Limited-time offer! Save up to 50% Off | Solutions starting at $6 each  

Cybersecurity ( SIM Swapping attack and impact)

Added on - 18 Feb 2022

Cybersecurity refers to the safety of data. Various tools provided by cyber companies provide security against hackers and attackers. In this attack, the user's data is transferred through the mobile carrier, and authentication is handled via SMS (Trevor Russo, 2019). Data from social media to bank details can be stolen using the second authentication method, carrier link through data. As part of this, the attacker also tries to convince the customer to get a new SIM card or phone.

Trusted by 2+ million users,
1000+ happy students everyday
Showing pages 1 to 4 of 11 pages
MIS301 Cybersecurity
Table of Contents
1.0Introduction.....................................................................................................................4
2.0SIM Swapping: T- Mobile..............................................................................................5
2.1Introduction to SIM Swapping attack and impact.......................................................5
2.2Purpose behind the attack............................................................................................5
2.3Loophole in T- Mobile’s security................................................................................5
2.4Impact of attack...........................................................................................................5
2.4.1Short term................................................................................................................5
2.4.2Long term.................................................................................................................6
2.5Comments from T- Mobile..........................................................................................6
3.0Information Leaked: Snapchat........................................................................................6
3.1Introduction of attack and impact................................................................................6
3.2Reason behind attack...................................................................................................6
3.3Loophole in organization’s security............................................................................6
3.4Impact of attack...........................................................................................................7
3.4.1Short term................................................................................................................7
3.4.2Long term.................................................................................................................7
3.5Comments from Snapchat...........................................................................................7
4.0Data breach: British Airways..........................................................................................7
4.1Introduction of attack and impact................................................................................7
4.2Reason behind attack...................................................................................................7
4.3Loophole in organization’s security............................................................................8
4.4Impact of attack...........................................................................................................8
4.4.1Short Term...............................................................................................................8
4.4.2Long Term...............................................................................................................8
4.5Comments from British Airways.................................................................................8
5.0Challenges in Cyber-attack: Prevention..........................................................................9
6.0Conclusion.....................................................................................................................10
7.0References.....................................................................................................................11
1.0Introduction
The Cybersecurity is process of protecting our data. The security provides by the different
tools of by cyber companies from hackers and attackers. There are various cyber-attacks
which lead to data breach of the companies and also face financial loss. In this report, there
were several attacks from which 3 are discussed. The SIM swapping attack of T- Mobile
companies in which data was stolen of millions of users. This report will also include data
breach of Snapchat users where hacker uploaded the database on similar website. That was
just to warn the company and make people aware about the vulnerabilities in the system of
the company. The hackers also claimed that it was too easy to access the data. It does not
cause any financial loss to the user or company. In this report, data breach of British airways
will also be discussed where company was fined with 4% of its income.
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document

Various cyber-attacks have been encountered by various organizations over the past decade, according to this report. In addition, it discussed the SIM swapping attack that T-Mobile faced. The hacker manipulates the carrier in order to assign the user of the company a different number or phone. In this attack, there is also a breach of user data associated with their phone numbers. This includes financial information and personal information. We were also informed about Snapchat's data breach. Snapchat authorities were warned about exploits and weaknesses in the company's security system through this attack. According to the hacker, the purpose of this attack was to make people aware of the risk and threats.