logo

Information Security : Report

6 Pages1099 Words169 Views
   

Central Washington University

   

Information Security (CMGT 441)

   

Added on  2020-02-24

About This Document

Every sphere relies heavily on a website's security component. The website's and the database's data should be kept operational and secure at all times. This essay clarifies the entire circumstance and covers the questions of how, why, and what alternative solutions there might have been. There are many tools that are available that can be used in order to safeguard a website - Netsparker, OpenVAS, and SecurityHeader.io.

Information Security : Report

   

Central Washington University

   

Information Security (CMGT 441)

   Added on 2020-02-24

ShareRelated Documents
Running head: INFORMATION SECURITYINFORMATION SECURITYName of the StudentName of the UniversityAuthor Note
Information Security : Report_1
2INFORMATION SECURITYTable of ContentsIntroduction......................................................................................................................................3How and why did the situation arise?..............................................................................................3Possible solution to the problem......................................................................................................3Conclusion.......................................................................................................................................5References........................................................................................................................................6
Information Security : Report_2
3INFORMATION SECURITYIntroduction The security aspect of any website plays a vital role in every sphere. The data involved inthe website as in the database should be kept secured and kept active all the time. America’s joblink is a web based portal that is mainly used by people to connect with organization in order toget a job. The company revealed that their system was hacked which actually lead to fault in thecode of application (Fennelly, 2016).This report puts lime light on the whole scenario and deals with the aspect that how andwhy the situation occurred and what could have been the possible solution.How and why did the situation arise?The website was formed in order to achieve jobs and help people to get job. Thecompany reported that the hacker was able to hack the website would immediately lead to faultin the application code of the website. The criminal was able to get all the personal informationof nearly 4.8 million job seekers which included mainly their full name, birth date and securitynumber related to social. The activity took place in the year 2017. The person who had given allthe related information before the attack was eventually lost and they had to again give theinformation in order get the proper intended result. The activity was uncovered in the ten statesthat mainly used the Americas job link system. Some of states that were in the list are Arkansas,Delaware, Idaho, Kansas, Oklahoma and Vermont (Fonseca & Rosen, 2017).Possible solution to the problem It can be noted that almost all the times it has been seen that majority of the websitesecurity breaches are mainly not done in order to get the data and use them for the personal
Information Security : Report_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
What Is Web Application Security and How Does It Work?
|9
|1856
|13

Critical Analysis of Yahoo's 2014 Data Breach
|5
|1125
|278

Prevention Methods for Network Security Risks
|1
|712
|95

Information Leakage in Cyber Security
|19
|1443
|65

Assignmnet On System Security - ITC595
|16
|2081
|46

Cyber Defense in Web Based Attacks Report 2022
|4
|728
|16