logo

Computer Security Breaches and Asynchronous I/O Activity

   

Added on  2023-04-23

12 Pages3325 Words116 Views
 | 
 | 
 | 
IT Write Up
Computer Security Breaches and Asynchronous I/O Activity_1

1 | P a g e
Table of Contents
Introduction...........................................................................................................................................2
Part A- Computer security breaches that occurred recently...................................................................2
Asynchronous I/O activity.....................................................................................................................5
Part 2- 2011 Sony PlayStation Network outage case.............................................................................6
Conclusion.............................................................................................................................................9
References...........................................................................................................................................10
Computer Security Breaches and Asynchronous I/O Activity_2

2 | P a g e
Introduction
This report is divided into two sections. The first part of report covers the discussion
of a recent security breach that occurred. The attack that is selected and discussed in this
report is Wannacry that took place in April 2017. The problem faced due to this attack along
with its solutions is discussed. The second part of the report covers a detail decision about the
sonly PlayStation network case. It is one of the biggest security breaches in the history. The
important components of the attack along with the protections measures have been discussed.
Part A- Computer security breaches that occurred recently
There are many computer security breaches that occurred during April-August 2015-
2018. In this section the attack that would be considered is WannaCry attack, it is a cyber-
attack that targets operating system. This attack has become viral in 2017 and the only motive
is to get unauthorised access so that they can earn money in the form of bit coin.
The problem faced due to this attack is it speeded at very high speed and is easily
transferrable from one computer to another. This attack hits the computer through emails and
downloads as viruses capture the system through theses means (Mattei, 2017). This attack
allowed access of information to unauthorised users. This attack occurred in May 2017 and
targeted computers to read the information and in return ask for money to release the
information.
This attack came with the motive to capture all the confidential data and could be
used in unauthentic ways. WannaCry attack captured data of many healthcare services and in
return asked for money at time of realising the information. This attack transferred from one
computer to another in a short span of time (Lallie, Debattista & Bal, 2018). This has
degraded brand image and broke the trust of customers. This attack unknowingly entered the
Computer Security Breaches and Asynchronous I/O Activity_3

3 | P a g e
system and then denied the access of valid user by asking payment from them to get the
access. This attack spread over the network by phishing attacks thus it is important to keep all
the files encrypted so that even if the file is accessed by unauthorised user the information is
not leaked. Some of the security tools like firewalls and software’s should be downloaded so
that information is not leaked.
This attack was first reported in Window system in Europe that outbreaks the
information of the system and has affected large number of organisations all over the world.
This attack mostly victim healthcare industry by delaying the operations and keeping the
patients wait for a longer time. Future, they earn money while re-establishing the information
(Mattei, 2017). Mostly the older based window systems are affected by the WannaCry attack.
This attack targets the sensitive file by encrypting them so that even authorised user
don’t get access to it. They target many file types like database, achieve files and other
documents s that valid user don’t get access to it (Lallie, Debattista & Bal, 2018). In return
they demand for bit coin from the victim to release the file. This causes a loss to an
organisation as these files future gets deleted.
This attack directly affects the computer by causing security flaws. It breaks the trust
and loyalty among customers due to loss of confidentiality and integrity. The unpatched
computers are easily affected by this attack thus it is suggested that various security measures
should be taken to secure the system.
The solution to overcome this issue is using strong firewalls and antiviruses so that
bugs are detected easily. This can be achieved by taking backups regularly so that system
doesn’t stop working. Apart from that, it is suggested that fake decryption file should be used
to claim the original files.
Computer Security Breaches and Asynchronous I/O Activity_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security - (Assignment)
|15
|2875
|18

IT Security: WannaCry Ransomware Attack
|12
|3038
|37

WannaCry Ransomware Attack Analysis
|10
|2248
|160

Security Breaches and Measures to Prevent Them
|12
|3310
|248

WannaCry Ransomware Attack Analysis
|12
|2472
|132

WannaCry Ransomware Attack: Impact, Process and Technicalities
|5
|1041
|61