, please make your selections in the drop-down menus. 

Country/region and language

Get in touch

Please reach out to sales for general inquiries or to chat with a live agent.

Sales inquiries

1 800 553 6387 , press 1

Order and billing

1 800 553 6387  , press 2-1

Monday to Friday 8 a.m. to 5 p.m. Eastern Time Chat is available to you 24/7.

Find technical support for products and licensing, access to support case manager, and chat with support assistant. Technical support is available 24/7.

Enterprise and service providers

1 800 553 2447  (U.S. and Canada) 

Small business

1 866 606 1866  (U.S. and Canada)

Training and certifications

1 800 553 6387 , press 4

Explore support

Explore certification support

Cisco partners

Become a partner, locate a partner, get updates, and partner support. 

Explore Cisco partners

Get partner support

Find a Cisco office

Find offices around the world. 

Locate offices

Corporate headquarters

300 East Tasman Drive San Jose, CA 95134

Legal mailing address

Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134

cyber security case study pdf

Complete the form below or log in and the form will autofill. One of our sales specialists will call you within 15 minutes or on a date or time you request. Specialists are available Monday through Friday, 8 a.m. to 5 p.m. Eastern Time. We are currently experiencing delays in response times. If you require an immediate sales response – please call us 1 800-553-6387. Otherwise, a sales advisor will call you as soon as possible. * Required

Want to use a different email? Sign out * Required

cyber security case study pdf

IMAGES

  1. Case Studies: Cyber Security Protects Sensitive Data

    cyber security case study pdf

  2. (PDF) Cyber Security Awareness Among University Students: A Case Study

    cyber security case study pdf

  3. Cyber Security Case Study

    cyber security case study pdf

  4. (PDF) Overview of Cyber Security

    cyber security case study pdf

  5. 1.1.1.5 Lab

    cyber security case study pdf

  6. (PDF) SOAR USE CASES IN CYBER ATTACKS IBM Cyber Security ops: Terminal

    cyber security case study pdf

VIDEO

  1. Cybersecurity Fundamentals

  2. Introduction To Cyber Security

  3. Cyber Security In 7 Minutes

  4. Cybersecurity Architecture: Fundamentals of Confidentiality, Integrity, and Availability

  5. Cybersecurity Fundamentals

  6. Cyber Security Full course

COMMENTS

  1. PDF A Case Study of the Capital One Data Breach

    This paper analyzes the technical and compliance aspects of the Capital One data breach incident that occurred in July 2019. It uses the NIST Cybersecurity Framework as a basis to assess the vulnerabilities and recommendations for preventing future data leaks.

  2. PDF Target Cyber Attack: A Columbia University Case Study

    Executive Summary. In this case study, we examine the 2013 breach of American retailer Target, which led to the theft of personally identifiable information (PII) and credit card information belonging to over 70 million customers from Target's databases. This case study will first consider Target's vulnerabilities to an external attack in ...

  3. (PDF) A Comprehensive Analysis of High-Impact Cybersecurity Incidents

    Firstly, over the span of a decade, from 2011 to 2020, 50 significant cyber incidents have served as pivotal studies in the realm of cyber threats and security. Examining these case studies ...

  4. PDF Case Studies in Cyber Supply Chain Risk Management

    This Summary of Findings and Recommendations summarizes the Case Studies in Cyber Supply Chain Risk Management series' major findings and recommendations based on expert interviews. The Case Studies in Cyber Supply Chain Risk Management series engaged information security, supply chain, and risk leaders across a diverse set of organizations.

  5. PDF The Hacking of Sony Pictures: A Columbia University Case Study

    This Columbia University case study explores this landmark attack, which underlined the importance of a well-coordinated cyber crisis management and public relations response following a cyber attack as much it reaffirmed the need for strong information security programs and investments prior to its occurrence.

  6. Small Business Cybersecurity Case Study Series

    Learn from real-life examples of cybersecurity threats and how to prevent them. The series covers topics such as ransomware, phishing, ATM skimming, keylogging, data breach, and more.

  7. PDF Case Studies in Cyber Supply Chain Risk Management: Mayo Clinic

    These case studies build on the Best Practices in Cyber Supply Chain Risk Management case studies originally published in 2015 with the goals of covering new organizations in new industries and bringing to light any changes in cyber supply chain risk management practices. For information on NIST's Cyber Supply Chain Risk Management project, see.

  8. Cyber Risk Surveillance: A Case Study of Singapore, WP/20/28 ...

    Prepared by Joseph Goh, Heedon Kang, Zhi Xing Koh, Jin Way Lim, Cheng Wei Ng, Galen Sher, and Chris Yao. 1. Authorized for distribution by Martin Čihák and Ulric Eriksson von Allmen February 2020. Abstract. Cyber risk is an emerging source of systemic risk in the financial sector, and possibly a macro-critical risk too.

  9. Information Security and Cybersecurity Management: A Case Study with

    Information security plays a key role in enterprises management, as it deals with the confidentiality, privacy, integrity, and availability of one of their most valuable resources: data and information. Small and Medium-sized enterprises (SME) are seen as a blind spot in information security and cybersecurity management, which is mainly due to their size, regional and familiar scope, and ...

  10. Cybercrime Investigation Case Studies: An Excerpt from Placing the

    Case in Point. FBI Anthrax Investigation (Arredondo, 2008) Doctor Bruce Ivins, a biodefense researcher at the US Army Medical Research Institute of Infectious Diseases, was suspected of mailing anthrax-contaminated letters causing 5 deaths and injury to dozens of more people.

  11. Case Studies

    This chapter presents a selection of high profile case studies including examples of intelligence failures and successes. These are presented to assist the teaching of cyber threat intelligence, and as a learning tool for practitioners. Case studies are never a full picture of what happened, and should not be considered as a forensic analysis ...

  12. PDF Cross Site Report and Case Studies

    Cross Site Report and Case Studies - CISA

  13. PDF Cyber Security: Case Study

    Cyber Security Case Study. PwC Recent News Articles The company said attackers were able to exploit a vulnerability in a feature known as "View As" to gain control of people's accounts. The breach was discovered on Tuesday, Facebook said, and it has informed police. Users that had potentially been affected were prompted to re-log-in

  14. PDF 14 CYBER SECURITY PREDICTIONS FOR 2022 AND BEYOND

    This year's report, 14 Cyber Security Predictions for 2022 and Beyond, features more than a dozen insights from our leaders and foremost experts located all around the globe, including Sandra Joyce, EVP, Global Intel & Advanced Practices, and Charles Carmakal, SVP and Chief Technology Officer. Turn the page to explore the 2022 Mandiant ...

  15. A Study of Cyber Security Issues and Challenges

    The causes of security vulnerabilities in an organization and the challenging factors of protecting an organization from cybercrimes are discussed in brief. Then a few common cyber-attacks and the ways to protect from them are specified. At last, a famous case study of Mirai's attack on a few high-profile victims and the impact is presented.

  16. PDF The Business Case for Security

    Improving the organization's resilience requires an enterprise security program that addresses both physical and cybersecurity risk. A business case for security will be based on an in-depth understanding of organizational vulnerabilities, operational priorities, and return on investment (ROI). According to recent reporting, 43% of ...

  17. PDF Cyber Security Case Study Final

    On April 5th 2016 at 11:14 am, Doncaster Council was hit by a cyber-attack. Malware - in this case a. piece of ransomware called TeslaCrypt managed to get onto the council's network. Doncaster's systems were well defended by the latest virus protection and in fact the site where the. malware was hosted had been blocked through web browser ...

  18. PDF Cloud Computing Security Case Studies and Research

    The Cloud Security Alliance (CSA) offer certification to cloud providers that meet the criteria. The CSA's Trusted Cloud Initiative program was created to help cloud service providers develop industry-recommended, secure interoperable identity, access and compliance management configuration and practices [1]. III. SECURITY CASE STUDIES

  19. (PDF) A Case Study of the Challenges of Cyber Security in Malaysia's

    A Case Study of the Challenges of Cyber Security in Malaysia's organizations. 1 Hiyam Nadhim Khalid / P98987. 1 Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia ...

  20. (PDF) India's domestic Cyber Security and CyberCrime: A Case Study of

    Manipur Cyber Crime Police Station able to be solved nearly 65 perce nt of the reported case. The The Officer- in -Charge also informs that 23 were arrested for cybercrime un der I T Act and I PC.

  21. (PDF) Optimizing Data Strategy for Automated Mitigation Response

    As organizations increasingly leverage data strategy for enhancing cyber-security through Automated Mitigation Response (AMR) systems, particularly in the context of fighting sophisticated threats ...

  22. Singhealth Case Study (pdf)

    Discuss how assessment of organizational security policy, design and implementation could help this organisation. 4. Discuss any legal constraints on cyber warfare are in this case (if any) 5. Recommend some suitable defence strategies. Step 5: Put together a brief ppt and email your trainer at [email protected] and cc your team mates.

  23. Content modified /content/cdc/site/us/en/about/contact-cisco/index

    /content/cdc/site/us/en/about/contact-cisco/index. Referer: ChangeLog

  24. (PDF) Cyber Security Awareness Among University Students: A Case Study

    Abstract. This Case Study reports the preliminary results of a quantitative survey aimed to identify students' awareness and enthusiasm to learn cybersecurity in Nigerian Universities. The ...