logo

IS Security and Risk Management based on Uber

   

Added on  2023-06-10

6 Pages1074 Words464 Views
 | 
 | 
 | 
Running head: IS SECURITY AND RISK MANAGEMENT BASED ON UBER
IS Security and Risk Management based on Uber
Name of the student
Name of the University
Author’s note
IS Security and Risk Management based on Uber_1

1IS SECURITY AND RISK MANAGEMENT BASED ON UBER
Table of Contents
1. Introduction..................................................................................................................................2
2. Discussion....................................................................................................................................2
2.1 Vulnerability of the Information Systems.............................................................................2
2.2 Effect of the Vulnerabilities on the Quality of the System....................................................3
3. Conclusion...................................................................................................................................4
4. References....................................................................................................................................5
IS Security and Risk Management based on Uber_2

2IS SECURITY AND RISK MANAGEMENT BASED ON UBER
1. Introduction
Uber is a ride based technology platform that mainly focuses on providing the best riding
experience of their customers. The application is mostly helpful for connecting with the riders
and their corresponding driver partners. The information systems that are used by Uber are
mainly used for the purpose of connecting the driver with the rider. These systems are also
designed in such a way for allowing the various operations within the business and the growth of
the organization. These information systems also help in analyzing the metrics of the rider and
driver in a proper manner (Peppard & Ward, 2016).
2. Discussion
2.1 Vulnerability of the Information Systems
In the context of information security, the vulnerability could be defined as a kind of
weakness that can be exploited by an attacker. This action is meant in order to perform some
form of unofficial actions within the computer system. Uber had also confronted a major form of
a data breach in the year 2016, in which the personal information of their drivers and riders were
compromised potentially (Lee, 2017).
In this form of the breach of data of the organization, the hackers had the potential to gain
access to the private information. This was made possible after the developers of the application
had uploaded the code to a repository website. This code was containing information about the
important credentials, which was being used by the hackers in order to log into distinct accounts
on the network of Uber. These kinds of sensitive data within the network were mainly hosted by
the servers of Amazon Web Service (AWS) (Laptev, Yosinski & Smyl, 2017).
IS Security and Risk Management based on Uber_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Impact on Transport Business: Uber
|10
|1845
|333

Computer Security Risk Management and Legal Issues - Uber Data Breach
|3
|840
|149

Uber Data Breach Analysis | IT Impact on Business
|8
|2535
|22

Project Selection Methods based on Uber Case Study
|11
|2620
|297

Data Breach and Memory Protection in Information Security
|12
|3163
|23

Security Plan Outline for Uber Cabs: Identity Management and Forensics Strategies
|4
|792
|393