logo

Incident Response: Research on Software/Hardware Tools Used in Hacking and GDPR Implications

   

Added on  2023-06-12

14 Pages2704 Words205 Views
Running head: INCIDENT RESPONSE
Incident Response
Name of the student:
Name of the university:
Author Note

1INCIDENT RESPONSE
Executive summary
The following report has analyzed research various software and hardware tools used in hacking
considering the Cases took place after January 2016. An improper assessment would make it unable
to prevent hacking attacks from taking place. A demonstration is done on aims and objectives of the
research in considering different hardware and software tools for hacking. Apart from this, the study
also highlights various General Data Protection Regulation or GDPR applications.

2INCIDENT RESPONSE
Table of Contents
Introduction:..........................................................................................................................................3
a. Aims and objectives of the research:.................................................................................................3
b. Research on software/hardware tools used in hacking:.....................................................................5
c. GDPR implications:...........................................................................................................................7
Conclusion:............................................................................................................................................7
Future work:...........................................................................................................................................8
References:............................................................................................................................................9
Appendix:............................................................................................................................................11
Appendix 1:.....................................................................................................................................11
Appendix 2:.....................................................................................................................................12
Appendix 3:.....................................................................................................................................13

3INCIDENT RESPONSE
Introduction:
Hacking is the identification of weakness within computer networks to systems for exploiting
different inadequacies to retrieve access. The following report analyzes various hardware and
software tools utilized in hacking. This is because information is the most expensive resource for any
business. Its security protects the image of the organization and helps in saving lots of money.
However, the main the objective of the research is to inform people regarding danger in
hacking considering the Case Studies of the incidents that took place after January 2016. The
incidents includes the cases of “Adult Friend Finder”, Under Armour/MyFitnessPal”, “WannaCry
ransomware attack” and “Cybercriminals penetrating Equifax (EFX)” are demonstrated below. Here,
in this study, a discussion is made on aims and objectives of the research on the usage of different
hardware and software tools. Lastly, various General Data Protection Regulation or GDPR
applications are investigated in this report.
a. Aims and objectives of the research:
As it pertains to hardware, the term hacking is commonly misused. There is a growing
necessity in the today’s digital space after January 2016 to know how the existing electronics are
modified to use it. This also includes understanding the enclosure and behaviour of the hardware.
While looking to develop any device, some it is complicated to be aware of where to start. The angle
of attack is also needed to be known and to know the areas for which it has not been designed.
Discussion on chosen Case studies:
Under
Armour/MyFitnessPal
Here about 1500 million people owning MyFitnessPal
applications as owned by “United Armour” witness leakage of

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethical Hacking: WannaCry Ransomware Attack and GDPR Implications
|8
|1826
|130

Computer Security Assignment Solved
|10
|2742
|144

Communication Network Security
|14
|2944
|307