country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Computer Security Breach And Hack

tag 0 Download6 Pages / 1,395 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss about the Computer Security Breach and Hack.
 
 

Answer:

Computer Security Breach

Security breaches are common occurrences in the present day scenario. There are numerous security violations that take place during the information exchange and transmission. One of the examples of such security breaches is the security attack at a Chinese firm named as VTech. The firm had to go through a devastating breach of its information security.

Overview of the Problem

It was in the year 2015 in November that security breach took place at VTech. The attackers in this security breach succeeded in the illegal stealing of more than 4.8 million users that were engaged with the firm. These records were associated with the personal data of the VTech users and customers that included kids and their parents. The more critical and sensitive information such as login data, credit card details and likewise however were kept secure (Carolina, 2015).

Attack Mode and Attack Type

The mode of attack that led to the breaching and stealing of data at VTech was SQL injection. It is a breach of security in which the attack is performed through the means of damage causing SQL statements. These are written by the attackers and the experts and are written with an aim to hamper the security of the information and the database in which the information is stored. In case of the VTech, this same attack and the ill-natured queries were used for access to the database and its contents.

There are a number of properties of information such as information availability, information integrity, and information confidentiality and information privacy. The attack that took place at VTech was primarily due to the inadequate and inefficient security measures and mechanisms that were adopted. Also, there were certain entry and access points that could easily be manipulated by the attackers with the means of SQL injection attack.  

Brief of Possible Solutions

With the expansion of information technology and information systems, there are numerous information security attacks that have been developed by the attackers. These attacks may have a low to extremely severe impact on the information and the users that are associated with it. It is because of this reason that the system experts came up with detection, prevention and control measures.

There are various steps and actions that VTech could have performed for avoiding the security breach that took place. Access management and identity management through advanced authentication techniques and artificial intelligent mechanisms could have prevented the attack from taking place. One of the prime reasons behind the occurrence of SQL injection attacks is the use of dynamic SQL. The database experts should have avoided the usage of the same and should have also promoted the use of parameterized queries (Tajpour, Ibrahim, & Masrom, 2011). Many of the security attacks along with SQL injection attacks are often created for a particular system or database version. It should be made sure that the versions are frequently updated to avoid any such cases. Also, it is of utmost importance to set the user roles and privileges correctly, failing which the access and authentication mechanisms will be of no use (Dehariya, Kumar, & Ahirwar, 2016). There are other measures that may also be used such as installation of firewalls, use of proxy server, installation of anti-malware packages and likewise (Kolhe & Adhikari, 2015).

With the advancement of technology, there are also a number of different automated tools that have been developed in order to put a check on the security attacks and the state of security associated with a system or the organization. These tools such as intrusion detection and prevention systems shall also be installed in the organizations to avoid the security risks from taking place (Zhang, 2011).

 

JPMorgan Chase Hack Case

Hacking of the information is a common practice that is given shape by the attackers and hackers all across the globe. These hack cases may have low to devastating impacts based on the information volume and category that is impacted. One such extremely severe case is associated with the security breach that took place at JPMorgan in the year 2014.

Overview of the Problem

The hackers succeeded in acquiring of the records of the users at JPMorgan that comprised of over 83 million user files and records. This data included the information of the households and also the small-scale organizations and businesses. The case was revealed in the year 2014 and it took a period of around one year to fully recover from the damage that it caused. The data that was stolen comprised of the personal information of the customers and also their demographic details (Leyden, 2014).

Affected Banks and Parties

It was not only JPMorgan that suffered adversely because of the hack case that took place. However, another eleven banks also had to face some serious troubles because of their association with the organization and the information of their users was also exposed. Some of these firms included Citibank, HSBC Holdings, Fidelity Group and many others (Kitten, 2015).

Mode and Type of Attack

Every organization believes to advance in terms of the technology that is implemented in its architecture. JPMorgan attempted to achieve the same by implementing multi-step authentication in its architecture for the enhancement of security. However, due to technical and operation defects by the network engineers and workers, there was one network server that was mistakenly left open-ended. This became the prime reasons of the breach that took place at the organization which was later revealed after much analysis.  

List of Applicable Countermeasures

With the expansion of information technology and information systems, there are numerous information security attacks that have been developed by the attackers. These attacks may have a low to extremely severe impact on the information and the users that are associated with it. It is because of this reason that the system experts came up with detection, prevention and control measures.

It was required by the top-level managers and network experts at JPMorgan to carry out parallel testing and verification activities to ensure that no such operational and technical error was present. Also, the employees must have been provided with the trainings to carry out validation and verification activities on their own during the development and implementation tasks.

Also, it is of utmost importance to set the user roles and privileges correctly, failing which the access and authentication mechanisms will be of no use. There are other measures that may also be used such as installation of firewalls, use of proxy server, installation of anti-malware packages and likewise (Bella, & Bistarelli, 2005).

With the advancement of technology, there are also a number of different automated tools that have been developed in order to put a check on the security attacks and the state of security associated with a system or the organization. These tools such as intrusion detection and prevention systems shall also be installed in the organizations to avoid the security risks from taking place.

It is essential for the organization to update and bring innovation in the security mechanisms that are adopted in their architecture and frameworks. The practice will ensure that the cases of hacking and other security breaches are avoided and prevented and would result in the enhancement of the security.

 

References

Bella, G., & Bistarelli, S. (2005). Information Assurance for security protocols. Computers & Security, 24(4), 322-333. https://dx.doi.org/10.1016/j.cose.2004.10.004

Carolina,. (2015). Hackers Steal Parents, Kids Data in a Massive Data Breach on Toy Manufacture. HackRead. Retrieved 05 April 2017, from https://www.hackread.com/hackers-steal-toy-store-parents-kids-data/

Dehariya, H., Kumar, P., & Ahirwar, M. (2016). A Survey on Detection and Prevention Techniques of SQL Injection Attacks. International Journal Of Computer Applications, 137(5), 9-15. https://dx.doi.org/10.5120/ijca2016908672

Kitten, T. (2015). Charges Announced in JPMorgan Chase Hack. Bankinfosecurity.com. Retrieved 05 April 2017, from https://www.bankinfosecurity.com/chase-hackers-indicted-a-8673

Kolhe, A., & Adhikari, P. (2014). Injection, Detection, Prevention of SQL Injection Attacks. International Journal Of Computer Applications, 87(7), 40-43. https://dx.doi.org/10.5120/15224-3739

Leyden, J. (2014). JPMorgan Chase mega-hack was a simple two-factor auth fail. Theregister.co.uk. Retrieved 05 April 2017, from https://www.theregister.co.uk/2014/12/23/jpmorgan_breach_probe_latest/

Tajpour, A., Ibrahim, S., & Masrom, M. (2011). SQL Injection Detection and Prevention Techniques. International Journal Of Advancements In Computing Technology, 3(7), 82-91. https://dx.doi.org/10.4156/ijact.vol3.issue7.11

Zhang, X. (2011). Discussion on the Detection and Prevention of SQL Injection. Advanced Materials Research, 287-290, 3047-3050. https://dx.doi.org/10.4028/www.scientific.net/amr.287-290.3047

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Computer Security Breach And Hack. Retrieved from https://myassignmenthelp.com/free-samples/computer-security-breach-and-hack.

"Computer Security Breach And Hack." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/computer-security-breach-and-hack.

My Assignment Help (2018) Computer Security Breach And Hack [Online]. Available from: https://myassignmenthelp.com/free-samples/computer-security-breach-and-hack
[Accessed 09 July 2020].

My Assignment Help. 'Computer Security Breach And Hack' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/computer-security-breach-and-hack> accessed 09 July 2020.

My Assignment Help. Computer Security Breach And Hack [Internet]. My Assignment Help. 2018 [cited 09 July 2020]. Available from: https://myassignmenthelp.com/free-samples/computer-security-breach-and-hack.


MyAssignmenthelp.com is the perfect solution to render quality solution for all sort of academic issues. We have hired professionals from different fields of study to provide assistance with different subjects. We successfully have provided different types of assignment solutions on 100+ subjects. We have hired industry experts to deliver nursing assignment, hr assignment and finance assignment help. To offer quality content with IT assignments, we have hired IT professionals to render programming language assignment help and IT assignment help for other types of IT assignments as well.

Latest It Write Up Samples

BUS5WB Data Warehousing And Big Data 2

Download : 0 | Pages : 2
  • Course Code: BUS5WB
  • University: La Trobe University
  • Country: Australia

Answer: Agile Data Warehouse Development Creation of data warehouse is multi quarter, monolithic and large effort subject to waterfall process. In modern age, that is no longer norm as several organizations are selecting to adopt more iterative and flexible design approach. With needs of business changing faster as well as new businesses requiring to adapt as well as leverage the inputs rapidly and concisely. Agile development approach is the...

Read More arrow Tags: Australia Bundoora 7 Data Warehousing and Big Data La Trobe University 

ITECH7401 Leadership In IT Project Management

Download : 0 | Pages : 3
  • Course Code: ITECH7401
  • University: Federation University
  • Country: Australia

Answer: Budget Estimate and Financial Analysis The Return on Investment (ROI) is 125.10%, which is higher than the required ROI of twenty-five per cent. Thus, the report concludes that this project will be beneficial Port Fairy Caravan and Camping Park Pty Ltd. Year 0 1 2 3 Total Inflows (Income) 0 90000 130000 150000 370000 Outflows (Expenses) -90000 -2000...

Read More arrow Tags: Australia Riverwood 7 Leadership in IT Project Management Federation University 

MAN6910 Business Process Management

Download : 0 | Pages : 5
  • Course Code: MAN6910
  • University: Edith Cowan University
  • Country: Australia

Answer: Issue register Name of issue Patient waiting too long to register Priority 2 Description When the patients visits the hospital, the new patients are required to be registered first for gaining the treatment in the hospital. Data and assumption Over 20% of the patients who are visiting the hospital are raising the issue of extensive waiting time and longer duration for which treatmen...

Read More arrow Tags: Australia Ashgrove 7 business process management Edith Cowan University 

ITC563 IT Management Issues

Download : 0 | Pages : 10
  • Course Code: ITC563
  • University: Charles Sturt University
  • Country: Australia

Answer: Introduction: In the current aspect the Globex Corporation is a big organization in Australia which has been formed due to the merging of two large regional business which are B T & Sons Farming Equipment and Riverina Precision Farming. Currently, the Globex Corporation is located in three different locations, which are the Albury, Wagga Wagga and Griffith. The Globex Corporation currently handles two types of businesses which are...

Read More arrow Tags: Australia 7 it management issues Charles Sturt University 

ENS2108 Mechanical Science

Download : 0 | Pages : 2
  • Course Code: ENS2108
  • University: Edith Cowan University
  • Country: Australia

Answer: Internet Invention to be commercialized for bringing to the Market Internet is considered as one of the biggest boons of technology and it provides knowledge of technological advancements to its users.  Internet is responsible for providing the most advanced and updated technological products and services to their users. This invention can be commercialized for bringing it to the market by inclusion of different products. One ...

Read More arrow Tags: Australia 7 Mechanical Science Edith Cowan University 
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,358,337

Orders

4.9/5

Overall Rating

5,081

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1758 Order Completed

99% Response Time

William Martinez

MS in Biology

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

2594 Order Completed

95% Response Time

Michael Johnson

Masters of MSc in Economics

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

154 Order Completed

97% Response Time

Harold Alderete

PhD in Economics

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

285 Order Completed

99% Response Time

Eugene Baranowski

MBA in Supply Chain

London, United Kingdom

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

perfect work from consultants and they have better knowledge to make assignments.

flag

User Id: 458046 - 09 Jul 2020

Australia

student rating student rating student rating student rating student rating

This is a well constructed essay, shows the expert actually did watch my video attachment and did a great job!!!

flag

User Id: 417511 - 09 Jul 2020

Australia

student rating student rating student rating student rating student rating

Thank you for being helpful. i appreciate your commitment. my professor is yet to grade the assignment

flag

User Id: 450271 - 09 Jul 2020

Australia

student rating student rating student rating student rating student rating

DID AWESOME WORK. NEVER BEEN MORE IMPRESSED WITH ALL THE HELP THE EXPERT GAVE ME AND MY ASSIGNMENT HELP. I WILL DEFINITELY BE COMING BACK FOR MORE IF NEEDED.

flag

User Id: 292731 - 09 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?