logo

Cyber Attacks and Computer Security - Report

12 Pages2768 Words43 Views
   

The University of New Castle Australia

   

Computer Networks and Cybersecurity (ENGR8762)

   

Added on  2020-02-24

About This Document

In this document, we will discuss the Cyber attacks and computer security breaches that took place in April-August. While Part A deals with American voters being compromised in a cyber leak, Part B deals with the ransomware attacks, which took the world by storm.

Cyber Attacks and Computer Security - Report

   

The University of New Castle Australia

   

Computer Networks and Cybersecurity (ENGR8762)

   Added on 2020-02-24

ShareRelated Documents
Running head: INFORMATION SECURITY INFORMATION SECURITY Name of the studentName of the universityAuthor note
Cyber Attacks and Computer Security - Report_1
1SECURITY INTERRUPTSExecutive SummaryThe report deals with the Cyber attacks and computer security breaches that took place duringApril- August 2017. While Part A deals with American voters being compromised in a cyberleak, Part B deals with the ransomware attacks, which took the world by storm in early 2017.
Cyber Attacks and Computer Security - Report_2
2SECURITY INTERRUPTSTable of ContentsPart A.........................................................................................................................................3Introduction............................................................................................................................3The event................................................................................................................................3The people whose details were compromised........................................................................4Remedies to such leaks..........................................................................................................5Conclusion..............................................................................................................................5Part B..........................................................................................................................................6Introduction............................................................................................................................6The event................................................................................................................................6The remedy.............................................................................................................................8Conclusion..................................................................................................................................8References:...............................................................................................................................10
Cyber Attacks and Computer Security - Report_3
3SECURITY INTERRUPTSPart A Introduction It is not that uncommon to hear that voters data bases has been exposed or breachedsomewhere around the world. However, a massive breach which affected the lives of awhopping 198 million US voters is something unheard off. This was one of the largest dataexposure in the history of USA, where the Cyber Risk Team who enquired into it found outthat personal details of over 198 million of American voters were up on the web. It was laterknown that a firm who were working for Donald Trump had accidently triggered the massiveleak. The event On June 19, 2017 UpGuard’s cyber risk analyst Chris Vickery found an open cloudrepository as he was looking for some misconfigured data sources for his company. Therepository which was an Amazon Web Service S3 bucket did not have any firewall and waseasily accessible to common mass of people (Varia & Mathew, 2014). Anyone using theinternet could have had access to the files which helped Donald Trump become the presidentby simply going to the Amazon sub domain: “dra-dw.” “Dra-dw’ usually is known as “Deeproot Analytics Data Warehouse” and is quite common in businesses nowadays. It is actually ahuge collection of data which are used for very complex calculations. The leak could have ledto a widespread breach in security if Vickery had not noticed it and notified the concernedauthorities (Pfleeger & Caputo, 2012). Deep Root Analytics revealed that they were in chargeof the bucket which was later secured against public access. There was 1.1 terabytes of data in the “dra-dw” which is an amount which is close to500 hours of video. It could be downloaded and the amount of data accessible was huge. In
Cyber Attacks and Computer Security - Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Assignment | Voter Records Breach
|10
|2492
|149

Report on Verizon Data Breach
|12
|2659
|57

Security Breaches And Ransomware | Assignment
|10
|2263
|35

Report On Cyber Attacks | ICT In Modern World
|11
|2431
|35

Cyber Attacks on Verizon Wireless Network
|10
|1842
|34

Report On Internet Security In Conducting Elections
|10
|2652
|51