logo

Information Security Assignment | Voter Records Breach

10 Pages2492 Words149 Views
   

Edith Cowan University

   

Information Security (CSI2102)

   

Added on  2020-02-24

About This Document

Information security safeguards important documents against illegal access, modification, or recording, as well as every disturbance or destruction.

Information Security Assignment | Voter Records Breach

   

Edith Cowan University

   

Information Security (CSI2102)

   Added on 2020-02-24

ShareRelated Documents
Running head: INFORMATION SECURITYAssignment [Student Name Here][Institution’s Name Here] [Professor’s Name Here][Date Here]
Information Security Assignment | Voter Records Breach_1
INFORMATION SECURITY2Table of ContentsContents PagePart A: Voter records breach............................................................3The problem.......................................................................................................3How and why the attack occurred.....................................................................4Possible solutions..............................................................................................5Part B: WannaCry.............................................................................6The problem.......................................................................................................6Those affected and how.....................................................................................6Method of attack................................................................................................7Preventing the attack.........................................................................................8References............................................................................................9
Information Security Assignment | Voter Records Breach_2
INFORMATION SECURITY3Part A: Voter records breachDigital technology has facilitated many advances in life, most of which are inclined toinformation dispensation. This dispensation also has increased the levels of data breachesthroughout the world as experienced this year where multiple voter registration data has beenexposed. Some of the countries affected have been Mexico, the state of Georgia and thePhilippines. However, these events are minor exposures as compared to the American attackthat occurred in June. In the attack over 198 million voter records were exposed to the public,a significant number that dated back to records from ten years ago[ CITATION New171 \l 2057 ].The problemDiscovered by researcher Chris Vickery, the data breach exposed over 1.1 terabytes of data,holding sensitive information such as personal information and addresses. The data exposedhad been previously compiled by a data analytics company called Deep Root. Deep root hadbeen given the task to analyse voter registration details which gave them access to the namesand addresses of the potential voters. Furthermore, the leaked information also gave adetailed account on how the voters felt on a wide range of issues, stemming from politicalclimate to gun control[ CITATION Ben12 \l 2057 ]. Through the discovery made by theresearcher, Vickery ultimately outlined the poor structures used by organizations to protectthe information they hold.This conclusion is based on the method used to attack the company’s systems which asoutlined in the next section was caused by negligence and not by any sophisticated hackingtool. Moreover, the breach illustrated the amount of information entrusted to conservativegroups who were lucky that the data was not used to conduct illicit operations more so, after ageneral election had been conducted. In addition to this, the data breach heightened thequestions over the collaboration between the United States government and the Russiangovernment[ CITATION Uch17 \l 2057 ].
Information Security Assignment | Voter Records Breach_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report On Internet Security In Conducting Elections
|10
|2652
|51

The Data Security Breaches - WRTG 393
|8
|2326
|326

Cyber Attacks and Computer Security - Report
|12
|2768
|43

Security Breaches And Ransomware | Assignment
|10
|2263
|35

WannaCry Attack on Verizon Data Breach
|11
|2624
|272

The Necessary Security Procedures
|11
|2541
|50