Microsoft Word - CSE1ICB-Group Assignment3 2020 CSE1ICB Assignment 3 (worth 25%) Assignment 3 1. This assignment must be done in within the time given. 2. This assignment worth 25% overall mark for...

1 answer below »
i had attached my files


Microsoft Word - CSE1ICB-Group Assignment3 2020 CSE1ICB Assignment 3 (worth 25%) Assignment 3 1. This assignment must be done in within the time given. 2. This assignment worth 25% overall mark for this subject 3. It is important to clearly specify references in your work (You may use any referencing style, but need to be consistent throughout the document) Step 1: Read carefully “Disruption at the IT Service Provider Tieto” case study supplied on LMS Step 2: Please also read, top 12 data breaches in 2019 which is listed on the Security magazine website ( https://www.securitymagazine.com/articles/91366-the-top-12-data- breaches-of-2019) Step 3: Choose any ONE data breach from the top 12 list and answer the following questions. NOTE: you must do your own research to answer the following questions. Questions (use “Disruption at the IT Service Provider Tieto” case study as a guide) 1. Describe the background of the data breach (minimum of 500 words) (25 marks) 2. Give a timeline of events of the data breach (minimum of 500 words) (25 marks) 3. Explain Response for this data breach (minimum of 500 words) (25 marks) 4. What are the lessons learned/Final remarks for this data breach? (minimum of 500 words) (25 marks) Submission Due on 26TH may 2020 by 11.50 pm. Submission via Assignment 3 folder on LMS.
Answered Same DayMay 20, 2021CSE1ICBLa Trobe University

Answer To: Microsoft Word - CSE1ICB-Group Assignment3 2020 CSE1ICB Assignment 3 (worth 25%) Assignment 3 1....

Ritu answered on May 25 2021
139 Votes
Security Breach on April 2nd, 2019 with Facebook
         (
7
)
Security Breach on April 2nd, 2019 with Facebook
2020 CSE1ICB Assignment 3
5/22/2020
Student Name
Student ID
Contents
Background of the Data Breach    3
Timelines Events of the Data Breach    4
Response for this Data Breach    4
Lesson Learned from the Data Breach    5
References    7
Background of the Data Breach
In April 2019, Mark Zuckerberg was reported in the news for a
false reason. The latest addition to the recent failures included the publication of personal records of over 540 million Facebook users. Cyber security experts found data on a generally accessible database that is not secure.
In 2019, security break in the cloud was a remarkable time. This will continue with this pattern unless the organization makes a remarkable revision of the course. Gartner recently updated as well as completed the cloud security assessment. Up until 2025, 99% of the cloud security despair is a client's shortcoming. This is a soothing idea, but Gartner, in the same post, warned the danger he was misrepresenting the feelings of fear. The cloud is clearly the fate of a Web-based business, as well as with the evolution of this innovation, it can certainly be achieved by not only some of the defined steps that have been developed recently, but also by the touch of insight. On April 2, 2019, there was a security breach at Facebook. For a significant number of clients, the biggest appeal of Facebook is the application provided by the outsider. Who can oppose the Scrabble round with his friends from old secondary schools all over the country? In any case, these equal applications that use the customer can be a course to penetrate down into data. As a rule, these pariahs don't work with comparable security guidelines, just as they can locate the mutual data that remaining parts on the unbound server. The UpGuard Cyber Risk Group uncovered in its web post that a propelled media association working in Mexico has found in excess of 540 million records from Facebook customers that have been mistakenly distinguished for AWS servers. These records contain data that can be utilized to profile these customers in an extremely nitty gritty way, just as customer IDs, account names, just as notes.
The UpGuard Cyber Risk group would now be able to report that two more Facebook application datasets created by outsiders are presented to the open Internet. One is from the Mexican-based media organization Cultura Colectiva, which is 146 gigabytes, just as contains more than 540 million records, including subtleties, for example, remarks, likes, responses, account names, just as FB ID. This equivalent kind of assortment has as of late been a wellspring of concern, given the potential utilization of such information in a comparable brought together style (Chris, 2019).
We found that a different reinforcement from the Facebook coordination application titled "At the Pool" is likewise distributed to the open Internet through the Amazon S3 basin. This database reinforcement included sections, for example, fk_user_id, fb_user, fb_friends, fb_likes, fb_music, fb_movies, fb_books, fb_photos, fb_events, fb_groups, fb_checkins, fb_interests, just as secret phrase. The secret phrase is presumably for the At the Pool application, not the client's Facebook account; however it very well may be risky for clients who reuse a similar secret key across accounts.
At the Pool revelation isn't as extensive as the Cultura Colectiva informational index, yet it contains a plaintext (or unprotected) secret key for 22,000 clients. 2014 was no longer operational in the pool (here is the capture of the last web archive).
Timelines Events of the Data Breach
The first notification email was sent to Cultura Colectiva on January 10, 2019 for Cultura Colectiva data. The second notification email was sent on January 14.There was no response until today.
On February 1st, AWS sent a response to inform the bucket owner of the danger.
We sent an email to Amazon Web Services again because February 21st was patrolling as well as the data was not yet protected. On the same day, AWS responded by investigating more possible ways to handle the situation.
On the morning of April 3, 2019, Bloomberg reached Facebook for remarks, just as at last the database reinforcement in the AWS S3...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here