logo

Recent Security Breach Analysis

   

Added on  2019-09-30

8 Pages1419 Words343 Views
 | 
 | 
 | 
Running head: FAMOUS SECURITY BREACHFamous Security BreachName of the StudentName of the UniversityAuthor note
Recent Security Breach Analysis_1

1FAMOUS SECURITY BREACHExecutive summary The aim of the paper is to identify a security breach that happens recently and the ways the issuewas managed. Uber is one of the known company that faced a data breach in 2016 in which twoof the employees of the company downloaded data of 57 million customers in the world andlicense of 600,000 drivers. The hacking that took place showed the risk associated with cloudstorage system that allowed access of unauthorized individuals. However, the issue was solvedand the company took all possible step to destroy the data from the person that stole it and alsotightened its security system.
Recent Security Breach Analysis_2

2FAMOUS SECURITY BREACHTable of ContentsIntroduction......................................................................................................................................3Discussion........................................................................................................................................3History and origin of the Hack....................................................................................................3Methods they chose for Hacking.................................................................................................4Stakeholders Affected by the Hack.............................................................................................4Comparison with Modern Security Risk.....................................................................................5Steps were taken to fix the Issue..................................................................................................5Conclusion.......................................................................................................................................6References........................................................................................................................................7
Recent Security Breach Analysis_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents