Ask a question from expert

Ask now

ITC595 - Information Security - Research Paper

10 Pages2567 Words129 Views
   

Charles Sturt University

   

Information Security (ITC595)

   

Added on  2020-03-01

About This Document

This research will discuss the may 2017 ransomware cyberattack on the web and also will prepare a report focusing on the following questions. What was the problem, Who was affected and how and How was the attack carried out?

ITC595 - Information Security - Research Paper

   

Charles Sturt University

   

Information Security (ITC595)

   Added on 2020-03-01

BookmarkShareRelated Documents
Running head: INFORMATION SECURITYINFORMATION SECURITYName of the StudentName of the UniversityAuthor Note
ITC595 - Information Security - Research Paper_1
2INFORMATION SECURITYTable of ContentsPart A...............................................................................................................................................3What was the problem?...............................................................................................................3Who were affected and how?......................................................................................................3How was the attack carried out?..................................................................................................3What could have been done to prevent the attack?......................................................................4References........................................................................................................................................6Part B...............................................................................................................................................7What was the problem?...............................................................................................................7Who were affected and how?......................................................................................................7How as the attack carried out?.....................................................................................................8What could have been done to prevent the attack?......................................................................9References......................................................................................................................................10
ITC595 - Information Security - Research Paper_2
3INFORMATION SECURITYPart AWhat was the problem?Gmail users were the main target in this attack, which was done in a sophisticatedphishing scam that was seeking to gain the overall access of the account of the user with the helpof a third party application. The attack was designed and propagated in such a ways that to thecommon user it would have been very difficult to judge the attack and prevent them from thescam (Paté‐Cornell et al., 2017). The email was made is such a way that it looked like theywere from a trusted contact of the user. The main notification that was circulated in the mail wasa Google Doc file. The overall aspect of the attack was to encrypt the files and in order todecrypt the files random was asked. It had affected some of the very critical areas the effect aswell as the after affect was considered as a huge mess in the history of cyber-attacks.Who were affected and how?The main target of the attack was the user of the Gmail account and its related services.People now a day are very much familiar with the concept of the internet and when it comes tomail related aspect the Gmail prospective is very much playing a vital role. The user of theGmail isaffected when they receive a mail from the attacker about sharing a Google doc filesapplication which would be helpful in managing the account of the user. If the user falls into thetrip it would gain access of the account and on the other hand the list of people in the contact listof the user would also be affected in the process and would be indirectly affected by the protocol.How was the attack carried out?As stated earlier the main target of the attack was the Gmail user. The attack was asophisticated phishing scam with the main intention of gaining access of the account of the user.
ITC595 - Information Security - Research Paper_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Information Security
|13
|2568
|146

Search the Web for News on Computer Security Breaches
|7
|2118
|43

Assignment on Cyber Scams 2022
|5
|769
|19

Social Engineering Attacks: Phishing Attacks
|11
|653
|328

University Semester.
|9
|2072
|54

Cybersecurity Threat Name of the Student
|11
|2321
|49