logo

Cybersecurity Breaches: Case Studies

   

Added on  2020-02-19

10 Pages1842 Words34 Views
 | 
 | 
 | 
Running head: CYBER ATTACKSCyber AttacksName of the Student:Student ID:Subject Code:Session:Assessment Number:
Cybersecurity Breaches: Case Studies_1

1CYBER ATTACKSExecutive SummaryThe main aim of this report is to know the principal description of Information Technologysecurity breaches in the technological world. Information and Communications Technology orICT is a risk for the rest of the world and the cause for this threat is the cyber attacks. The reportbriefly describes about the case study of Verizon Wireless Cyber Attack that took place in 2017,July. The report further covers the May 2017 Ransomware Attack with proper description.
Cybersecurity Breaches: Case Studies_2

2CYBER ATTACKSTable of ContentsIntroduction......................................................................................................................................3Part A...............................................................................................................................................3The Problem.................................................................................................................................3Cause of the Breach.....................................................................................................................3Data Breach Occurrence..............................................................................................................4Recommended Solution...............................................................................................................5Part B...............................................................................................................................................5The Problem.................................................................................................................................5Affected Countries.......................................................................................................................6Procedure.....................................................................................................................................6Recommended Measures.............................................................................................................7Conclusion.......................................................................................................................................7References........................................................................................................................................8
Cybersecurity Breaches: Case Studies_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents