logo

Information Security | EDMODO Assignment - Desklib

   

Added on  2020-02-24

9 Pages2528 Words187 Views
Running head: INFORMATION SECURITY1The information securityName:Institution Affiliation:

INFORMATION SECURITY2Part A: Edmodo data breach What was the problem? Edmodo is an educational technology organization which offer communications, collaborations as well ascoaching resources to the K-12 colleges and instructors (Ngoma, 2012). The Edmodo network allows the teachers to manage to share the content, disperse the quizzes, projects, as well and also manage the interaction with the students, colleagues and parents.In April 2017 a hacker was able to steal millions of account details from this organization, and the data was apparently for sale on the dark-web. The hacker was able to steal seventy seven million of the user account which included the email addresses, usernames as well as the hashed passwords (Baker, Hylender, Pamula, Porter & Spitler, 2011). According to the Motherboard, which is a tech and science publication organization reported that the hacker put the data on sale on the dark marker for some one thousand dollars. On the twelve of May 2017, there was a reference which was published in regards to the potential hack of the Edmodo. There have been numerous posts that were discovered later in which the information was being sold on the black market (Baker, Hylender, Pamula, Porter & Spitler, 2011). On the seventh of May 2017 the organization acknowledged a security incident towhich they warned the users by the email. How and why it occurred A hacker by the name “nclay” claimed that he had stolen more than seventy seven million user accounts from the Edmodo, a K-12 societal studying network of more than seventy seven thousand instructors, students, parents along with other members, and place the information accessible in the dark web (Ngoma, 2012). Let take a look at precisely how this hack occurred.

INFORMATION SECURITY3The information dump began with two attack features in the Python which the hackers might have accustomed to attack on the site (Business, 2009). One of these attackers installed a malicious file whichwas names “xd.exe’, and they remained it to “api.exe” which was probably a boot loader.Figure 1: The diagram shows the malicious IP address which an attack was launchedThe IP address may have launched various web attacks several of these happen to be captured bynetwork id signatures which are pointed out in the Alien Vault OTX database:

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment On Computer Security Breach At Verizon
|6
|1996
|172

Issue in POS Systems - Assignment
|3
|724
|290

Under Armour Data Breach
|5
|761
|381

Data Breach - Cyber Security
|4
|752
|406

COIT20262 - Advanced Network Security
|12
|1899
|262

INFORMATION SECURITY MANAGEMENT.
|14
|3248
|385