logo

Computer Security Breaches

   

Added on  2023-04-21

7 Pages2314 Words447 Views
COMPUTER SECURITY BREACHES
0
Computer security breaches
Computer Security Breaches_1
COMPUTER SECURITY BREACHES
1
Introduction
A security breach is defined as a cyber-threat which increases the issue of hacking, data
breaching and cyber-attacks. Mainly, such kind of issue occurs in the computer system
where hackers attack the user personal devices and networks (Aloul, et al., 2012). The
aim of this report is to analysis the concept of computer security breaches and threats
and identifies the key factors that increase the rate of cyber-crimes. Facebook is one of
the largest social media application that was suffered from the data breach and this
report will discuss this problem, how and why it occurs and the possible solution to
mitigate them.
Part A
1. Facebook Cambridge Analytica attack
Facebook is the biggest social media platform which is used by many consumers and
companies for communication purpose. In the year 2018 (March 17) Facebook faced the
issue of a security breach in which Cambridge analytica obtained the private data or
information of 50 million consumers with the help of the application. It is observed d
that Cambridge Analytica scraped details about individual’s personalities, social
networks, and engagement on the platform (Barkly, 2018). It obtained the information
of 30 million users and it is occurred due to lack of security, use of unauthentic servers
and hackers transfer the huge amount of traffic signal on the Facebook network.
Facebook identified the original estimate was, in fact, low and in April the organization
notified around 87 million people of its platform which their data had been shared. Such
kind of data breach issue occurred because Facebook is one of the biggest organizations
in the world and hackers required to earn more money by encrypting their personal
information (Davis, et al., 2007). After that, they communicate with consumers and
management team through e-mails and demand money to restore back their personal
information. According to the Facebook, such kinds of data were provided to Cambridge
anaytica by a researcher Aleksandr Kogan that started a firm which is called as GSR. GSR
produced a quiz and transfer to 270,000 individuals with the help of Facebook
application which create uncertainty in system and hackers enter into the networks and
hacked their private details. A recent study evaluated that criminals ware using the
Computer Security Breaches_2
COMPUTER SECURITY BREACHES
2
Facebook APIs to collect the data or information such as name, gender and location
which linked with the user profile. Therefore, to control and handle such issue Facebook
communicated with the IT support team and identify the traffic signals from the
networks that reduce the performance of their system. They also adopted the advanced
security tools and techniques to avoid the data breach problem such as firewall
software, two step verification, biometric recognition system, and cryptography
technology (Ericsson, 2010). Recently they plan to prevent the Cambridge analytics
incident in future and they designed the main six processes to handle cyber-crimes and
data breach which are the following:
Analysis all applications which have had access to a huge amount of data or
information
Turning off application access to users which can help to reduce the traffic
signals
Use only authentic servers and networks during the communication process
Changing the login password of Facebook so applications can only see the users
name, photo and mobile number unless the application goes through a further
analysis procedure
2. Asynchronous I/O activity
In the field of the computer system the asynchronous input and output is a kind of
process which permits other data processing to continue before the transmission has
finished. It is analysed that the I/O operations on a computer system are very slow
rather than processing of data and it is one of the biggest problems with many memory
protection processes (Hansen, and Nissenbaum, 2009). It is evaluated that a simple
input output system first access the data and take time for execution but asynchronous
I/O system block the process of the program during the communication process. in the
asynchronous system once the process issues a read or writes a program the process
cells are returned in the main system if the input and output program has been
transferred. For large computer network, such kind of program cannot be used because
it creates a problem or issue with the memory protection system. To avoid such kind of
issue consumers can adopt the operating system with a fence register that has the
ability to relocate the system and it plays a significant role in the multiuser
environment. The relocation technique reduces the problem by providing base or
Computer Security Breaches_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
MANAGING INFORMATION SYSTEMS.
|3
|347
|52

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Data Breach and Memory Protection in Information Security
|12
|3163
|23

Foundation of Cyber Security
|6
|1679
|89

Analyzing Facebook Cambridge Analytical Attack and Sony PlayStation Network Outage
|11
|3452
|29

Cyber-Attack on Newark City Hall Computers and Sony PlayStation Outage Case
|7
|2098
|58