Study smarter with Fiveable
Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.
Cybersecurity breaches aren't just headline-grabbing disasters—they're case studies in policy failure, regulatory gaps, and systemic vulnerabilities that shape how governments and organizations approach digital security. When you study these breaches, you're learning about the intersection of technology, governance, and human behavior. Each incident reveals something specific about where our defenses break down: supply chain dependencies, third-party access, patch management failures, or inadequate disclosure requirements.
On the exam, you're being tested on your ability to identify why breaches happen and what policy responses they trigger—not just memorize dates and victim counts. Don't just know that Equifax was breached; understand how it demonstrates the consequences of poor vulnerability management. Don't just recall that SolarWinds affected government agencies; recognize it as the defining example of supply chain compromise. Each breach illustrates a broader principle about how we protect—or fail to protect—critical systems and personal data.
Some of the most damaging breaches occur not from sophisticated zero-day exploits but from organizations failing to apply available security patches. When companies ignore known vulnerabilities, they leave doors wide open for attackers.
Compare: Equifax vs. WannaCry—both exploited known, patchable vulnerabilities, but Equifax was a targeted data theft while WannaCry was indiscriminate ransomware. If an FRQ asks about organizational negligence in cybersecurity, either works, but Equifax better illustrates corporate accountability failures.
Modern organizations don't operate in isolation—they depend on vendors, software providers, and contractors. Attackers increasingly target these trusted relationships to bypass direct defenses.
Compare: SolarWinds vs. Target—both demonstrate third-party risk, but SolarWinds shows software supply chain compromise while Target illustrates vendor access management failures. Use SolarWinds for questions about government/critical infrastructure; use Target for private sector and consumer data protection.
When cyberattacks target systems that societies depend on daily, the consequences extend far beyond data loss. Infrastructure attacks reveal how digital vulnerabilities translate into physical-world disruptions.
Compare: Colonial Pipeline vs. WannaCry—both ransomware, but Colonial targeted specific critical infrastructure while WannaCry spread indiscriminately. Colonial is your go-to example for questions about infrastructure protection policy and sector-specific regulation.
Some breaches aren't financially motivated—they're acts of espionage or geopolitical aggression. Attribution to nation-states changes the policy response from regulatory enforcement to diplomatic and intelligence action.
Compare: OPM vs. Yahoo—both attributed to state-sponsored actors, but OPM targeted government personnel data for intelligence purposes while Yahoo represented mass consumer data theft. OPM is essential for national security policy questions; Yahoo illustrates disclosure requirements and corporate accountability.
Not all breaches involve hackers breaking in—some involve companies misusing data they legitimately collected. These incidents blur the line between security breach and privacy violation.
Compare: Facebook-Cambridge Analytica vs. Marriott—Cambridge Analytica involved authorized data collection misused, while Marriott was unauthorized external access. Use Cambridge Analytica for questions about consent, platform responsibility, and data ethics; use Marriott for traditional breach response and regulatory enforcement.
| Concept | Best Examples |
|---|---|
| Patch management failures | Equifax, WannaCry |
| Supply chain vulnerabilities | SolarWinds, Target |
| Third-party vendor risk | Target, Marriott (acquisition) |
| Critical infrastructure attacks | Colonial Pipeline, WannaCry |
| State-sponsored espionage | OPM, Yahoo, SolarWinds |
| Geopolitical cyber operations | Sony Pictures, SolarWinds |
| Data privacy and consent | Facebook-Cambridge Analytica |
| Disclosure and transparency failures | Yahoo, Equifax |
Which two breaches best illustrate the dangers of failing to patch known vulnerabilities, and what distinguishes their attack methods?
If asked to explain supply chain risk in cybersecurity, which breach would you choose as your primary example—and why might SolarWinds be more policy-relevant than Target?
Compare the OPM breach and the Facebook-Cambridge Analytica scandal: both involved sensitive personal data, but how do they differ in terms of who was responsible and what policy responses followed?
An FRQ asks you to discuss how a single cyberattack can affect national security, economic stability, and public trust simultaneously. Which breach provides the strongest multi-dimensional example?
What distinguishes the Marriott breach from other data breaches in terms of regulatory significance, and what lesson does it offer about corporate acquisitions?