Assignment on Information Security

Added on -2020-02-24

| 13 pages| 2568 words| 146 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 4 of 13 pages

Running Head: INFORMATION SECURITYINFORMATION SECURITYName of the StudentName of the University
1INFORMATION SECURITYExecutive SummaryThere is a different set of terminology in Information Security. These security aresometimes get effected and endangered by threats or an actions that has the capability to defeatthe security measure and hence result in a loss of confidential data. Information security protectsthe integrity, confidentiality and availability of the information in the stored devices.
2INFORMATION SECURITYTable of ContentsIntroduction..........................................................................................................................3Part A: Computer Security Breaches that occurred during April-August 2017..................3References............................................................................................................................5Part B: Research on May 2017 Ransomware Cyber-Attack................................................71. What was the problem?...............................................................................................72. Who were effected and how?......................................................................................73. How was the attack carried out?..................................................................................74. What could have been done to prevent the attack?......................................................8Conclusion...........................................................................................................................8References............................................................................................................................8
3INFORMATION SECURITYIntroductionOperating system security are techniques to ensure the Operating System integrity. Thereare specific steps and measures that are used for the protection of OS from treats, viruses,malwares, hacking and most importantly breaches (Marsh, 2017). Data Breach refers to theincidents where sensitive, confidential and protected information and data has been used, stolenor has unauthorized accessed and viewed the data. This data breaching concept may involve PII(Personal Identifiable Information), PHI (Personal Health Information), intellectual property ortrade secrets etc. For protecting the data and information from getting hacked and protect againstdata breaches, cryptography techniques are studied and practiced, for securing communication inthe presence of third party known as the adversaries. This is a technique of storing andtransmitting data in some particular form such that only the authorized party would be able readand process the file. Part A: Computer Security Breaches that occurred during April-August 2017In this section we are selecting the Data breach occurred in Gmail in the month of May2017 “Massive Phishing Attack Targeted Gmail Users”. It was generally known as thesophisticated phishing scam that was targeted to gain access to the accounts by a third-party appin public Gmail accounts. The scenario was that the accounts was depicted as from the user’strusted contacts and were notified to the individuals if they want to share the Google Doc withthe malicious app(Alazab & Broadhurst, 2017). On clicking the link once the real security pageof Google is opened. On reaching the security page the person was provoked to allow usage offake Docs app of the Google such that to manage the customer’s email account.

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Premium

$45

Q&A Library Access

Chat support

12

Document Unlocks

4

Answer Unlocks

Students who viewed this