Information and Communications Technology Report And Case Study Of Cyber Attacks
Added on -2020-02-19
| 10 pages| 1842 words| 34 views
Trusted by 2+ million users, 1000+ happy students everyday
Showing pages 1 to 3 of 10 pages
Running head: CYBER ATTACKSCyber AttacksName of the Student:Student ID:Subject Code:Session:Assessment Number:
1CYBER ATTACKSExecutive SummaryThe main aim of this report is to know the principal description of Information Technologysecurity breaches in the technological world. Information and Communications Technology orICT is a risk for the rest of the world and the cause for this threat is the cyber attacks. The reportbriefly describes about the case study of Verizon Wireless Cyber Attack that took place in 2017,July. The report further covers the May 2017 Ransomware Attack with proper description.
2CYBER ATTACKSTable of ContentsIntroduction......................................................................................................................................3Part A...............................................................................................................................................3The Problem.................................................................................................................................3Cause of the Breach.....................................................................................................................3Data Breach Occurrence..............................................................................................................4Recommended Solution...............................................................................................................5Part B...............................................................................................................................................5The Problem.................................................................................................................................5Affected Countries.......................................................................................................................6Procedure.....................................................................................................................................6Recommended Measures.............................................................................................................7Conclusion.......................................................................................................................................7References........................................................................................................................................8
Found this document preview useful?
You are reading a preview Upload your documents to download or Become a Desklib member to get accesss