Limited-time offer! Save up to 50% Off | Solutions starting at $6 each  

Information Security Assignment | Voter Records Breach

Added on - 24 Feb 2020

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 10 pages
Running head: INFORMATION SECURITYAssignment[Student Name Here][Institution’s Name Here][Professor’s Name Here][Date Here]
INFORMATION SECURITY2Table of ContentsContentsPagePart A: Voter records breach............................................................3The problem.......................................................................................................3How and why the attack occurred.....................................................................4Possible solutions..............................................................................................5Part B: WannaCry.............................................................................6The problem.......................................................................................................6Those affected and how.....................................................................................6Method of attack................................................................................................7Preventing the attack.........................................................................................8References............................................................................................9
INFORMATION SECURITY3Part A: Voter records breachDigital technology has facilitated many advances in life, most of which are inclined toinformation dispensation. This dispensation also has increased the levels of data breachesthroughout the world as experienced this year where multiple voter registration data has beenexposed. Some of the countries affected have been Mexico, the state of Georgia and thePhilippines. However, these events are minor exposures as compared to the American attackthat occurred in June. In the attack over 198 million voter records were exposed to the public,a significant number that dated back to records from ten years ago[ CITATION New171 \l 2057 ].The problemDiscovered by researcher Chris Vickery, the data breach exposed over 1.1 terabytes of data,holding sensitive information such as personal information and addresses. The data exposedhad been previously compiled by a data analytics company called Deep Root. Deep root hadbeen given the task to analyse voter registration details which gave them access to the namesand addresses of the potential voters. Furthermore, the leaked information also gave adetailed account on how the voters felt on a wide range of issues, stemming from politicalclimate to gun control[ CITATION Ben12 \l 2057 ]. Through the discovery made by theresearcher, Vickery ultimately outlined the poor structures used by organizations to protectthe information they hold.This conclusion is based on the method used to attack the company’s systems which asoutlined in the next section was caused by negligence and not by any sophisticated hackingtool. Moreover, the breach illustrated the amount of information entrusted to conservativegroups who were lucky that the data was not used to conduct illicit operations more so, after ageneral election had been conducted. In addition to this, the data breach heightened thequestions over the collaboration between the United States government and the Russiangovernment[ CITATION Uch17 \l 2057 ].
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document