logo

Security Breach - Assignment

   

Added on  2019-09-30

8 Pages1419 Words343 Views
Running head: FAMOUS SECURITY BREACHFamous Security BreachName of the StudentName of the UniversityAuthor note

1FAMOUS SECURITY BREACHExecutive summary The aim of the paper is to identify a security breach that happens recently and the ways the issuewas managed. Uber is one of the known company that faced a data breach in 2016 in which twoof the employees of the company downloaded data of 57 million customers in the world andlicense of 600,000 drivers. The hacking that took place showed the risk associated with cloudstorage system that allowed access of unauthorized individuals. However, the issue was solvedand the company took all possible step to destroy the data from the person that stole it and alsotightened its security system.

2FAMOUS SECURITY BREACHTable of ContentsIntroduction......................................................................................................................................3Discussion........................................................................................................................................3History and origin of the Hack....................................................................................................3Methods they chose for Hacking.................................................................................................4Stakeholders Affected by the Hack.............................................................................................4Comparison with Modern Security Risk.....................................................................................5Steps were taken to fix the Issue..................................................................................................5Conclusion.......................................................................................................................................6References........................................................................................................................................7

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security Risk Management and Legal Issues - Uber Data Breach
|3
|840
|149

Data Breach and Memory Protection in Information Security
|12
|3163
|23

Hacking and Unauthorised Access
|5
|1343
|68

Cyber Security & Ethical Hacking : Report
|9
|2386
|80

Decision Making & Problem Solving Assignment - Uber
|12
|3308
|422

Computer Security Breaches
|7
|2314
|447