Ask a question from expert

Ask now

Cybersecurity ( SIM Swapping attack and impact)

11 Pages2405 Words96 Views
   

Added on  2022-02-18

About This Document

Cybersecurity refers to the safety of data. Various tools provided by cyber companies provide security against hackers and attackers. In this attack, the user's data is transferred through the mobile carrier, and authentication is handled via SMS (Trevor Russo, 2019). Data from social media to bank details can be stolen using the second authentication method, carrier link through data. As part of this, the attacker also tries to convince the customer to get a new SIM card or phone.

Cybersecurity ( SIM Swapping attack and impact)

   Added on 2022-02-18

BookmarkShareRelated Documents
MIS301 Cybersecurity
Cybersecurity ( SIM Swapping attack and impact)_1
Table of Contents
1.0 Introduction.....................................................................................................................4
2.0 SIM Swapping: T- Mobile..............................................................................................5
2.1 Introduction to SIM Swapping attack and impact.......................................................5
2.2 Purpose behind the attack............................................................................................5
2.3 Loophole in T- Mobile’s security................................................................................5
2.4 Impact of attack...........................................................................................................5
2.4.1 Short term................................................................................................................5
2.4.2 Long term.................................................................................................................6
2.5 Comments from T- Mobile..........................................................................................6
3.0 Information Leaked: Snapchat........................................................................................6
3.1 Introduction of attack and impact................................................................................6
3.2 Reason behind attack...................................................................................................6
3.3 Loophole in organization’s security............................................................................6
3.4 Impact of attack...........................................................................................................7
3.4.1 Short term................................................................................................................7
3.4.2 Long term.................................................................................................................7
3.5 Comments from Snapchat...........................................................................................7
4.0 Data breach: British Airways..........................................................................................7
4.1 Introduction of attack and impact................................................................................7
4.2 Reason behind attack...................................................................................................7
4.3 Loophole in organization’s security............................................................................8
4.4 Impact of attack...........................................................................................................8
4.4.1 Short Term...............................................................................................................8
4.4.2 Long Term...............................................................................................................8
4.5 Comments from British Airways.................................................................................8
Cybersecurity ( SIM Swapping attack and impact)_2
5.0 Challenges in Cyber-attack: Prevention..........................................................................9
6.0 Conclusion.....................................................................................................................10
7.0 References.....................................................................................................................11
Cybersecurity ( SIM Swapping attack and impact)_3
1.0 Introduction
The Cybersecurity is process of protecting our data. The security provides by the different
tools of by cyber companies from hackers and attackers. There are various cyber-attacks
which lead to data breach of the companies and also face financial loss. In this report, there
were several attacks from which 3 are discussed. The SIM swapping attack of T- Mobile
companies in which data was stolen of millions of users. This report will also include data
breach of Snapchat users where hacker uploaded the database on similar website. That was
just to warn the company and make people aware about the vulnerabilities in the system of
the company. The hackers also claimed that it was too easy to access the data. It does not
cause any financial loss to the user or company. In this report, data breach of British airways
will also be discussed where company was fined with 4% of its income.
Cybersecurity ( SIM Swapping attack and impact)_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CSE5CRM CYBERSECURITY RISK MANAGEMENT.
|13
|3045
|1

Cyber Security Management Assignment 2022
|11
|2597
|18

IT in Business: Uses, Impact, and Recommendations
|8
|1855
|398

Cyber security Attacks | Assessment 1
|7
|1374
|30

Importance of Security Strategic Planning in Companies
|9
|2286
|488

Cyber Security Assignment 2022
|12
|2845
|22