Security Breach - Assignment

Added on - 30 Sep 2019

  • 8

    Pages

  • 1419

    Words

  • 185

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 8 pages
Running head: FAMOUS SECURITY BREACHFamous Security BreachName of the StudentName of the UniversityAuthor note
1FAMOUS SECURITY BREACHExecutive summaryThe aim of the paper is to identify a security breach that happens recently and the ways the issuewas managed. Uber is one of the known company that faced a data breach in 2016 in which twoof the employees of the company downloaded data of 57 million customers in the world andlicense of 600,000 drivers. The hacking that took place showed the risk associated with cloudstorage system that allowed access of unauthorized individuals. However, the issue was solvedand the company took all possible step to destroy the data from the person that stole it and alsotightened its security system.
2FAMOUS SECURITY BREACHTable of ContentsIntroduction......................................................................................................................................3Discussion........................................................................................................................................3History and origin of the Hack....................................................................................................3Methods they chose for Hacking.................................................................................................4Stakeholders Affected by the Hack.............................................................................................4Comparison with Modern Security Risk.....................................................................................5Steps were taken to fix the Issue..................................................................................................5Conclusion.......................................................................................................................................6References........................................................................................................................................7
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document