Report on Information Security

Added on -2020-02-19

| 10 pages| 2036 words| 86 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 3 of 10 pages

Running head: INFORMATION SECURITYINFORMATION SECURITYName of the StudentName of the UniversityAuthor Note
INFORMATION SECURITY2Table of ContentsPart A...............................................................................................................................................3Introduction......................................................................................................................................3How and why did the situation arise?..............................................................................................3Possible solution to the problem......................................................................................................3Conclusion.......................................................................................................................................5References........................................................................................................................................6Part B...............................................................................................................................................7What was the problem?...................................................................................................................7Who are affected and how...............................................................................................................7How as the attack carried out?.........................................................................................................8What could have been done to prevent the attack?..........................................................................9References......................................................................................................................................10
INFORMATION SECURITY3Part AIntroduction The report puts emphasis on a subsidiary of the California association of Realtor whichwas a real estate business service (REBS) provider (Marsh, 2017). The company was a victim ofthe data breach. The aspect of the breach was that the organizations online payment system wasmainly infected with a malware. This report puts direct emphasis on the different aspects of the attack and how the actualattack did was originated and what could have been the possible solution of the attack.How and why did the situation arise?The main situation arose when the users made an online payment with the help of thewebsite. During the transaction period or during the time frame personal information of the userwere copied by the malware and transmitted to a unknown third party user. The third person usermainly included the hacker who would directly use the information for their own benefit.Sensitive information that was accessed was mainly the user name, credit card or debit cardnumber, credit or debit card expiry date and credit card verification code (Alazab & Broadhurst,2017).Possible solution to the problemAll users who are involved in the online payment activity always want to access apayment gateway which is highly secured. The user always gave their personal information ofthe website which may include much sensitive information like credit card or debit card number,their expiry date as well as the verification code. Typically when a user uses the online payment

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Premium

$45

Q&A Library Access

Chat support

12

Document Unlocks

4

Answer Unlocks

Students who viewed this