logo

Internet Technology Security Assignment

   

Added on  2021-04-24

12 Pages3340 Words51 Views
Running head: IT SECURITYInternet Technology SecurityName of Student-Name of University-Author’s Note-
Internet Technology Security Assignment_1
1IT SECURITYAnswer to Question 1:Equifax Data Breach 2017On September 2017, Equifax has declared an incident of one of the largest cyber securityin the history of cyber crime. Equifax is considered to be one of the three nationwide companiesof credit reporting, which rates and track financial history of the consumers of U.S. Equifaxserves the companies with data regarding the loans, payments of loan, and also details of creditcards and much more (Miller, 2018). Equifax reported that the unauthorized data breach tookplace in the mid of May and continued up to July 2017. The data breach was disclosed on 29thJuly. The information that was breached was mostly PII (Personally Identifiable Information)that included names, SSN (Social Security Numbers), Addresses, Birth Dates, and in some of thecases, the driver license was also access by the attackers. The attackers stole almost about209,000 numbers of credit card details and almost 182,000 people’s dispute documents werestolen along with PII. The data breach took place mostly in U.K. and Canada. The details of the data breach that was released by the company, which had key factssuch as:The website application of U.S. was mostly exploited by all the criminals so that they canaccess the files from their system.The company also stated that there is no proper evidence of the unauthorized activity oncommercial credit or consumer reporting database.Recommendations are provided by the company for conduction such assessment in thefollowing steps.
Internet Technology Security Assignment_2
2IT SECURITYThe data breach of Equifax aware all their customers in the company. In other databreach, people are not aware of the data breach that took place (Hedley & Jacobs, 2017). All thedata like banks, lenders, retailers, credit card companies, and many more reports credit activity ofa particular individual to credit the agencies that are reporting and purchase public records also.Equifax also pay attention to mail notices to all the people who were victims of the attack and tothose person whose details of credit card and dispute documents were stolen in the data breach. There are certain rules or principles that the consumers can follow to protect their detailsof credit cards (Larcker, Reiss & Tayan, 2017). The customers can protect their credit detailsfrom all identity theft by many ways. Four ways to protect the credit line of the customers are:credit freezes, credit monitoring, identity theft protection, and fraud alerts.1.Credit freezes- The work of credit freeze is to freeze the credit report. To make thecustomer account credit freeze means that any creditors that are potential cannot getaccess to the credit report that makes less likely to be open to identity theft. By creditfreeze, the identity thief cannot open any new accounts by the name of the customer. Thenew lines of credit is generally blocked by credit freeze and also protects the attackers tosee the credit reports (O’Brien, 2017). The mortgage leader or the credit card companyknown as potential creditors cannot access the credit report if the accounts are in a freezestate. This helps the customer to keep their accounts safe from identity theft and helps tokeep the account safe. 2.Fraud alerts- Fraud alert is another way to stop the credits from data breach. When someintruder wants to take credit by the mane of the victim, an alert regarding the credit issent to the victim about the credit that is to take place or might have taken place. Fraud
Internet Technology Security Assignment_3
3IT SECURITYalerts shows an individual that the credit is taken by the customer itself, and not by anyother attacker or intruder. Fraud alerts are to be renewed in an interval of 90 days. 3.Credit monitoring- All the changes that are related to credit can be monitored by creditmonitoring (Janakiraman, Lim & Rishika, 2018). The changes that are done with thecredit reports are generally tracked using the credit monitoring that includes a loan or anew credit card. All the suspicious activities can be detected by credit monitoring.4.Identity protection- The identity theft protection generally provides monitoring for creditfile at more than one credit agencies reporting as well as credit score from one agency ormore than one agency (Mathews, 2017). The services that are included in theft includesthe alerts that the customers receives on their PII. With identity protection, there is lesspossibility of data theft that may arise in a company. Restoration service are provided byprotecting the identity theft that helps the victims to solve the issues that are related toidentity theft. Answer to Question 2Quantum Key DistributionQKD (Quantum Key Distribution) is known for its secure communication process thatimplements a protocol for cryptography that involves the components of general quantummechanics. QKD helps two parties with a common secret key that is produced and is known onlyto both of them. This secret key is used to decrypt and encrypt all the messages that aretransferred between them (Korzh et al., 2015). The secret key that is transferred and is keptsecret in between two parties is known as quantum cryptography. There are many uniqueproperty of quantum key distribution. One of the most unique and important property of QKD is
Internet Technology Security Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security Concepts
|5
|1209
|214

MANAGEMENT INFORMATION SYSTEM.
|3
|335
|347

Equifax Data Breach of 2017: Overview, Causes, and Impact | Desklib
|13
|596
|118

Recent Cyber Security Issue
|4
|490
|464

Cybersecurity Threats Assignment
|5
|1057
|121

Cyber Security Breaches Assignment
|6
|1483
|60