logo

Identification of Security Breaches

2 Pages1667 Words355 Views
   

Added on  2020-12-30

Identification of Security Breaches

   Added on 2020-12-30

ShareRelated Documents
Wireless sensor network Abstract This assignment is based on the identification ofsecurity breaches due to the rise of cloud networks usage onvarious social networking sites like LinkedIn, Facebook etc. Ithas reflected on the aspects on the implementation of cloudnetwork technologies for overall enhancements of a website.However, it included about the exploitation of details of users bycriminal minded people who committed such cybercrime forpersonal profits.Keywords— data privacy, data storage management system,RSA (Random Sequence Algorithm), PII (Personally IdentifyingInformation)I.INTRODUCTION (HEADING 1)This particular paper will provide the insight of securitybreaches which arise due to cloud network and usage ofdifferent networking sites. The paper will reflect upon one ofthe latest case study about Facebook which faced problem likethat of data leakage of its millions of users. II.LITERATUREWith advent of several technological advancements,security breaches have become a menace for any organization'sreputation and credibility in the marketplaces. When Facebookfaced its first criticism in terms of data privacy, it becameevident that its interface is vulnerable to security threats andcompanies might use it to collect information of their users togain an upper hand. From the study of [1], cloud network isone of the essential tools for such social media platforms whichprovide access with the help of a third-party provider. Here, allthe networking resources get entrée using internet basedtechnologies. This has been proved as an issue for creating complexinteractions between the company's software and data storagemanagement system in context to use of digital keys,authentication and encryption. Along with this, the majorutilisation is an enhanced disaster recovery which assists inretrieving data during any compromises or crisis as per [2].There are also additional benefits such as maintenance of datathrough back up and storing files in more flexible andconvenient ways but despite having a bug bounty program,Facebook suffered due to lack of strong and secureinfrastructure [3]. Figure 1: Facebook data breachIII.BUSINESS CASEThe above case is time-lined on the data breach ofFacebook's accounts during the month of September in 2018.Their technical team monitored few discrepancies on theprovided interface. There were many cases that showednumber of unusual users' activities which directly reflected thathacking had been conducted and stole the data through thisorganized cybercrime. Additionally, it shed light on the accessto all the private information in context to personal details of auser like Birth-date, name, gender, mobile-number etc. [4]. Inthis context, Facebook logged out approximately ninety millionpeople out of their website, citing reasons that were shockingand essential to safeguard the overall security. In addition, the above scenario depicted the onset ofexecuting the operation's using the cloud storage. However, theside-effects that have been shown also brought wide attentionwhere privacy and confidentiality aspects in association withusers have been exploited. Along with, there was an uncertaindetermination on the extent of damage this issue has impactedon this company on the whole. It has been demonstrated thattheir profile were affected without any leakage of any creditcard information or unethical activities like stealing of data.IV.ANALYSISThis case study is based on the compromises and constantvulnerabilities of Facebook that has been plaguing thiscompany in the last couple of years. In this regard, fifty millionFacebook accounts had been hacked and termed under a newdata breach. Herein, Facebook's prominent feature “View As”had a bug which was vigorously exploited by the hackers. Thisfeature gave the user to check their profile page in similarterms when any new or existing contact would see. However,due to the presence of three bugs, this View as was corrupted
Identification of Security Breaches_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Privacy and Security Issues with Big Data: Challenges and Solutions
|17
|7279
|285

DATA BREACH. DATA BREACH Name of the Student Name of th
|4
|404
|217

Security Issues on Social Network Assignment
|25
|11335
|518

Security Issues on Social Networks
|42
|15288
|349

Data Security in Cloud Computing
|6
|874
|413

Introduction to Cloud Computing Introduction 3 Main Body3 Approaches: 5 Demonstration and Evaluation
|14
|5243
|273