logo

Security Breach in the University of Oklahoma

   

Added on  2020-02-19

10 Pages2646 Words54 Views
Running head: COMPUER SECURITY BREACHES (2017)Computer Security Breaches (2017)Name of the StudentName of the UniversityAuthor Note

1COMPUTER SECURITY BREACHES (2017)Table of ContentsPart A.............................................................................................................................2Security Breach in the University of Oklahoma............................................................2What was the Problem?..........................................................................................2Who were affected?................................................................................................3How the Attack was carried out?...........................................................................3What could have been done to prevent the Attack?...............................................4Part B..............................................................................................................................4WannaCry Ransomware Cyber Attack......................................................................4What was the problem?..........................................................................................5Who were affected and how?.................................................................................5How was the attack carried out?............................................................................6What could have been done to prevent the attack?................................................7References......................................................................................................................8

2COMPUTER SECURITY BREACHES (2017)Part ASecurity Breach in the University of OklahomaIn June 2017, the newspaper of the University ‘The Daily’ reported it, that thesecurity of the University has been breached and very personal sensitive information relatedto the students and the Delve users have been exposed. This intrusion was made intentionally;and exposed the records of the students from 2002 to 2016, including the very personalinformation that was collected by the University. Delve was providing cloud storage andsharing system of the files to more than one user in order to improve the performance of thestudents (Ablon et al., 2016). Credentials were used to protect private information, but thisbreach removed all the barriers and allowed all the users to download those files.What was the Problem?Microsoft Office Delve was the portal provided for each individual of the OUUniversity whoever has OU email’s access. Lax security measures, which OU was using tosave the details of the Student including very personal information like medical record,grades, permanent address, bank account details and many more. These information weremade publicly by the intruder who was supposed to be an inside person (Branham, 2017).The Delve was well protected by unique credentials and it allows sharing file betweendifferent users, but ‘which file they want to share with whom’ was well protected by thewebsite as this system. By this intrusion, those files were exposed to every other user with anoption to download it. These activities violated the Family Education Rights and Privacy(FERPA) law that sates “students have complete control over who can access their recordsrelated to education” (Lopez, tsitouras & Azuma, 2012). This security was not breached for avery long time, but for hours, the Delve was allowing download option for the documents of

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security - Assignment On Cyber Attacks
|11
|2576
|51

IMT6011 - Information Security - Case Study of Two Scenario
|10
|2584
|36

Current Event in Cyber Crime
|6
|1024
|2

ISY2003 - Assignment on Cyber Attack ​​​​​​​And Information Security
|11
|2433
|119

Information Security : Assignment
|11
|2578
|35

Computer Security Breaches (2017) Name of the University Author
|10
|2520
|395