logo

Report on Information Security

10 Pages2036 Words86 Views
   

Added on  2020-02-19

Report on Information Security

   Added on 2020-02-19

ShareRelated Documents
Running head: INFORMATION SECURITYINFORMATION SECURITYName of the StudentName of the UniversityAuthor Note
Report on Information Security_1
INFORMATION SECURITY2Table of ContentsPart A...............................................................................................................................................3Introduction......................................................................................................................................3How and why did the situation arise?..............................................................................................3Possible solution to the problem......................................................................................................3Conclusion.......................................................................................................................................5References........................................................................................................................................6Part B...............................................................................................................................................7What was the problem?...................................................................................................................7Who are affected and how...............................................................................................................7How as the attack carried out?.........................................................................................................8What could have been done to prevent the attack?..........................................................................9References......................................................................................................................................10
Report on Information Security_2
INFORMATION SECURITY3Part AIntroduction The report puts emphasis on a subsidiary of the California association of Realtor whichwas a real estate business service (REBS) provider (Marsh, 2017). The company was a victim ofthe data breach. The aspect of the breach was that the organizations online payment system wasmainly infected with a malware. This report puts direct emphasis on the different aspects of the attack and how the actualattack did was originated and what could have been the possible solution of the attack.How and why did the situation arise?The main situation arose when the users made an online payment with the help of thewebsite. During the transaction period or during the time frame personal information of the userwere copied by the malware and transmitted to a unknown third party user. The third person usermainly included the hacker who would directly use the information for their own benefit.Sensitive information that was accessed was mainly the user name, credit card or debit cardnumber, credit or debit card expiry date and credit card verification code (Alazab & Broadhurst,2017).Possible solution to the problemAll users who are involved in the online payment activity always want to access apayment gateway which is highly secured. The user always gave their personal information ofthe website which may include much sensitive information like credit card or debit card number,their expiry date as well as the verification code. Typically when a user uses the online payment
Report on Information Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Article | Cyber Attack on American Restaurant
|4
|710
|384

CJ 4472 - Cyber Security Breaches - Case Study
|9
|2593
|39

Assignment on Cyber Scams 2022
|5
|769
|19

Metabox Laptops Business Model Analysis
|14
|504
|51

Issue in POS Systems - Assignment
|3
|724
|290

Mobile Payments: A Comparison of Apple Pay and Google Pay
|9
|2153
|431