Information and Communications Technology Report And Case Study Of Cyber Attacks

Added on -2020-02-19

| 10 pages| 1842 words| 34 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 3 of 10 pages

Running head: CYBER ATTACKSCyber AttacksName of the Student:Student ID:Subject Code:Session:Assessment Number:
1CYBER ATTACKSExecutive SummaryThe main aim of this report is to know the principal description of Information Technologysecurity breaches in the technological world. Information and Communications Technology orICT is a risk for the rest of the world and the cause for this threat is the cyber attacks. The reportbriefly describes about the case study of Verizon Wireless Cyber Attack that took place in 2017,July. The report further covers the May 2017 Ransomware Attack with proper description.
2CYBER ATTACKSTable of ContentsIntroduction......................................................................................................................................3Part A...............................................................................................................................................3The Problem.................................................................................................................................3Cause of the Breach.....................................................................................................................3Data Breach Occurrence..............................................................................................................4Recommended Solution...............................................................................................................5Part B...............................................................................................................................................5The Problem.................................................................................................................................5Affected Countries.......................................................................................................................6Procedure.....................................................................................................................................6Recommended Measures.............................................................................................................7Conclusion.......................................................................................................................................7References........................................................................................................................................8

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Premium

$45

Q&A Library Access

Chat support

12

Document Unlocks

4

Answer Unlocks

Students who viewed this