Information Security.

Added on - 20 Nov 2019

  • 13

    pages

  • 2688

    words

  • 53

    views

  • 0

    downloads

Showing pages 4 of 13
Running Head: Information SecurityInformation Security
Information Security1ContentsIntroduction......................................................................................................................................2Part-A...............................................................................................................................................3Facts of the case...........................................................................................................................3Impact of case..............................................................................................................................3Reasons for the attack..................................................................................................................4Steps were taken to prevent the attack.........................................................................................5Part – B............................................................................................................................................6Facts of the case...........................................................................................................................6Impact of the case........................................................................................................................6Reasons for the attack..................................................................................................................7Steps were taken to prevent the attack.........................................................................................8Conclusion.......................................................................................................................................9References......................................................................................................................................10
Information Security2IntroductionComputer security breach is any incident that results in unauthorized access of data, applications,and services or devices bypassing their underlying security mechanism. A security breach takesplace generally when an individual enters a private, unauthorized and confidential. The reportthrows light on recent computer security breach (Schou, & Hernandez, 2014).
Information Security3Part-ANews Article - Spambot leaks more than 700m email addresses in massive data breachLink-https://www.theguardian.com/technology/2017/aug/30/spambot-leaks-700m-email-addresses-huge-data-breach-passwordsFacts of the caseMore than 700 million email addresses, and various passwords, have spilled openlybecause of a misconfigured spambot, in one of the biggest information ruptures ever. As of now,a huge number of email locations and passwords have been leaked on the Internet. It might bepossible that this is the biggest data dump ever in which 700 million of email addresses wereexposed online (Alexhern, 2017). As per the Troy Hunt, a researcher and a person who take careof security alert site HaveIBeenPwned said that might be possible each e-mail id belongs to aperson but the dump also contains some duplicate and fake addresses. There might be thepossibility that the small number of users got affected. The problem was detected by the securityresearcher Benkow who claim that Netherlands-based Onliner spambot server encompasses ofemail id along with the passwords and details related to the e-mail servers. He said that it givesoff an impression of being associated with a strain of malware called Ursnif, a Trojan that takesusernames and passwords and in addition managing an account record and payment card details(Leyden, 2017).Impact of caseDue to this spambot, the general public got affected. As their email addresses along withthe passwords were disclosed. The e-mail id might contain essential details of the users. So there