Ask a question from expert

Ask now

ISY2003 - Assignment on Cyber Attack ​​​​​​​And Information Security

11 Pages2433 Words119 Views
   

UNIVERSITY OF TECHNOLOGY SYDNEY

   

ISY2003 Information Security (ISY2003)

   

Added on  2020-03-02

About This Document

ISY2003 - Assignment on Cyber Attack And Information Security, the cyber attack and the security breach the university and its student's information were mostly affected. The number of the affected student who loosed their information due to the security breach is more than 29000. Official data of the university as well as personal data of the students both were affected due to the security breach. The information contained personal data like personal details, financial status, and accounting details also in some cases.

ISY2003 - Assignment on Cyber Attack ​​​​​​​And Information Security

   

UNIVERSITY OF TECHNOLOGY SYDNEY

   

ISY2003 Information Security (ISY2003)

   Added on 2020-03-02

BookmarkShareRelated Documents
Running head: CYBER ATTACK AND INFORMATION SECURITYCYBER ATTACK AND INFORMATION SECURITYName of the StudentName of the universityAuthor note
ISY2003 - Assignment on Cyber Attack ​​​​​​​And Information Security_1
1CYBER ATTACK AND INFORMATION SECURITYTable of ContentsQuestion 1-Part A.......................................................................................................................2What was the problem?..............................................................................................................2Who were affected and how?.....................................................................................................2How was the attack carried out?................................................................................................3What could have been done to prevent the attack?....................................................................3Question 2-Part B.......................................................................................................................5What was the problem?..............................................................................................................5Who were affected and how?.....................................................................................................5How was the attack carried out?................................................................................................7What could have been done to prevent the attack?....................................................................7References..................................................................................................................................9
ISY2003 - Assignment on Cyber Attack ​​​​​​​And Information Security_2
2CYBER ATTACK AND INFORMATION SECURITYQuestion 1-Part AWhat was the problem?One of the recent security breaches that is discussed in this discussion is the securitybreach at the university of Oklahoma on June 14, 2017 (Gray, 2015). The university has adatabase regarding the student’s information which was leaked by chance from 2012.According to the federal law it was an act of serious violation. The campus file sharingsystem was first affected by the cyber attack. The vice president of the university wasinformed about the cyber attack by the OU daily which first rectified the security breach(Gao, Zhong& Mei, 2015). It is seen that the OU database was hacked and after getting theregarding information about the security breach the information technology department wasworking on it. The vice president also agreed about the security breach and theacknowledgement of the university information system department about it. The IT team iscontinuously working on the fact that people are claiming that they have downloaded thecontent from the university’s website. Another important fact regarding the data breaching isthat the IT team of the university had not found any particular evidence regarding the databreach. More than 29000 records were disclosed due to the security breach. Among that mostof the data was regarding the personal data of the students and also some official informationregarding the university (Federgreen& Sachs, 2015). Although it was unintentional accordingto the educational board and for that reason this incident is not considered as the violation ofthe federal funding of the university.Who were affected and how?Due to the cyber attack and the security breach the university and its student’sinformation was mostly affected. The number of the affected student who loosed theirinformation due to the security breach is more than 29000. Official data of the university as
ISY2003 - Assignment on Cyber Attack ​​​​​​​And Information Security_3
3CYBER ATTACK AND INFORMATION SECURITYwell as personal data of the students both were affected due to the security breach(Kuo&Varki, 2014). The information contained personal data like personal details, financialstatus and their accounting details also in some cases. For this reason the level of the securitybreach was really high and the main website was immediately shut down by the universityauthority. If there was any violation of law due to the security breach, then the universitycould be affected in terms of the federal law.How was the attack carried out?According to some specialists who investigated the security breach, said that it was not anexternal attack. The main source of the cyber attack was initiated from the inside of theuniversity (Young, 2014). The chance for the organisation was created for the regulation ofthe organisational strength that cannot be hampered for the security breach. The informationtechnology department could not be able to monitor the fact that the organisation is beingattacked by such kind of threats (Ablon et al., 2016). Later the information technologydepartment of the organisation monitored that the source of the security breach is from insideand some individual made the files of the university public (Peltier, 2013). It is alreadyinformed to the university about the files that was to be opened to the public. It was also veryeasy for the users to access the files so that the organisations can access those contents easily.Anyone having login id of the university can also make the system more advantageous byaccessing the files.What could have been done to prevent the attack?The university can follow the regulations which are discussed following for making thesecurity system of the university stronger and advanced.
ISY2003 - Assignment on Cyber Attack ​​​​​​​And Information Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IMT6011 - Information Security - Case Study of Two Scenario
|10
|2584
|36

Information Security - Assignment On Cyber Attacks
|11
|2576
|51

Security Breach in the University of Oklahoma
|10
|2646
|54

Answers to a Question on the Data Breach in a University
|12
|2579
|228

Impact of Database Security Breaches
|5
|680
|32

Cyber Security Management: Case Study: Australian Red Cross Blood Service data breach: The value of good communications
|8
|1431
|372