Report On Cyber Attacks | ICT In Modern World
11 Pages2431 Words35 Views
Added on 2020-02-24
Report On Cyber Attacks | ICT In Modern World
Added on 2020-02-24
ShareRelated Documents
Running head: CYBER ATTACKS
Cyber Attacks
Name of the Student:
Student ID:
Subject Code:
Session:
Assessment Number:
Cyber Attacks
Name of the Student:
Student ID:
Subject Code:
Session:
Assessment Number:
Executive Summary
The main objective of this report is to understand the basic description of security breaches in
modern world. ICT has become a threat for all of the world and the main reason for this is the
security breaches. The following report discusses about the Verizon Wireless Cyber Attack of
USA in July 2017 with the discussion, affected people and the recommendations for prevention
of such security breaches. The report also covers the infamous WannaCry Ransomware Cyber
Attack in May 2017, which shook the whole Information and Communications Technology of
the world.
The main objective of this report is to understand the basic description of security breaches in
modern world. ICT has become a threat for all of the world and the main reason for this is the
security breaches. The following report discusses about the Verizon Wireless Cyber Attack of
USA in July 2017 with the discussion, affected people and the recommendations for prevention
of such security breaches. The report also covers the infamous WannaCry Ransomware Cyber
Attack in May 2017, which shook the whole Information and Communications Technology of
the world.
Table of Contents
Introduction......................................................................................................................................4
Part A...............................................................................................................................................4
The Problem.................................................................................................................................4
Reason for the Security Breach...................................................................................................5
Data Breach Occurrence..............................................................................................................6
Solution........................................................................................................................................6
Part B...............................................................................................................................................7
The Problem.................................................................................................................................7
The Affected Countries................................................................................................................8
Procedure of the Attack...............................................................................................................8
Preventive Measures....................................................................................................................8
Conclusion.......................................................................................................................................9
References......................................................................................................................................10
Introduction......................................................................................................................................4
Part A...............................................................................................................................................4
The Problem.................................................................................................................................4
Reason for the Security Breach...................................................................................................5
Data Breach Occurrence..............................................................................................................6
Solution........................................................................................................................................6
Part B...............................................................................................................................................7
The Problem.................................................................................................................................7
The Affected Countries................................................................................................................8
Procedure of the Attack...............................................................................................................8
Preventive Measures....................................................................................................................8
Conclusion.......................................................................................................................................9
References......................................................................................................................................10
Introduction
A computer security breach is any event, which results in unsanctioned use of services,
networks, applications, data or devices by circumventing their fundamental mechanisms of
security. A security breach can also be referred to as a security violation. A security violation
takes place when an application or an individual illegally makes entry to an unauthorized,
confidential or private IT logical perimeter.
This report outlines the case study of cyber security breach of Verizon Wireless of USA,
which became a threat for the whole world in July 2017. It provides a detailed research of the
problem, the affected people and the recommendation that how that breach could had been
stopped. The report further outlines the brief description of the May 2017 Ransomware Cyber-
Attack with the problem, the affected person and the prevention of that case study. The name of
the May 2017 cyber attack is the WannaCry Ransomware Cyber attack. The description of the
above discussion is given in the following paragraphs.
Part A
The Problem
Verizon Wireless is a recognized telecommunication organization that operates its
business in USA. They are responsible for offering wireless devices and services. They have
faced a major security breach because of cloud leak. The Verizon partner was responsible for
leaking all the data in cloud (Mathews, 2017). It exposed approximately the accounts of millions
of customers. All the information present in their account was leaked in July, 2017 creating a lot
of problem.
A computer security breach is any event, which results in unsanctioned use of services,
networks, applications, data or devices by circumventing their fundamental mechanisms of
security. A security breach can also be referred to as a security violation. A security violation
takes place when an application or an individual illegally makes entry to an unauthorized,
confidential or private IT logical perimeter.
This report outlines the case study of cyber security breach of Verizon Wireless of USA,
which became a threat for the whole world in July 2017. It provides a detailed research of the
problem, the affected people and the recommendation that how that breach could had been
stopped. The report further outlines the brief description of the May 2017 Ransomware Cyber-
Attack with the problem, the affected person and the prevention of that case study. The name of
the May 2017 cyber attack is the WannaCry Ransomware Cyber attack. The description of the
above discussion is given in the following paragraphs.
Part A
The Problem
Verizon Wireless is a recognized telecommunication organization that operates its
business in USA. They are responsible for offering wireless devices and services. They have
faced a major security breach because of cloud leak. The Verizon partner was responsible for
leaking all the data in cloud (Mathews, 2017). It exposed approximately the accounts of millions
of customers. All the information present in their account was leaked in July, 2017 creating a lot
of problem.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Cyber Attacks on Verizon Wireless Networklg...
|10
|1842
|34
Report on Verizon Data Breachlg...
|12
|2659
|57
Report on Information Security Breaches 2017lg...
|12
|2809
|29
ETHICAL ISSUES IN CYBER CRIME.lg...
|8
|1652
|638
WannaCry Attack on Verizon Data Breachlg...
|11
|2624
|272
Ethical Issues in Cyber Crime Assignmentlg...
|6
|1770
|409