Report on Information Security Breaches 2017
12 Pages2809 Words29 Views
Added on 2020-02-23
Report on Information Security Breaches 2017
Added on 2020-02-23
ShareRelated Documents
Running head: INFORMATION SECURITY
Information Security
Name of the Student
Name of the University
Author’s note
Information Security
Name of the Student
Name of the University
Author’s note
1INFORMATION SECURITY
Executive Summary
The objective of this report is to focus on the latest security breaches that occurred in the month
of July and the year 2017. It talks about the cloud data exposure or leakage of the Verizon
Company because of misconfiguration. The next portion of this report discusses about the
ransomware attack called WannaCry that occurred in the month of May, 2017. At the last part,
this report provides suggestions regarding the possible solutions that could be done to solve any
security related problems.
Executive Summary
The objective of this report is to focus on the latest security breaches that occurred in the month
of July and the year 2017. It talks about the cloud data exposure or leakage of the Verizon
Company because of misconfiguration. The next portion of this report discusses about the
ransomware attack called WannaCry that occurred in the month of May, 2017. At the last part,
this report provides suggestions regarding the possible solutions that could be done to solve any
security related problems.
2INFORMATION SECURITY
Table of Contents
Introduction..........................................................................................................................3
Part A...................................................................................................................................3
Problem............................................................................................................................3
Reason for the Data Breach.............................................................................................3
How did the Data Breach Occur......................................................................................5
Possible Solution.............................................................................................................5
Part B...................................................................................................................................6
Problem............................................................................................................................6
The Affected Organizations or Countries........................................................................7
Procedure of the Attack...................................................................................................7
Possible Preventive Measures..........................................................................................8
Conclusion...........................................................................................................................8
References..........................................................................................................................10
Table of Contents
Introduction..........................................................................................................................3
Part A...................................................................................................................................3
Problem............................................................................................................................3
Reason for the Data Breach.............................................................................................3
How did the Data Breach Occur......................................................................................5
Possible Solution.............................................................................................................5
Part B...................................................................................................................................6
Problem............................................................................................................................6
The Affected Organizations or Countries........................................................................7
Procedure of the Attack...................................................................................................7
Possible Preventive Measures..........................................................................................8
Conclusion...........................................................................................................................8
References..........................................................................................................................10
3INFORMATION SECURITY
Introduction
This is a generation of information technology and ICT, where people are getting used to
the internet of things. Security has become a serious issue in this era of internet. Data breach
takes place when the sensitive data and sensitive details of an individual or organization are
accessed deliberately to cause some kind of harm. This information later is misused and
modified or deleted. There must be implementation and integration of strong security policies to
make the websites and online transactions strong.
The first part of the report focuses on the data breach incident of the Verizon Wireless
Company. This incident occurred in the month of July, 2017. This report answers few questions
regarding the data breach incident like who were the affected people, causes and the solutions
that are possible in this issue. The next portion of the report focuses on the ransomware attack
called WannaCry that occurred in the month of May, 2017.
Part A
Problem
The problem that took place was the data breach of a well known telecommunication
company. The name of the company is Verizon Wireless. It runs the business in USA (Mathews,
2017). This company is engaged in offering services and devices that are wireless in nature.
There has been a major cloud leak leading to the breach of data. The culprit behind this big issue
was Verizon partner. It was held responsible for the leakage of the information in cloud. This
resulted in the exposure of around millions of accounts of the users. All the data existing in the
account was revealed in the month of July, 2017. This led to lot of issues.
Introduction
This is a generation of information technology and ICT, where people are getting used to
the internet of things. Security has become a serious issue in this era of internet. Data breach
takes place when the sensitive data and sensitive details of an individual or organization are
accessed deliberately to cause some kind of harm. This information later is misused and
modified or deleted. There must be implementation and integration of strong security policies to
make the websites and online transactions strong.
The first part of the report focuses on the data breach incident of the Verizon Wireless
Company. This incident occurred in the month of July, 2017. This report answers few questions
regarding the data breach incident like who were the affected people, causes and the solutions
that are possible in this issue. The next portion of the report focuses on the ransomware attack
called WannaCry that occurred in the month of May, 2017.
Part A
Problem
The problem that took place was the data breach of a well known telecommunication
company. The name of the company is Verizon Wireless. It runs the business in USA (Mathews,
2017). This company is engaged in offering services and devices that are wireless in nature.
There has been a major cloud leak leading to the breach of data. The culprit behind this big issue
was Verizon partner. It was held responsible for the leakage of the information in cloud. This
resulted in the exposure of around millions of accounts of the users. All the data existing in the
account was revealed in the month of July, 2017. This led to lot of issues.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Report on Verizon Data Breachlg...
|12
|2659
|57
Cyber Attacks on Verizon Wireless Networklg...
|10
|1842
|34
Report On Cyber Attacks | ICT In Modern Worldlg...
|11
|2431
|35
WannaCry Attack on Verizon Data Breachlg...
|11
|2624
|272
The Necessary Security Procedureslg...
|11
|2541
|50
ETHICAL ISSUES IN CYBER CRIME.lg...
|8
|1652
|638