Limited-time discount for students! | Solutions starting at $6 each

ITC595 Information Security | Study

Added on - 01 Mar 2020

  • ITC595

    Course

  • 10

    Pages

  • 2567

    Words

  • 51

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 10 pages
Running head: INFORMATION SECURITYINFORMATION SECURITYName of the StudentName of the UniversityAuthor Note
2INFORMATION SECURITYTable of ContentsPart A...............................................................................................................................................3What was the problem?...............................................................................................................3Who were affected and how?......................................................................................................3How was the attack carried out?..................................................................................................3What could have been done to prevent the attack?......................................................................4References........................................................................................................................................6Part B...............................................................................................................................................7What was the problem?...............................................................................................................7Who were affected and how?......................................................................................................7How as the attack carried out?.....................................................................................................8What could have been done to prevent the attack?......................................................................9References......................................................................................................................................10
3INFORMATION SECURITYPart AWhat was the problem?Gmail users were the main target in this attack, which was done in a sophisticatedphishing scam that was seeking to gain the overall access of the account of the user with the helpof a third party application. The attack was designed and propagated in such a ways that to thecommon user it would have been very difficult to judge the attack and prevent them from thescam (Paté‐Cornell et al., 2017). The email was made is such a way that it looked like theywere from a trusted contact of the user. The main notification that was circulated in the mail wasa Google Doc file. The overall aspect of the attack was to encrypt the files and in order todecrypt the files random was asked. It had affected some of the very critical areas the effect aswell as the after affect was considered as a huge mess in the history of cyber-attacks.Who were affected and how?The main target of the attack was the user of the Gmail account and its related services.People now a day are very much familiar with the concept of the internet and when it comes tomail related aspect the Gmail prospective is very much playing a vital role. The user of theGmail isaffected when they receive a mail from the attacker about sharing a Google doc filesapplication which would be helpful in managing the account of the user. If the user falls into thetrip it would gain access of the account and on the other hand the list of people in the contact listof the user would also be affected in the process and would be indirectly affected by the protocol.How was the attack carried out?As stated earlier the main target of the attack was the Gmail user. The attack was asophisticated phishing scam with the main intention of gaining access of the account of the user.
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document