FAMOUS SECURITY BREACH.

Added on - 30 Sep 2019

  • Dissertation

    type

  • 8

    pages

  • 1419

    words

  • 69

    views

  • 0

    downloads

Showing pages 1 to 3 of 8 pages
Running head: FAMOUS SECURITY BREACHFamous Security BreachName of the StudentName of the UniversityAuthor note
1FAMOUS SECURITY BREACHExecutive summaryThe aim of the paper is to identify a security breach that happens recently and the ways the issuewas managed. Uber is one of the known company that faced a data breach in 2016 in which twoof the employees of the company downloaded data of 57 million customers in the world andlicense of 600,000 drivers. The hacking that took place showed the risk associated with cloudstorage system that allowed access of unauthorized individuals. However, the issue was solvedand the company took all possible step to destroy the data from the person that stole it and alsotightened its security system.
2FAMOUS SECURITY BREACHTable of ContentsIntroduction......................................................................................................................................3Discussion........................................................................................................................................3History and origin of the Hack....................................................................................................3Methods they chose for Hacking.................................................................................................4Stakeholders Affected by the Hack.............................................................................................4Comparison with Modern Security Risk.....................................................................................5Steps were taken to fix the Issue..................................................................................................5Conclusion.......................................................................................................................................6References........................................................................................................................................7
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Unlock This Document