logo

Answers to a Question on the Data Breach in a University

12 Pages2579 Words228 Views
   

Troy University

   

Cyber Security (CJ 4472)

   

Added on  2020-02-24

About This Document

A cyber attack is a cybercriminal attack that uses one or more computers to attack single or numerous computers or networks. A cyber attack can be used to intentionally disable devices, steal data, or launch additional attacks from a compromised computer.

Answers to a Question on the Data Breach in a University

   

Troy University

   

Cyber Security (CJ 4472)

   Added on 2020-02-24

ShareRelated Documents
Running head: CYBER ATTACK AND INFORMATION SECURITYCYBER ATTACK AND INFORMATION SECURITYName of the StudentName of the UniversityAuthor note
Answers to a Question on the Data Breach in a University_1
1CYBER ATTACK AND INFORMATION SECURITYTable of ContentsPart A- Question 1...........................................................................................................................2What was the problem?...................................................................................................................2Who were affected due to the data breach?.....................................................................................2How did the problem occur?............................................................................................................3Why did the problem occur?............................................................................................................4What are the solutions of the problem?...........................................................................................4References........................................................................................................................................6Part B- Question 2...........................................................................................................................7What was the problem?...................................................................................................................7Who were affected due to the data breach?.....................................................................................8Why did the problem occur?............................................................................................................9What are the solutions of the problem?...........................................................................................9References......................................................................................................................................11
Answers to a Question on the Data Breach in a University_2
2CYBER ATTACK AND INFORMATION SECURITYPart A- Question 1What was the problem?Scottrade bank recently faced a security data breach of its database in April 2017. It had adatabase of more than 20000 customers. The data base was not secured properly and it was leftopen to the public. Chris Vickey who was the MacKeeper researcher created the database whichwas designed on March 31. Vickey informed that the copany was contacted by him and laterconnected to a staffer on the Scottrade bank (Ablon et al., 2016). The security team of theScottrade bank assured to make the information secure. After some days he informed about theresolving of the problem. But the data was leaked eventually in the month of April. Thecustomers who lost their data included personal details, credit cards details and also their accountdetails. The number of credit cards profile which was exposed is more than 48000. Also thesocial security numbers, names, addresses and phone numbers were also exposed due to the databreach (Young, 2014). These data are undoubtedly most confidential according to priority list onthe basis of security level. This data should be secured by the bank and the exposure of the datawas really unexpected and created lack of reliability in the customer. On April 2 it was firstinformed by a third party vendor named as Genpact. Genpact informed that the data set wasinformed to a cloud server that did not made the security protocols in a correct way (Federgreen& Sachs, 2015). Due to this reason the information was not secured at all. That file includedinformation regarding the loan application information which was a small B2B unit placed inScottrade bank. It had a non public information of more than 20000 people and businesses.
Answers to a Question on the Data Breach in a University_3
3CYBER ATTACK AND INFORMATION SECURITYWho were affected due to the data breach?Due To the security breach undoubtedly the 20000 people and businesses were affectedas their confidential data was exposed to public. Any unwanted access of those data can lead to ahigh damage of the data. Information like phone number, address, names was exposed due to thatdata breach. Some details regarding the information of the credit card was also left exposed dueto the security breach (Gao, Zhong & Mei, 2015). The amount of information was not in a smallrange and the people loosed their reliability on the bank. The bank was also affected in terms ofreliability issue with the customers. The bank was really affected in terms of customersatisfaction. It was task of highest priority of the bank so that the bank can make the securitywith highest priority. Any hacker could take the advantage of making the insecure data in theirown purpose. How did the problem occur?The data breach was happened due to the lack of proper security set up of theinformation. On April 2 it was first informed by a third party vendor named as Genpact. Genpactinformed that the data set was informed to a cloud server that did not made the security protocolsin a correct way. Due to this reason the information was not secured at all. That file includedinformation regarding the loan application information which was a small B2B unit placed inScottrade bank. It had non public information of more than 20000 people and businesses (Gray,2015). It is also informed that the data set was also not encrypted. The data can be easilyaccessible by the unwanted people due to the lack of security features like encryption. The mainissue in this case was that the third party vendor was unable to deliver the security features to thebanking portal.
Answers to a Question on the Data Breach in a University_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Impact of Database Security Breaches
|5
|680
|32

Equifax Data Breach and PlayStation Outage: Security Issues in Information Technology
|11
|2188
|409

Security | Cyber Attackers | Essay
|6
|1104
|18

Information Security Assignment | Computer Security Breach
|13
|2688
|271

Capital One Data Breach Incident
|24
|6782
|52

Assignment on Briefing Paper: Information Security
|9
|2153
|17