Analysis of Medicare Data Breach and WannaCry Ransomware Cyber Attacks

Verified

Added on  2020/02/19

|10
|2434
|304
Report
AI Summary
This report delves into two significant information security incidents: a Medicare data breach and the WannaCry ransomware cyberattack. Part A examines the Medicare data breach, exploring the issues, causes, and occurrence of the breach, as well as potential mitigation strategies such as limiting user access and adhering to ethical practices. Part B focuses on the WannaCry ransomware attack, detailing the issues, affected users, actions of the attack, and preventive measures like updated firewall security and IDS/IPS implementation. The report emphasizes the importance of information security, ethical behavior, and proactive measures in safeguarding data and systems against cyber threats. The analysis underscores the need for robust security protocols and continuous vigilance in the face of evolving cyber threats.
Document Page
Running head: INFORMATION SECURITY
Information Security
Name of the Student:
Student ID:
Name of the University:
Author’s note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION SECURITY
Table of Contents
Part A: Report on Medicare data breach..........................................................................................2
Introduction..................................................................................................................................2
1. Issues in the Scenario of data breach at Medicare...................................................................2
2. Causes of Security Breach in Medicare...................................................................................3
3. Occurrence of Data Breach at Medicare..................................................................................3
4. Possible Mitigation Strategies for data breach of Medicare....................................................3
Conclusion...................................................................................................................................4
Part B: WannaCry Ransomware Cyber Attack...............................................................................5
Introduction..................................................................................................................................5
1. Issues in the Scenario of WannaCry Ransomware attack.......................................................5
2. Affected Users from the WannaCry Ransomware attack........................................................6
3. Action of the WannaCry Ransomware Cyber Attack..............................................................7
4. Preventive Measures for the WannaCry Ransomware attack..................................................7
Conclusion...................................................................................................................................8
References........................................................................................................................................9
Document Page
2INFORMATION SECURITY
Part A: Report on Medicare data breach
Introduction
The information security had been developed for the analysis of the issues and errors in
the operation of the organization (Mohurle & Patil, 2017). The information security is a major
factor for implying the effective processing of the system allegation. The implementation of the
technology development would be very helpful for forming the effective system integration and
development of the operations.
The following report had been developed for implying the analysis of the scenario for
forming the evaluation of the security breach, occurrence of data breach, and developing some
possible mitigation strategies for the scenario. The integration of the development model would
tend to form the effective analysis of the data breach and security errors.
1. Issues in the Scenario of data breach at Medicare
The scenario would exemplify the issue of data breach within the organization and it
would result in occurrence of the data breach in Medicare. The Medicare data breach occurred
when the operations of the data breach has been concerned with the confusing and disappointing
system development (Theregister.co.uk, 2017). The Medicare data breach had occurred in
forming the issues of the sharing of the data related to the medical health of the patients to
others. The independent operations of the attack would tend to develop the exploitation of the
critical and confidential information regarding the patient’s information. The scenario had seen
the use of the technology for misusing the existing facilities and extract protected data from the
system database of Medicare. The information processing would tend to cease the information
processing in the organization. The implication of the security issues had resulted in forming the
errors and issues of the implementation of the proper system implication. The private and
Document Page
3INFORMATION SECURITY
confidential data of the Medicare were leaked by some who had access to the main database of
the Medicare (Coombs, 2017). The scenario had shown the issue of unethical behaviour and
unprofessional actions.
2. Causes of Security Breach in Medicare
The primary cause of the security breach was that the personal benefit of the person
trying to gain from the sharing of the medical details of the patient of Medicare to outsiders
(Baxendale et al., 2017). The person was trying to sell the details of the patients from the card
number of the Medicare to anyone ready to pay enough. The seller used the logo of Australian
Department of Human Services and the machine was named as Medicare machine. The
autonomous operations of the assault would have a tendency to build up the abuse of the basic
and secret data with respect to the patient's data. The data preparing would tend to stop the data
handling in the association. The ramifications of the security issues had brought about framing
the blunders and issues of the execution of the correct framework suggestion.
3. Occurrence of Data Breach at Medicare
As stated in Theregister.co.uk (2017), a person with the bone fide access to the
information of the Medicare would tend to develop the effective processing of the operations.
The person had endangered the privacy of the data of Medicare and made in available for other
persons. The development of the issues had been resulted due to the implication of the unethical
behaviour of the personal entity for the forming the personal benefit of the users. The data breach
has been resulted due to the personal benefit of the users in harming the development of the
operations. The person whose confidentiality of the Medicare data has been violated due to the
infiltration of the data privacy had to face the unethical scenario of occurrence of the data breach.
4. Possible Mitigation Strategies for data breach of Medicare
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4INFORMATION SECURITY
The data breach had been resulted due to the advent of the unethical influence of the
person for gaining personal benefit (Pascariu, Barbu & Bacivarov, 2017). The mitigation of the
issue can be implied for forming the effective development of the operations. The secured
operations would be implemented by the involvement of the effective and improved system
integration. The possible solution for the involvement of the ethnicity of the operations would be
mitigated by the conveyance of the effective operational processing. The best solutions for the
data breach are,
a. Confidential User Limitation: The limitation of the data access to only one or two
users would ensure that the data of the Medicare would be kept confidential. Moreover, the
authentication of the access could be more secured if for the access of the file more than on user
authentication is required. The implication of the more than one user authentication for access
would limit the possibility of accessing the data for misuse.
b. Follow Ethical Practices: The following of the ethical practices would be helpful for
ensuring that the activities of the people accessing the data at Medicare are oblate and secured.
The ethical practice would enable the users for monitoring the effective development of the
operations for ensuring that system integration would be helpful for keeping the privacy of the
data intact.
Conclusion
It can be concluded from the analysis of the scenario that the data breach is one of the
major issues of the contemporary IT technology and the development of organization. The
involvement of the operations would tend to improve those operational activities of the
operation. The involvement of the system development would help in critical evaluation of the
organization for system implication and improvement. The best solutions for the data breach are
Document Page
5INFORMATION SECURITY
limitation of the data access to only one or two users and following of the ethical practices for
ensuring that the activities of the people accessing the data at Medicare would be confidential
and private.
Part B: WannaCry Ransomware Cyber Attack
Introduction
WannaCry Ransomware is one of the most recent attacks of the IT world that had
influenced the security and privacy of the data and information related to the computer
operations (Mohurle & Patil, 2017). The development of the operations would be helpful for
considering the development of the operations. The WannaCry Ransomware was initiated by a
group named Shadow Brokers that have a track record of themselves for harming the security of
the information and forming the influence on the operations of the computer and network
devices.
The following report had covered the deployment of the effective and improved
functionalities of system integration of the effective development facilities for influencing the
involvement of the operations. The report would evaluate the WannaCry Ransomware attack and
the struggle of NHS or National Health Society for controlling the negative impact on the
operations of the IT and computer related devices. The attack would be analysed for providing
some preventive measures for the WannaCry Ransomware as it would help in preventing any
future agitation in the organization.
1. Issues in the Scenario of WannaCry Ransomware attack
The scenario had shown the advent of the cyber and IT technology bullying in the
organization due to the use of the effective processing and development (Collier, 2017). The
malware attack of WannaCry Ransomware had resulted in forming the issue of the processing of
Document Page
6INFORMATION SECURITY
the information. The malware attack had infected the online operations of the computer for
processing the user request and queries. The group had causes the issues of cyber threat last year
too by stealing a considerable amount of cache of cyber weapons. The National Security Agency
had to face the issue of deploying the effective flow of operations. The implication of the
WannaCry Ransomware attack was done for harming the flow of the operations of the computer
devices. The deployment of the effective flow of operations would tend to form the issues in
forming the effective flow of system operations (Pascariu, Barbu & Bacivarov, 2017). The basic
development of the operations would be resulted to form the inconvenient operations of the
organization. The malware attack would be resulted in forming the inconvenient delay of
operations. The National Security Agency needed to confront the issue of sending the compelling
stream of operations. The ramifications of the WannaCry Ransomware assault was improved the
situation hurting the stream of the operations of the PC gadgets (Mattei, 2017). The sending of
the powerful stream of operations would tend to frame the issues in shaping the successful
stream of framework operations. The essential advancement of the operations would be come
about to shape the badly designed operations of the association. The malware assault would be
brought about shaping the badly arranged postponement of operations.
2. Affected Users from the WannaCry Ransomware attack
The affected users for the WannaCry Ransomware attack have included the whole of
internet network processing (O'Gorman & McDonald, 2012). The implementation of the
effective processing would help in integrating the effective development of the operations. The
affected users for the project are the improvement of the operations. The employment of the
system development would help in forming the effective flow of operations. However, the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7INFORMATION SECURITY
WannaCry Ransomware attack had formed the threat for attacking the software by malicious
infection that result in forming the issues in operations of the organization.
3. Action of the WannaCry Ransomware Cyber Attack
The cyber attack of WannaCry Ransomware attack included the deployment of the
effective flow of operations that result in forming the issues in system development and
supplementary operations. The attack of WannaCry Ransomware acts by corrupting the files and
then demanding a sum of $300 valued cryptography Bitcoin and it would result in forming
anxiety among the users (Martin, Kinross & Hankin, 2017). The attackers have even added a
stipulation that after a certain time the threat amount would be increased. The malware email was
translated in 28 different languages and spread in the main Internet network. The attack had even
locked the users out of their computer devices.
4. Preventive Measures for the WannaCry Ransomware attack
The probability of WannaCry Ransomware attack can be reduced by implementing the
best solution by the implementation of the effective and smart security functions (O’ Dowd,
2017). The preventive measures include the use of effective processing and operations. The
preventive measures of the WannaCry Ransomware attack are,
Implementation of Updated Firewall Security: The implementation of the windows
firewall and updating it with improved processes would tend to form the effective flow of
operations. The updated firewall would help in controlling most of the activities of malware and
virus access in the system.
IDS/IPS implementation: The implementation of IDS/IPS would help in detecting any
unknown and mischievous activities within the network. The network configuration would be
Document Page
8INFORMATION SECURITY
eased by the deployment of the control strategies in the organization. The implementation factors
are helpful for forming the control of operations.
Conclusion
It can be concluded from the report that the WannaCry Ransomware attack had been
resulted due to the major flaw of operations of IT security. The implication of the security
functions would tend to implement the effective flow of operations. The The preventive
measures of the WannaCry Ransomware attack are Implementation of Updated Firewall Security
and IDS/IPS implementation. The development of the operations would help in integrating the
operations of the system and the development of the effective flow of operations in the system.
Document Page
9INFORMATION SECURITY
References
Mohurle, S., & Patil, M.(2017). A brief study of Wannacry Threat: Ransomware Attack
2017. International Journal, 8(5).
Collier, R. (2017). NHS ransomware attack spreads worldwide.
Pascariu, C., Barbu, I. D., & Bacivarov, I. C.(2017) Investigative Analysis and Technical
Overview of Ransomware Based Attacks. Case Study: WannaCry.
Mattei, T. A. (2017). Privacy, Confidentiality, and Security of Health Care Information: Lessons
from the Recent WannaCry Cyberattack. World Neurosurgery, 104, 972-974.
O'Gorman, G., & McDonald, G. (2012). Ransomware: A growing menace. Symantec
Corporation.
Martin, G., Kinross, J., & Hankin, C. (2017). Effective cybersecurity is fundamental to patient
safety.
O’Dowd, A. (2017). NHS patient data security is to be tightened after cyberattack.
Theregister.co.uk. (2017). Medicare data leaks, but who was breached?. [online] Available at:
https://www.theregister.co.uk/2017/07/04/medicare_data_leaks_but_who_was_breached/
Baxendale, R., Riordan, P., Baxendale, R. and Riordan, P. (2017). Cops called over Medicare
breach. [online] Theaustralian.com.au. Available at:
http://www.theaustralian.com.au/national-affairs/investigation-launched-into-medicare-
data-breach/news-story/77f7b7f54253f973654284552601fa3a [Accessed 3 Sep. 2017].
Coombs, B. (2017). New Anthem data breach by contractor affects more than 18,000 enrollees.
[online] CNBC. Available at: https://www.cnbc.com/2017/07/31/new-anthem-data-
breach-by-contractor-affects-more-than-18000-enrollees.html [Accessed 3 Sep. 2017].
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]