logo

Computer Security Breaches: Facebook Data Breach and 2011 PlayStation Network Outage

   

Added on  2023-04-23

11 Pages2860 Words385 Views
Running head: MITS 5004 IT SECURITY
MITS 5004 IT SECURITY ASSIGNMENT 2
Name of the Student
Name of the University
Author Note

1MITS 5004 IT SECURITY
Part A:
Question1
Introduction
The aim of this report is to describe about the computer security breaches took place.
One of the largest data breaches that took place in the year 2018 was Facebook data breach.
This took place in the month of January. Around 50 million user’s accounts of Facebook got
exposed. This became one of the major issues of the year("Rewind 2018: Data breaches,
privacy concerns rocked the tech boat with Facebook, Google as sailing masters", 2019).
Every credentials detail related to 50 million users got leaked. The report will discuss about
the reason of databreach and the problem faced by such a large organization. Apart from this
report will provide possible solution towards this incident.
About Facebook data breach
In the month of January around 50million users data got breached. The reason behind
this data breach was presence of flaw in the system. This allowed hackers to enter into the
system and leak the credential data of the users. The user’s data got exploited by the attacker
after getting the access towards their personal data. However the organization secured around
40 million additional accounts so that the hackers cannot breach their information("Rewind
2018: Data breaches, privacy concerns rocked the tech boat with Facebook, Google as
sailing masters", 2019). Attackers used Facebook developer APIs to gather the information
related to the user. The information included name, gender and address details that are being
updated in users profile. After analysing the data that got breached from Facebook it showed
that data related to private messages were being accessed by the hackers. However the
organization was not sure about the fact whether the hackers breached any information

2MITS 5004 IT SECURITY
related to credit card or not. Hackers used different sites to attract the users. The browser
were set with access tokens as soon as the users logged in with their Facebook account details
regarding to the users got breached. After investigation by the FBI it was addressed that
around 3 bugs led to the data exposure related to the users within Facebook. In the year 2017,
three vulnerabilities were identified by the Facebook that was faced at the time of video
uploader. As soon as this appeared on the system, a token got generated in response to this
that helped to view the person’s profile. This led the attackers to get into the account of the
users("Rewind 2018: Data breaches, privacy concerns rocked the tech boat with Facebook,
Google as sailing masters", 2019). The user’s needs to be careful about the information
stored. It is important to determine the vulnerability at early stage so that it does not affect
any user. It is also confirmed by Facebook that some small attacks attempted by hacker went
unnoticed and they were never being analysed before. It is important to understand the
problems at early stages. Organization such as Facebook needs to be more careful while
handling the situations as many peoples are associated with this organization.
Ways to protect Facebook Data breach
After analysing the incident it becomes important to ensure security towards the
information stored towards every users account. Facebook took some steps to protect their
user’s details. Facebook logged out 90 million accounts to ensure safety. In order to provide
proper help towards the users. Apart from this Facebook has initiated several other options to
check the number of devices that are being logged in with the same user name profile. In
order to prevent data breaches it is important to safeguard data stored in the system. Proper
procedures are needed to keep the system and site updated. With latest version the chances of
data breach will get reduced. The security software needs to maintain properly. Each
employee needs to be educated properly about the possible data breaches. The organization
needs to stop transmitting the data without encryption. The user needs to be careful while

3MITS 5004 IT SECURITY
using the Facebook. However the data breach needs to be understood properly. The user
needs to set proper an effective passwords that will protect the user’s data and will maintain
proper confidentiality towards the user’s data. Apart from this it is important to check on the
breaches and update towards the crime branch. Proper precaution measures are needed to
implement in time to protect further data breaches.
Conclusion
From the above report it can be stated that Facebook data breach was one of the major
data breaches that took place in the year 2018. This has affected the privacy and security
offered by Facebook. Large number of community people got affected by this data breach.
The report has included the way data got breached in the organization. The report has
provided a possible solution to avoid such conditions.
Question 2
Among the forms of input and output Asynchronous I/O is one. This type of operation
permits the other procedures to continue their operations before a transaction is completed.
The input output operations are generally slow on the computer systems (Jeong, Lee and Kim
2015). There are a lot of devices involved with the I/O operations and thus associates a lot of
physical movement with it. Hence, the use of asynchronous I/O operations is done so that this
time gap can be reduced to a great extent. For this type of operation the process that calls for
the I/O operation immediately regains control for execution after the completion of the I/O
operation. After the completion of the I/O operation the calling process will be notified by a
single Asynchronous I/O process (Studi et al. 2017). However, the process is a disadvantage
for the memory protection schemes such as the base/bounds and paging techniques. It is to be
noted that memory protection is very important for any type of operating systems for
ensuring that different process do not mix with each other.

End of preview

Want to access all the pages? Upload your documents or become a member.