Research and find a publicized attack on an organization or company\'s IT system
ID: 3717886 • Letter: R
Question
Research and find a publicized attack on an organization or company's IT systems and provide the information requested below. Cite the references you use for your answer.
a. Briefly describe the incident, including what company or organization was involved, when the incident took place, and how the incident was categorized (in terms of the type of attack).
b. If there was data stolen or lost during the incident, when the incident occurred; the data effected, what sort of data; how sensitive was it; and how much data was stolen. If no data was stolen, what was the impact of the attack (service denied during the attack, etc.)?
c. Was the incident characterized as a technical attack on systems, an incident involving individual mismanagement, or a combination?
Explanation / Answer
Answer:
Client side security :
Client side safety measures agreement with the safety measures of the consumer Computer or Laptop or any other device through which the client is using. This stage comprises of the purchaser Personal Computer or Laptop and browser tools such as chrome, firefox, safari and the infrastructure connection to the web server. In this Client-side security issue, the following must be addressed.
Communications Security :
Communications safety for any e cart relevance wraps the safety of records that is propelled involving the client device and the e-cart web-server. This may comprise of confidential data like debit card information or website login id and passwords. It may also consist of private data that is sent from the web-server to the client PC/Laptop for instance purchaser documents. There is a single pragmatic way out to for this, i.e,data-encryption.
The majority of typical Web-browsers embrace to encrypt traffic to keep the data safe. Use of HTTPS is recommended relatively than HTTP. When HTTPS is deployed, a Secure Socket Layer (SSL) link is established involving the buyer and the web-server.
Server Protection:
The e-services related to any online shopping is deployed in web- server and hence safeguarding the web-server must be a top priority. The web-server deployed for an e-commerce must be available 24x7 from the Internet. Since the Internet is an open platform for all to access the web-server, the web-server is vulnerable to different kind of attacks on it. The following points play a major role for determining the server security.
Application Level Security:
The defense of the e-commerce application is a very important factor. The application comprises of step by step events right from the beginning of selecting of a product to making a checkout/payment. Any flaw in the application can cost the e-commerce business hazardously. The way to avoid the application layer flaws is to update the hardware and software configurations at a regular time.
Database Server Security Protection:
Database contains a lot of user details. The records of consumer are stored in the database may be classified and private info, hence entailing some discretion is necessary.A database associated with e-commerce may also contain the shipping details, transaction details, which if leaked may become threat to the consumers and e-commerce entities.
Internal Access Protection:
Staff/Workers of the business union have right of entry to the domestic site and as a result they have the capability to straightforwardly tamper with the system and data bypassing the firewall and Intrusion Detection System. To counter the internal attacks, the organization must frame proper guidelines with respect to the workers and staff for accessing the resources available at the worksite. Installation of internal firewall and checking the employer behavior/activity also plays a major role to counter the internal level access threats.
===============End of Answer====================
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.