Trusted by 2+ million users, 1000+ happy students everyday
Showing pages 1 to 4 of 11 pages
Running head: CYBER ATTACKS Cyber Attacks Name of the Student: Student ID: Subject Code: Session: Assessment Number:
Executive Summary The main objective of this report is to understand the basic description of security breaches in modern world. ICT has become a threat for all of the world and the main reason for this is the security breaches. The following report discusses about the Verizon Wireless Cyber Attack of USA in July 2017 with the discussion, affected people and the recommendations for prevention of such security breaches. The report also covers the infamous WannaCry Ransomware Cyber Attack in May 2017, which shook the whole Information and Communications Technology of the world.
Table of Contents Introduction......................................................................................................................................4 Part A...............................................................................................................................................4 The Problem.................................................................................................................................4 Reason for the Security Breach...................................................................................................5 Data Breach Occurrence..............................................................................................................6 Solution........................................................................................................................................6 Part B...............................................................................................................................................7 The Problem.................................................................................................................................7 The Affected Countries................................................................................................................8 Procedure of the Attack...............................................................................................................8 Preventive Measures....................................................................................................................8 Conclusion.......................................................................................................................................9 References......................................................................................................................................10
Introduction A computer security breach is any event, which results in unsanctioned use of services, networks, applications, data or devices by circumventing their fundamental mechanisms of security. A security breach can also be referred to as a security violation. A security violation takes place when an application or an individual illegally makes entry to an unauthorized, confidential or private IT logical perimeter. This report outlines the case study of cyber security breach of Verizon Wireless of USA, which became a threat for the whole world in July 2017. It provides a detailed research of the problem, the affected people and the recommendation that how that breach could had been stopped. The report further outlines the brief description of the May 2017 Ransomware Cyber- Attack with the problem, the affected person and the prevention of that case study. The name of the May 2017 cyber attack is the WannaCry Ransomware Cyber attack. The description of the above discussion is given in the following paragraphs. Part A The Problem Verizon Wirelessis a recognized telecommunicationorganization that operatesits business in USA. They are responsible for offering wireless devices and services. They have faced a major security breach because of cloud leak. The Verizon partner was responsible for leaking all the data in cloud (Mathews, 2017). It exposed approximately the accounts of millions of customers. All the information present in their account was leaked in July, 2017 creating a lot of problem.
Found this document preview useful?
You are reading a preview Upload your documents to download or Become a Desklib member to get accesss