logo

Security Assessment in Software Development

Write a report on privacy violations, including a description of reported incidents, discussion of privacy implications, and suggestions for handling privacy violations.

8 Pages1820 Words209 Views
   

Added on  2023-06-12

About This Document

This report discusses the privacy implications of a ransomware attack on Arkansas Oral facial Surgery center and how to avoid privacy violations in software development. It covers the reported incident, privacy implications, how to avoid privacy violations, and conclusion. The subject is software development and the course code is not mentioned. The college/university is not mentioned.

Security Assessment in Software Development

Write a report on privacy violations, including a description of reported incidents, discussion of privacy implications, and suggestions for handling privacy violations.

   Added on 2023-06-12

ShareRelated Documents
Running head: SECURITY ASSESSMENT IN SOFTWARE DEVELOPMENT
SECURITY ASSESSMENT IN SOFTWARE DEVELOPMENT
Name of the Student
Name of the University
Author Note
Security Assessment in Software Development_1
2SECURITY ASSESSMENT IN SOFTWARE DEVELOPMENT
Table of Contents
Introduction................................................................................................................................3
Reported incident.......................................................................................................................3
Privacy implication....................................................................................................................5
How do counties avoid the privacy violation?...........................................................................6
Conclusion..................................................................................................................................6
References..................................................................................................................................7
Security Assessment in Software Development_2
3SECURITY ASSESSMENT IN SOFTWARE DEVELOPMENT
Introduction
The article which is taken into consideration is the ransomware attack which
potentially impacted more than 128000 Arkansas patient. The main technological impact
which is majorly seen in the article is related to the ransomware (Sharma, Zawar and Patil
2016). The ransomware can be considered as a malicious software or a malware which ones
takes over computer can directly deny the access to important information or the data. After
the attack is generated the attackers demand a ransom from the victim not always truthful in
order to restore the access of the data upon the payment. The user of the organization is
shown steps how to pay the fee to get the key which can be used for the process of decryption
(Henseler and Loenhout 2018). The cost can range from few hundred dollars to thousand
which are payable through the cybercriminal currency which is the bit coin.
The main aim of the report is to take into consideration an article which is related to
privacy violation. The description of the privacy implication are widely discussed in the
report.
Reported incident
The Arkansas Oral facial Surgery center which is located in the Fayetteville had
experienced a ransomware attack that impacted up to 128000 patients. The concept of the
ransomware was installed in the network between the time period of July 25th and 26th 2017
(Sharma, Zawar and Patil 2016). The most important aspect which occurred in the event was
that it was detected in an early stage, although not before the images of the x-ray and
different other documents were encrypted. The incident did not result in the encryption of the
database but on the other hand encrypted a relatively limited set of the data of the patient
related to their recent visit encrypted. The data of the patient which was effected by the attack
Security Assessment in Software Development_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security Assignment Solved
|10
|2742
|144

Information Security and Governance: Part B Appendix
|5
|703
|59

Ransomware and Data Security: How Safe is Our Data?
|14
|3313
|491

Information Security | Task Report
|11
|2699
|24

Security Considerations
|5
|868
|265

Information Governance And Cyber Security
|11
|3243
|86