$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Security Of Information That Is Stored Into Computer

tag 0 Download9 Pages 2,111 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT


1.Search the Web for news on Computer Security Breaches that Occurred during September-December 2015. Research one such Reported Incident. Prepare a Report Focusing on what the Problem was, how and why it occurred and what are the Possible Solutions.

2.Prepare a report focusing on the following questions:

• What was the problem?
• Who were affected and how?
• How was the attack carried out?
• What could have been done to prevent the attack?



The computer security breach is most vulnerable thing for security of information that is stored into computer. The computer security breach is carried out in form of different attacks such as virus attack, DDoS attack, hacking and phishing attack etc. The main objective to make this report is to discuss computer security breach that were popular in news in 2015. Besides this, a popular case of hacking will also be discussed here that was happened between 2012 and 2016.


In 2015, the popular news was about computer security breach of OPM i.e. Office of Personnel Management. OPM serves as Human Resource department of federal government and by this agency, records are submitted to all federal government employees. Besides this, security clearances are also issued by OPM to federal government.



A massive security breach was carried out by hackers in December for targeting records of workers of OPM. These hackers were working for Chinese military unit. According to US officials this hack-attacked was launched from China, but Beijing considered this irresponsible claim.  The OPM officials discovered that this computer security breach was an aggressive effort to upgrade the cyber security of OPM by using new tools. The information that is leaked in this security breach consists of records of training and performance reviews and job assignments of the employees. But in this stolen information, background checks and clearance investigations were not included. This computer security breach was biggest breach of US government employee data and it is also second big intrusion of OPM by China in 2015. In the report of iSight partners, it was mentioned that this breach can be linked to the same cyber-spying that was responsible for security breach of Anthem Company. On another side, FBI has its own views about this attack and according to them it is work of Chinese state-sponsored hackers. According to investigators’ report of this case, near about 21 million records were breached in this security breach and besides this, fingerprints of 5.6 million employees were also stolen (HackRead, 2017).

Reason of Occurrence

This problem was occurred by hack-attacked on OPM’s database to collect its confidential information. According to different information sources, China is considered responsible for this breaching act and it is not first time that US officials are blaming China for this type of computer security breaches (Greene, 2017). The main purpose of hackers to get essential information of OPM officials and to use this hacked data for conducting spear-phishing emails to silly recipients who clicked on affected links or attachments and hackers can easily access their information from targeted computers through this action of those recipients. The effect of this hack-attacked was so much vulnerable and due to this, most of the OPM workers were affected. It was a matter of trust of OPM workers on this agency. So it is responsibility of management of OPM to implement possible solutions to protect its database and computers (, 2017).

Potential Solutions for OPM Security Breach

It is stated by officials of OPM agency that they are making plans to contact all the affected workers to provide them offer for free credit monitoring and identity theft insurance for 18 months. Besides this, following possible solutions can be implemented to get protection from above discussed security issue (SearchSecurity, 2017).

  1. On the behalf of above collected information, first of all it is necessary for OPM to enhance its database security. If database will be secured properly then there will be very less chances that hacking problems will occur.
  2. The periodic scanning of database by using database scanning software such as McAfee, Oscanner etc. These software solutions are helpful enough to identify errors, bugs and entry of an unknown entity can be vulnerable for database. OPM security consultants should be aware about these solutions (com, 2017).
  3. The use of anti-virus in computer systems is also an effective way to control issues of security breaches. Anti-virus is useful for identifying virus into system and to fix it.
  4. The information that is stored into database should also be in encrypted format. Through encryption technique information can be stored into database in unreadable format that is harder for hackers to understand (Dark Reading, 2017).
  5. The database access should restricted for all employees or workers of OPM. Only authorized worker and administrator can access database if required (, 2017).

In this way, if OPM will be careful about maintenance and security of computer systems and databases, then computer security breaches can be controlled.

2.Hacking is common word for every computer user and everybody knows about its impacts on their system, databases and networks. Several cases of hacking have encountered by IT users. Among these several cases, some cases have become so much popular. Now in this segment of report, we will discuss a popular hacking case that was carried out between 2012 and 2016. The selected case of hacking was happened in Domino’s Pizza in 2014.


A hacking group of Rex Mundi held this hacking attack in Domino’s Pizza to exchange over Belgian and French customer records. The total number records were 600,000. In this exchange of personal data of customers such as their names, addresses, emails, phone numbers and even information about their favorite Pizza toppings, Mundi demanded $40,000 from the fast-food chain. If this exchange was not met, then it is threatened by hackers to publish this information online. Domino’s refused this exchange and also assured to its customers that their financial and backing information is still saved. The hacking group Rex Mundi had its Twitter account that is now suspended and data was also never revealed by hackers online. But it is hard to say that Domino’s accepted deal of hackers or not (Inquirer, suspension, Latest, & read, 2017).



The customers of Domino’s Pizza whose information was stored into database were highly affected due to this hacking attack. The personal information of customers was so confidential and they had given that to Domino’s with trust. The most worried thing was that when hacking group threatened to company about online publishing of customers’ information. If information would have been leaked over internet then it could be misused by anyone. Besides customers, employees of company were also affected because some of their official information was also stored in company’s database. This hacking attack was also vulnerable for reputation of company in market because after hack of huge amount of information, it was difficult for customers to trust Dominos’ again (Munson, 2017).

the attack carried out

This attack was carried by Rex Mundi hacking group by accessing database of Dominos’ Pizza in unauthorized way (Mail Online, 2017). To carry out this attack, hackers cracked database of Dominos’ Pizza and downloaded more than 600,000 records of dough-loving customers. The hacking group successfully cracked database of Domino’s, it means there is lack of security in database system of this company (Curtis, 2017).


The things that could have been done to prevent the attack

After this hacking attack, Domino’s suggested to its customers to change passwords after getting alert from company’s side in a particular period of time (Motherboard, 2017). Even it is also better that always different password should be used by users while accessing any new website. The reason for this is, hackers always try same combination of username and password from one site to another to track your activities. If users will use unique password then it will be difficult for them to access website easily. Other possible solutions that could have been used by Domino’s are listed as below (Moore, 2017):

  • Prefer to use Database Scanning Tools
  • Anti-Virus Installation into System
  • Restricted and Authorized Access to Database (Healthcare IT News, 2017)

Prefer to use Database Scanning Tools

In appropriate monitoring of database, scanning tools help a lot. To identify any inappropriate action in database, Dominos’ could have been used database scanning tools such as Oscanner, Kaspersky, McAfee etc. Through these tools, whole scanning of database could be done to identify issue and to resolve those issues. The periodic database scanning helps to prevent database from virus and malware attacks.

Anti-Virus Installation into System

There is no doubt that anti-virus is a good solution to identify virus from database or computer system. It also performs complete scanning of database and computer and provide result in total number of virus exist into computer. Once we got to know about total number of viruses and their locations, we can make appropriate action to remove these viruses. So, this is also an effective way that could have been adapt by Domino’s to get rid of problem of database cracking by hackers.


Restricted and Authorized Access to Database

The access of database should be very restricted, especially in cases where huge amount of data is stored into database like Domino’s. It is responsibility of administrator to set authorized access for users and without permission no one should be allowed to access database. The reason for this is, sometimes an employee of company steals confidential information and can pass it to hackers or can help hackers to hack company’s confidential information. In this case, tracking of every activity of every authorized person should be conducted by administrator and if in any case doubt occurs then must take strict action accordingly.

The main problem in hacking case of Domino’s Pizza is that security parameters and policies were not implemented properly. If above listed solutions will be implemented by this company then chances of hacking attacks will be reduced


After this whole discussion we conclude that the maintenance of security and privacy of information is job of security experts who have better knowledge that how data can be remained more secured in databases. So they should suggest management to implement these solutions quickly. They should aware employees of company about bad impacts of hacking attacks and computer security breaches and also order them to use all suggested security tools and techniques. The support of company’s management is also required. If we want to use databases, computer systems and network solutions at our workplaces then our first priority should be security and privacy of information that will be stored and transferred through these tools



Curtis, S. (2017). Domino's Pizza hackers demand £24k ransom. Retrieved 7 April 2017, from

Dark Reading. (2017). Attacks & Breaches News, Analysis, Discussion, & Community - Dark Reading. Retrieved 7 April 2017, from The Top 5 Most Brutal Cyber Attacks Of 2014 So Far. Retrieved 7 April 2017, from

Greene, T. (2017). Biggest data breaches of 2015. Network World. Retrieved 7 April 2017, from (2017). Security Breach. Retrieved 7 April 2017, from

HackRead. (2017). Top 15 Cyber Attacks and Security Breaches in 2015. (2017). Retrieved 7 April 2017, from

Healthcare IT News. (2017). 2015 healthcare security breaches. (2017). Retrieved 7 April 2017, from

Inquirer, T., suspension, D., Latest, I., & read, M. (2017). Domino's hackers fail to release customer data following Twitter suspension | TheINQUIRER. Retrieved 7 April 2017, from

Munson, L. (2017). Domino’s Pizza hacked, customer database held to ransom. Naked Security. Retrieved 7 April 2017, from

Moore, M. (2017). Domino's Pizza WARNING - why customers should change their passwords NOW. Retrieved 7 April 2017, from

Motherboard. (2017). Bug in Domino's Pizza App Allowed Hackers to Get Free Pizza for Life. Retrieved 7 April 2017, from

Mail Online. (2017). Hackers demand £24,000 from Domino's in return for stolen details. Retrieved 7 April 2017, from (2017). How To: Protect From SQL Injection in ASP.NET. Retrieved 7 April 2017, from

SearchSecurity. (2017). What is data breach? - Definition from Retrieved 7 April 2017, from  


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Security Of Information That Is Stored Into Computer . Retrieved from

"Security Of Information That Is Stored Into Computer ." My Assignment Help, 2018,

My Assignment Help (2018) Security Of Information That Is Stored Into Computer [Online]. Available from:
[Accessed 02 April 2020].

My Assignment Help. 'Security Of Information That Is Stored Into Computer ' (My Assignment Help, 2018) <> accessed 02 April 2020.

My Assignment Help. Security Of Information That Is Stored Into Computer [Internet]. My Assignment Help. 2018 [cited 02 April 2020]. Available from: is the perfect solution to render quality solution for all sort of academic issues. We have hired professionals from different fields of study to provide assistance with different subjects. We successfully have provided different types of assignment solutions on 100+ subjects. We have hired industry experts to deliver nursing assignment, hr assignment and finance assignment help. To offer quality content with IT assignments, we have hired IT professionals to render programming language assignment help and IT assignment help for other types of IT assignments as well.

Latest It Write Up Samples

MNG03218 Managing Information Systems 11

Download : 0 | Pages : 17

Answer: Introduction: ERP or the Enterprise Resource Planning generally refers to the system which acts as a silver bullet for each and every problem that are faced by various organizations. the implementation of the ERP system is generally associated with providing the organizations with offers related to the chances of re-engineering the business process along with helping in coordination of the systems that are located in different geographi...

Read More arrow

SIT763 Cyber Security Management

Download : 0 | Pages : 5

Answer: Security Risk Assessment Security Risks, Threats and Vulnerabilities The assessment of security risks would be based on the identification, assessment and implementation of the key controls of security within the various applications used by the industry. With the carrying out of the risk assessment within the organisation, it would be beneficial for performing a risk assessment [1]. This form of risk assessment would be able to supp...

Read More arrow

HI5019 Strategic Information System And Business Report

Download : 0 | Pages : 18

Answer: Introduction: Australian Plastic Fabricators is one of the dynamic plastic fabrication company which is located in Sydney’s city fringe and is one of the Greater West supplying acrylic shop fittings to Sydney retail and shop fitting businesses. The organization is also considered to be the one stop shop for meeting all the needs related to Acrylic. Without any kind of doubt this organization can be considered to be the market le...

Read More arrow

SIT182 Real World Practices For Cybersecurity Assignment

Download : 0 | Pages : 7

Answer: Introduction The main aim of this project to develop the crack some passwords on different levels of a website. The implementing the project we can used for the ten levels that are includes are cryptography, directory traversal, sql injection, malicious redirects, Burp suites, Nmap, session management, information gathering, reporting.Postings are refreshed day by day and are utilized to spread and encourage further web hacking. Pract...

Read More arrow

ISY3001 E-Business Fundamentals And Systems Management

Download : 0 | Pages : 14
  • Course Code: ISY3001
  • University: Australian Institute Of Higher Education
  • Country: Australia

Answer: Task A: The Concept of Business-To-Business (B2B) Model In this assignment, the Business-to-Business (B2B) model of e-commerce have been chosen. The B2B model of e-commerce business can be defined as the collaboration of more than two different business organisations based on performing several forms of business transactions. This scenario also depicts the involvement of businesses based within wholesalers, retailers or different manu...

Read More arrow

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

265 Order Completed

97% Response Time

Ken Campbell

MSc in Electrical Engineering

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

203 Order Completed

97% Response Time

Richard Alpert

PhD in Psychology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1692 Order Completed

98% Response Time

Alfred Dodd

PhD in Computer and Information Science with specialization in Database

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

93 Order Completed

100% Response Time

Jackson Mitchell

MiM (Masters in Management) in Supply Chain Management

New Jersey, United States

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

The assignment was return to me on time has to make corrections and adjustment myself but still made a good grade. thanks


User Id: 392946 - 02 Apr 2020


student rating student rating student rating student rating student rating

OMG this was totally better than expected and worth every penny!!! I suck at math so i\'m excited to see my grade!


User Id: 394019 - 02 Apr 2020


student rating student rating student rating student rating student rating

Very happy with work provided by My assignment Excellent work. Always with in deadline.


User Id: 228464 - 02 Apr 2020


student rating student rating student rating student rating student rating

Haven\'t get result yet but already feel like a great piece of writing, no disappoint.


User Id: 329158 - 02 Apr 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?