An official website of the United States government
Here’s how you know
Official websites use .gov A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
https://www.nist.gov/itl/smallbusinesscyber/cybersecurity-basics/case-study-series
Small Business Cybersecurity Corner
Small business cybersecurity case study series.
Ransomware, phishing, and ATM skimming are just a few very common and very damaging cybersecurity threats that Small Businesses need to watch out for. The following Case Studies were created by the National Cyber Security Alliance , with a grant from NIST, and should prove useful in stimulating ongoing learning for all business owners and their employees.
- Case 1: A Business Trip to South America Goes South Topic: ATM Skimming and Bank Fraud
- Case 2: A Construction Company Gets Hammered by a Keylogger Topic: Keylogging, Malware and Bank Fraud
- Case 3: Stolen Hospital Laptop Causes Heartburn Topic: Encryption and Business Security Standards
- Case 4: Hotel CEO Finds Unwanted Guests in Email Account Topic: Social Engineering and Phishing
- Case 5: A Dark Web of Issues for a Small Government Contractor Topic: Data Breach
A Study of Cyber Security Issues and Challenges
Ieee account.
- Change Username/Password
- Update Address
Purchase Details
- Payment Options
- Order History
- View Purchased Documents
Profile Information
- Communications Preferences
- Profession and Education
- Technical Interests
- US & Canada: +1 800 678 4333
- Worldwide: +1 732 981 0060
- Contact & Support
- About IEEE Xplore
- Accessibility
- Terms of Use
- Nondiscrimination Policy
- Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
- Skip to main content
- Skip to search
- Skip to footer
Products and Services
Contact cisco.
To get global contact information, please make your selections in the drop-down menus.
Country/region and language
Get in touch
Please reach out to sales for general inquiries or to chat with a live agent.
Sales inquiries
1 800 553 6387 , press 1
Order and billing
1 800 553 6387 , press 2-1
Monday to Friday 8 a.m. to 5 p.m. Eastern Time Chat is available to you 24/7.
Find technical support for products and licensing, access to support case manager, and chat with support assistant. Technical support is available 24/7.
Enterprise and service providers
1 800 553 2447 (U.S. and Canada)
Small business
1 866 606 1866 (U.S. and Canada)
Training and certifications
1 800 553 6387 , press 4
Explore support
Explore certification support
Cisco partners
Become a partner, locate a partner, get updates, and partner support.
Explore Cisco partners
Get partner support
Find a Cisco office
Find offices around the world.
Locate offices
Corporate headquarters
300 East Tasman Drive San Jose, CA 95134
Legal mailing address
Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134
Complete the form below or log in and the form will autofill. One of our sales specialists will call you within 15 minutes or on a date or time you request. Specialists are available Monday through Friday, 8 a.m. to 5 p.m. Eastern Time. We are currently experiencing delays in response times. If you require an immediate sales response – please call us 1 800-553-6387. Otherwise, a sales advisor will call you as soon as possible. * Required
Want to use a different email? Sign out * Required
IMAGES
VIDEO
COMMENTS
This paper analyzes the technical and compliance aspects of the Capital One data breach incident that occurred in July 2019. It uses the NIST Cybersecurity Framework as a basis to assess the vulnerabilities and recommendations for preventing future data leaks.
Executive Summary. In this case study, we examine the 2013 breach of American retailer Target, which led to the theft of personally identifiable information (PII) and credit card information belonging to over 70 million customers from Target's databases. This case study will first consider Target's vulnerabilities to an external attack in ...
Firstly, over the span of a decade, from 2011 to 2020, 50 significant cyber incidents have served as pivotal studies in the realm of cyber threats and security. Examining these case studies ...
This Summary of Findings and Recommendations summarizes the Case Studies in Cyber Supply Chain Risk Management series' major findings and recommendations based on expert interviews. The Case Studies in Cyber Supply Chain Risk Management series engaged information security, supply chain, and risk leaders across a diverse set of organizations.
This Columbia University case study explores this landmark attack, which underlined the importance of a well-coordinated cyber crisis management and public relations response following a cyber attack as much it reaffirmed the need for strong information security programs and investments prior to its occurrence.
Learn from real-life examples of cybersecurity threats and how to prevent them. The series covers topics such as ransomware, phishing, ATM skimming, keylogging, data breach, and more.
These case studies build on the Best Practices in Cyber Supply Chain Risk Management case studies originally published in 2015 with the goals of covering new organizations in new industries and bringing to light any changes in cyber supply chain risk management practices. For information on NIST's Cyber Supply Chain Risk Management project, see.
Prepared by Joseph Goh, Heedon Kang, Zhi Xing Koh, Jin Way Lim, Cheng Wei Ng, Galen Sher, and Chris Yao. 1. Authorized for distribution by Martin Čihák and Ulric Eriksson von Allmen February 2020. Abstract. Cyber risk is an emerging source of systemic risk in the financial sector, and possibly a macro-critical risk too.
Information security plays a key role in enterprises management, as it deals with the confidentiality, privacy, integrity, and availability of one of their most valuable resources: data and information. Small and Medium-sized enterprises (SME) are seen as a blind spot in information security and cybersecurity management, which is mainly due to their size, regional and familiar scope, and ...
Case in Point. FBI Anthrax Investigation (Arredondo, 2008) Doctor Bruce Ivins, a biodefense researcher at the US Army Medical Research Institute of Infectious Diseases, was suspected of mailing anthrax-contaminated letters causing 5 deaths and injury to dozens of more people.
This chapter presents a selection of high profile case studies including examples of intelligence failures and successes. These are presented to assist the teaching of cyber threat intelligence, and as a learning tool for practitioners. Case studies are never a full picture of what happened, and should not be considered as a forensic analysis ...
Cross Site Report and Case Studies - CISA
Cyber Security Case Study. PwC Recent News Articles The company said attackers were able to exploit a vulnerability in a feature known as "View As" to gain control of people's accounts. The breach was discovered on Tuesday, Facebook said, and it has informed police. Users that had potentially been affected were prompted to re-log-in
This year's report, 14 Cyber Security Predictions for 2022 and Beyond, features more than a dozen insights from our leaders and foremost experts located all around the globe, including Sandra Joyce, EVP, Global Intel & Advanced Practices, and Charles Carmakal, SVP and Chief Technology Officer. Turn the page to explore the 2022 Mandiant ...
The causes of security vulnerabilities in an organization and the challenging factors of protecting an organization from cybercrimes are discussed in brief. Then a few common cyber-attacks and the ways to protect from them are specified. At last, a famous case study of Mirai's attack on a few high-profile victims and the impact is presented.
Improving the organization's resilience requires an enterprise security program that addresses both physical and cybersecurity risk. A business case for security will be based on an in-depth understanding of organizational vulnerabilities, operational priorities, and return on investment (ROI). According to recent reporting, 43% of ...
On April 5th 2016 at 11:14 am, Doncaster Council was hit by a cyber-attack. Malware - in this case a. piece of ransomware called TeslaCrypt managed to get onto the council's network. Doncaster's systems were well defended by the latest virus protection and in fact the site where the. malware was hosted had been blocked through web browser ...
The Cloud Security Alliance (CSA) offer certification to cloud providers that meet the criteria. The CSA's Trusted Cloud Initiative program was created to help cloud service providers develop industry-recommended, secure interoperable identity, access and compliance management configuration and practices [1]. III. SECURITY CASE STUDIES
A Case Study of the Challenges of Cyber Security in Malaysia's organizations. 1 Hiyam Nadhim Khalid / P98987. 1 Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia ...
Manipur Cyber Crime Police Station able to be solved nearly 65 perce nt of the reported case. The The Officer- in -Charge also informs that 23 were arrested for cybercrime un der I T Act and I PC.
As organizations increasingly leverage data strategy for enhancing cyber-security through Automated Mitigation Response (AMR) systems, particularly in the context of fighting sophisticated threats ...
Discuss how assessment of organizational security policy, design and implementation could help this organisation. 4. Discuss any legal constraints on cyber warfare are in this case (if any) 5. Recommend some suitable defence strategies. Step 5: Put together a brief ppt and email your trainer at [email protected] and cc your team mates.
/content/cdc/site/us/en/about/contact-cisco/index. Referer: ChangeLog
Abstract. This Case Study reports the preliminary results of a quantitative survey aimed to identify students' awareness and enthusiasm to learn cybersecurity in Nigerian Universities. The ...