Study smarter with Fiveable
Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.
Data breaches aren't just IT problems—they're business catastrophes that test everything you're learning about risk management, regulatory compliance, incident response, and third-party security. When you study these cases, you're seeing how failures in vulnerability management, access controls, and security governance translate into hundreds of millions in losses, regulatory fines, and permanent reputation damage. Each breach reveals a specific breakdown in the security framework that organizations should have had in place.
You're being tested on your ability to identify root causes, understand regulatory consequences, and recognize attack vectors across different industries. Don't just memorize breach statistics—know what security principle each case illustrates and why that failure occurred. When an exam question asks about supply chain risk or cloud misconfiguration, you need to immediately connect it to the right case study.
These breaches occurred because organizations failed to patch known vulnerabilities or properly configure their systems. The window between vulnerability disclosure and exploitation is often measured in days, not months.
Compare: Equifax vs. Capital One—both stem from technical misconfigurations, but Equifax failed at basic patching while Capital One failed at cloud security architecture. If an FRQ asks about configuration management, these are your go-to examples for on-premises vs. cloud environments.
These cases demonstrate how attackers exploit the weakest link—often a vendor or contractor with legitimate access. Your security is only as strong as your least secure business partner.
Compare: Target vs. Home Depot—nearly identical attack patterns using vendor credentials to access POS systems. Both occurred within a year of each other, yet Home Depot didn't learn from Target's public failure. This illustrates why threat intelligence sharing matters.
These breaches reveal what happens when organizations lack proper monitoring or delay public disclosure. The longer attackers remain undetected, the more damage they inflict.
Compare: Yahoo vs. Marriott—both involved years-long detection failures, but Marriott's breach was inherited through acquisition. This is critical for understanding why cybersecurity due diligence must be part of any M&A process.
Different industries face different regulatory frameworks, and these cases show how sector-specific rules shape breach consequences. Healthcare and financial services face the strictest penalties.
Compare: Anthem vs. Adobe—both massive breaches, but Anthem's healthcare data triggered HIPAA's strict penalties while Adobe faced lighter consequences under less stringent regulations. Know which regulatory framework applies to which industry.
Some breaches transcend financial losses and fundamentally alter an organization's strategic position or industry practices.
Compare: Sony vs. Anthem—both faced sophisticated, targeted attacks, but Sony's was politically motivated (nation-state) while Anthem's was financially motivated (data theft). Understanding attacker motivation helps predict attack methods and targets.
| Concept | Best Examples |
|---|---|
| Patch Management Failure | Equifax, Adobe |
| Cloud Misconfiguration | Capital One |
| Third-Party/Vendor Risk | Target, Home Depot |
| M&A Security Due Diligence | Marriott (Starwood) |
| Delayed Detection | Yahoo, Marriott, eBay |
| HIPAA/Healthcare Compliance | Anthem |
| GDPR Enforcement | Marriott |
| Nation-State Attacks | Sony Pictures |
| POS Malware | Target, Home Depot |
| Credential Theft Entry | Target, Home Depot, Anthem |
Which two breaches best illustrate the risks of third-party vendor access, and what specific control failure did they share?
Compare the regulatory consequences faced by Anthem versus Marriott. What explains the difference in fine amounts and regulatory frameworks involved?
If an FRQ asks you to explain why security due diligence in mergers and acquisitions matters, which case study provides the strongest evidence, and what specific timeline supports your argument?
Both Equifax and Capital One suffered from configuration-related failures. How do their root causes differ, and what does this suggest about security challenges in cloud migration?
Rank Yahoo, Marriott, and eBay by detection time. What monitoring or governance controls might have shortened the dwell time in each case?