Ask a question from expert

Ask now

Assignment on Information Security

13 Pages2568 Words146 Views
   

Added on  2020-02-24

Assignment on Information Security

   Added on 2020-02-24

BookmarkShareRelated Documents
Running Head: INFORMATION SECURITYINFORMATION SECURITYName of the StudentName of the University
Assignment on Information Security_1
1INFORMATION SECURITYExecutive SummaryThere is a different set of terminology in Information Security. These security aresometimes get effected and endangered by threats or an actions that has the capability to defeatthe security measure and hence result in a loss of confidential data. Information security protectsthe integrity, confidentiality and availability of the information in the stored devices.
Assignment on Information Security_2
2INFORMATION SECURITYTable of ContentsIntroduction..........................................................................................................................3Part A: Computer Security Breaches that occurred during April-August 2017..................3References............................................................................................................................5Part B: Research on May 2017 Ransomware Cyber-Attack................................................71. What was the problem?...............................................................................................72. Who were effected and how?......................................................................................73. How was the attack carried out?..................................................................................74. What could have been done to prevent the attack?......................................................8Conclusion...........................................................................................................................8References............................................................................................................................8
Assignment on Information Security_3
3INFORMATION SECURITYIntroductionOperating system security are techniques to ensure the Operating System integrity. Thereare specific steps and measures that are used for the protection of OS from treats, viruses,malwares, hacking and most importantly breaches (Marsh, 2017). Data Breach refers to theincidents where sensitive, confidential and protected information and data has been used, stolenor has unauthorized accessed and viewed the data. This data breaching concept may involve PII(Personal Identifiable Information), PHI (Personal Health Information), intellectual property ortrade secrets etc. For protecting the data and information from getting hacked and protect againstdata breaches, cryptography techniques are studied and practiced, for securing communication inthe presence of third party known as the adversaries. This is a technique of storing andtransmitting data in some particular form such that only the authorized party would be able readand process the file. Part A: Computer Security Breaches that occurred during April-August 2017In this section we are selecting the Data breach occurred in Gmail in the month of May2017 “Massive Phishing Attack Targeted Gmail Users”. It was generally known as thesophisticated phishing scam that was targeted to gain access to the accounts by a third-party appin public Gmail accounts. The scenario was that the accounts was depicted as from the user’strusted contacts and were notified to the individuals if they want to share the Google Doc withthe malicious app(Alazab & Broadhurst, 2017). On clicking the link once the real security pageof Google is opened. On reaching the security page the person was provoked to allow usage offake Docs app of the Google such that to manage the customer’s email account.
Assignment on Information Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Search the Web for News on Computer Security Breaches
|7
|2118
|43

ITC595 - Information Security - Research Paper
|10
|2567
|129

The phishing attack on national Australia bank
|12
|3330
|16

Yahoo Data Breach Case Assignment
|9
|3207
|30

Security Threats to Organization
|5
|1156
|22

COVID 19 Safety Applications and Risks
|33
|2384
|78