Professional Documents
Culture Documents
net/publication/370608906
CITATIONS READS
0 315
2 authors, including:
SEE PROFILE
All content following this page was uploaded by Sandeepta kumar Gouda on 09 May 2023.
I. INTRODUCTION
Many online services now offer 2FA as an optional security A. Target Data Breach
feature, and some even require it for certain high-risk In January 2021, one of the largest cyberattacks in US
activities, such as transferring large amounts of money or history occurred, affecting over 30,000 US companies (and
accessing sensitive information. However, it is important to 60,000 worldwide) that used Microsoft Exchange email
note that 2FA is not foolproof and can also be vulnerable to servers. The hackers took advantage of four zero-day
certain types of attacks, such as SIM swapping or social vulnerabilities to gain unauthorized access to email accounts
engineering attacks aimed at convincing the user to provide from small businesses to local governments [11]. Exploiting
a second form of identification. coding errors, they were able to control vulnerable systems
that only required two conditions: connection to the internet
and on-premises, locally managed systems.
VI. NON-TECHNICAL COUNTERMEASURES
IJRAR23B1376
View publication stats
International Journal of Research and Analytical Reviews (IJRAR) 31