Security Breaches 2017 Report || University Of Oklahoma

Added on - 01 Mar 2020

  • 11

    pages

  • 2433

    words

  • 9

    views

  • 0

    downloads

Showing pages 1 to 4 of 11 pages
Running head:CYBER ATTACK AND INFORMATION SECURITYCYBER ATTACK AND INFORMATION SECURITYName of the StudentName of the universityAuthor note
1CYBER ATTACK AND INFORMATION SECURITYTable of ContentsQuestion 1-Part A.......................................................................................................................2What was the problem?..............................................................................................................2Who were affected and how?.....................................................................................................2How was the attack carried out?................................................................................................3What could have been done to prevent the attack?....................................................................3Question 2-Part B.......................................................................................................................5What was the problem?..............................................................................................................5Who were affected and how?.....................................................................................................5How was the attack carried out?................................................................................................7What could have been done to prevent the attack?....................................................................7References..................................................................................................................................9
2CYBER ATTACK AND INFORMATION SECURITYQuestion 1-Part AWhat was the problem?One of the recent security breaches that is discussed in this discussion is the securitybreach at the university of Oklahoma on June 14, 2017(Gray, 2015). The university has adatabase regarding the student’s information which was leaked by chance from 2012.According to the federal law it was an act of serious violation. The campus file sharingsystem was first affected by the cyber attack. The vice president of the university wasinformed about the cyber attack by the OU daily which first rectified the security breach(Gao, Zhong& Mei, 2015). It is seen that the OU database was hacked and after getting theregarding information about the security breach the information technology department wasworking on it. The vice president also agreed about the security breach and theacknowledgement of the university information system department about it. The IT team iscontinuously working on the fact that people are claiming that they have downloaded thecontent from the university’s website. Another important fact regarding the data breaching isthat the IT team of the university had not found any particular evidence regarding the databreach. More than 29000 records were disclosed due to the security breach. Among that mostof the data was regarding the personal data of the students and also some official informationregarding the university(Federgreen& Sachs, 2015). Although it was unintentional accordingto the educational board and for that reason this incident is not considered as the violation ofthe federal funding of the university.Who were affected and how?Due to the cyber attack and the security breach the university and its student’sinformation was mostly affected. The number of the affected student who loosed theirinformation due to the security breach is more than 29000. Official data of the university as
3CYBER ATTACK AND INFORMATION SECURITYwell as personal data of the students both were affected due to the security breach(Kuo&Varki, 2014). The information contained personal data like personal details, financialstatus and their accounting details also in some cases. For this reason the level of the securitybreach was really high and the main website was immediately shut down by the universityauthority. If there was any violation of law due to the security breach, then the universitycould be affected in terms of the federal law.How was the attack carried out?According to some specialists who investigated the security breach, said that it was not anexternal attack. The main source of the cyber attack was initiated from the inside of theuniversity (Young, 2014). The chance for the organisation was created for the regulation ofthe organisational strength that cannot be hampered for the security breach. The informationtechnology department could not be able to monitor the fact that the organisation is beingattacked by such kind of threats (Ablon et al., 2016). Later the information technologydepartment of the organisation monitored that the source of the security breach is from insideand some individual made the files of the university public (Peltier, 2013). It is alreadyinformed to the university about the files that was to be opened to the public. It was also veryeasy for the users to access the files so that the organisations can access those contents easily.Anyone having login id of the university can also make the system more advantageous byaccessing the files.What could have been done to prevent the attack?Theuniversitycan follow the regulations which are discussed following for making thesecurity system of the university stronger and advanced.
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document