logo

INFORMATION SECURITY MANAGEMENT.

   

Added on  2023-03-30

14 Pages3248 Words385 Views
Data Science and Big Data
 | 
 | 
 | 
Running head: INFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENT
Name of the Student
Name of the University
Author Note:
INFORMATION SECURITY MANAGEMENT._1

1INFORMATION SECURITY MANAGEMENT
Abstract
Data breach took place in the year 2012 where 68 million user email id along with password was
on sale. The whole thing was established on the darkest of the marketplace, which is very much
similar to one bitcoin value. The organization aims to store most of its vital data on Dropbox
platform. It merely hacked around 68 million account details which were leaked from the online
platform.
INFORMATION SECURITY MANAGEMENT._2

2INFORMATION SECURITY MANAGEMENT
Table of Contents
Introduction..........................................................................................................................3
Discussion............................................................................................................................3
Issues in Dropbox............................................................................................................3
Identified Threats to the information Assets...................................................................4
Aspect to organization Information System....................................................................4
Vulnerabilities can be exploited......................................................................................6
Information Security goals..............................................................................................6
Organization encountering similar kind of issue or attack..............................................7
Information Security Control...........................................................................................8
Conclusion...........................................................................................................................8
Recommendation.................................................................................................................9
References..........................................................................................................................11
INFORMATION SECURITY MANAGEMENT._3

3INFORMATION SECURITY MANAGEMENT
Introduction
The following report is all about Dropbox organization, which is a multi-national firm.
The headquarters of this organization is located in San Francisco, CA 94107. The organization
comes up with more than 540 million users on worldwide platform(Thomas et al., 2017). In this
application, user can easily access the required files and folder from any given location at any
given time from various interfaces (Mozumder et al., 2017). It is merely inclusive of web
desktop and mobile user or even by making use of third party based application that is connected
to this Dropbox application. Hackers obtained the data from the online storage, which is known
to be data breach of 2012 (Patil, 2018). Dropbox has assured that the breach has taken place aims
to potential force the option of password reset. It is mainly done through initial announcement
for analysing the overall number of affected users.
In the coming pages of the report, an idea has been provided concerning issues in
Dropbox data breach. After that, identification of threats has been made for the information
assets. A list of information assets that are vulnerable has been discussed. An explanation has
been provided concerning information security goals which might be compromised. The last
section of the report deals with control against this kind of security breach.
Discussion
Issues in Dropbox
At the time of hacking, the required files are selected are completely obtained by the help
of sources in the whole of the database trading community. The breach notification services
resulted in leak base where motherboard found around the files of 5 GB (Tayan, 2017). It
comprises of huge amount of accounts that comprises of email addresses and password for the
INFORMATION SECURITY MANAGEMENT._4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ZOMATO HACKED: Security Breach Results in 17 Million User Data Stolen
|5
|731
|290

Data Breach - Cyber Security
|4
|752
|406

Information Security | EDMODO Assignment - Desklib
|9
|2528
|187

Under Armour Data Breach
|5
|761
|381

Critical Analysis of Yahoo's 2014 Data Breach
|5
|1125
|278

Threats and Vulnerabilities of Cloud Computing: A Review
|4
|723
|381