This report is based on the concept of computer security breaches. Many cases of computer security breaches are encountered by computer users and these breaches put vulnerable impact on security, privacy and reliability of information that is stored into a computer system. In last three years, several security breaches have faced by computer users and some of those security breaches are considered in list of top ten security breaches of the year. There can be multiple reasons behind these security breaches but main issue is lack of prominent implementation of security and privacy techniques and policies at different workplaces. Through this report, we will try to exhibit a top security computer breach that has occurred in 2015 and this discussion will include some essential points such as what the problem was, how and why it occurred and what are potential solutions for this security breach.
Here we have case of data breach of company T-Mobile regarding sensitive information. This breach was occurred on September 15, 2015. Under this security breach lots of sensitive information of T-Mobile customers were stolen from database server that was housed in Experian firm. T-Mobile deals with Experian firm to process its credit applications and it is a world’s largest consumer credit monitoring firm. This security data breach was disclosed by Experian and data of some 15 million T-Mobile’s customers who applied for service with T-Mobile US Inc. has hacked. Experian firm discovered that an unauthorized party tried to access sensitive and confidential information from server of Experian. Now in next segment we will discuss about this problem in detail and also emphasize on solution of this problem.
The main problem is that network server of Experian was accessed in unauthorized way by a third party. According to investigation of Experian firm, this unauthorized party has accessed information of some organizations, personal information of individuals and data of consumers who applied for T-Mobile USA services. In this security breach, the information of Experian’s consumers and clients from credit database was not accessed. Therefore, in this case, Experian firm was not ensured and also it had not have any evidence that the information of T-Mobile has been used inappropriately by unauthorized party. As soon as it was detected that unauthorized access has occurred, they notified to law enforcement and a full investigation was initiated. With continuous investigation, it is found that some essential steps are necessary to implement (CNET, 2017).
According to analysis of Experian firm it is found that this is all happened by process of hacking. Through hacking, hackers took personal information of T-Mobile customers such as customer names, addresses, social security numbers and sensitive identification numbers such as driver’s license, passport number etc. In this way, by implementing these vulnerable activities this confidential information has accessed from Experian’s database server. This is all happened due to lack of security of Experian database and implementation of inappropriate security tools and policies. Besides this, proper monitoring process was also not implemented by Experian Firm. It was necessary to know about every single activity of database server of Experian Company. These are some main reasons that why this issue of data breaching has occurred (T-mobile.com, 2017).
After analyzing this whole case of security breach of T-Mobile Company, some solutions are found by company that are listed as below:
In this way, security breach of T-Mobile’s sensitive information will be controlled by Experian firm. Besides this, some security policy changes will also be implemented at management level for maintaining information security and privacy. These actions must be taken by business organizations that are facing security issues. The above discussed security problem of T-Mobile has put influence over performance of company.
This segment of report is about a popular web hack case. The purpose of this discussion is to know that what kind of hacking issues are encountered commonly and what are their major effects. Here we will discuss about hacking case of Anthem Company that was happened in 2015. This was a vulnerable case of security hacking. Now here we will discuss about this case in detail.
The breach of Anthem was revealed in month of February and it was exposed that 80 million records of patients and employees were affected by this. According to Anthem, the breach exposed personal information of patients and employees such as name, home addresses, social security numbers, health-care ID numbers, email addresses and information of employment etc. According to Anthem Company, the reason of this problem is improperly encryption of data and due to this lack of security confidential information of millions of people has hacked by hackers. Derusbi is used for implementing this process of hacking by hackers which is a family of malware and used for implementing vulnerable attacks. In Anthem breach it was a main part of attack (Network World, 2017).
The above discussed Anthem attack was so much vulnerable and the impact of this attack was also worst. Due to this attack, millions of customers of Anthem Company whose data were stored into database of company. Through this attack, hackers tried to access their personal information. Besides this, employees and clients of company are also affected due to this attack. All these people are influenced due to this breach attack because their stolen confidential information can be misused by hackers to access their bank accounts, company’s account and for other purposes. This may lead to financial and personal loss of these people. If Anthem company would have been securely encrypted its database then it had ensured that everything is secured. Due to this big issue, performance of company has also affected.
According to analysis of Anthem’s attack it is found that vulnerable type of malware was used here by hackers to conduct this security breach. As we have already discussed above that through Derusbi malware security attack has conducted. Derusbi backdoor was configured to communicate with malicious command and control. It is not easy to control effect of this kind of malware attack.
As we have discussed above this malware attack was so much vulnerable, so it is necessary that prevention process should also be solid. The developers and security experts of Anthem Company are finding new ways to get prevention from this attack. According to response of Anthem Company, they have learned many things from this attack. One thing is that we should not only rely on security parameters. The use of threat intelligence platform must be used which has potential to recognize malware activity on the behalf of multiple threat intelligence sources. This knowledge and awareness is an effective way to take appropriate security actions. Another ways to get protection from this type of vulnerable attacks are identity management, encryption of data and network access control.
These all are helpful to ensure that data is secured. Besides this, advanced and updated anti-virus must be installed into system that will help to scan each and every entity before enters into system. The fixing of bugs, malware attacks and another attacks of virus can be controlled by using anti-virus. The best way to keep system protective is to configure security patches into system and periodical update of security solutions (Forbes.com, 2017). Now it is responsibility of Anthem Company’s security professionals that they should take these actions in appropriate ways, otherwise heavy loss can be bore by company, its clients and customers.
Not only management of company and technical experts, but also employees of company should be careful about their systems and databases by using strong login credentials, so that no unauthorized person can access their information. In case of customers, company should clearly defined security policies to them, so that they can put their personal information carefully into company’s database. In case of Anthem Company, we would like to recommend that use of cryptography to encrypt their database at priority basis. Through cryptography chances of hacking and phishing attacks reduce and everyone can store data into system security and can also share this information over network (Nasr, 2017).
At last we conclude that the problem of security breaches is increasing day by day, so it is responsibility of security providers, developers and users that they should aware about common security issues and protect their data accordingly (Forbes.com, 2017).
References
CNET. (2017). Data breach hits roughly 15M T-Mobile customers, applicants. Retrieved 29 March 2017, from https://www.cnet.com/news/data-breach-snags-data-from-15m-t-mobile-customers/
T-mobile.com. (2017). CEO Responds To Experian Data Breach | T-Mobile. Retrieved 29 March 2017, from https://www.t-mobile.com/landing/experian-data-breach.html
Pagliery, J. (2017). T-Mobile customers’ info breached after Experian hack. CNNMoney. Retrieved 29 March 2017, from https://money.cnn.com/2015/10/01/technology/tmobile-experian-data-breach/
Yadron, T. (2017). T-Mobile Customers’ Information Compromised by Data Breach at Credit Agency. WSJ. Retrieved 29 March 2017, from https://www.wsj.com/articles/experian-data-breach-may-have-compromised-roughly-15-million-consumers-1443732359
Forbes.com. (2017). Forbes Welcome. Retrieved 29 March 2017, from https://www.forbes.com/sites/quora/2015/12/31/the-top-10-security-breaches-of-2015/6/#2c6d1b92377a
Network World. (2017). Biggest data breaches of 2015. Retrieved 29 March 2017, from https://www.networkworld.com/article/3011103/security/biggest-data-breaches-of-2015.html
Forbes.com. (2017). Forbes Welcome. Retrieved 29 March 2017, from https://www.forbes.com/sites/quora/2015/12/31/the-top-10-security-breaches-of-2015/9/#1a6e6362f78c
Nasr, R. (2017). More than 15M customers exposed in Experian hack. CNBC. Retrieved 29 March 2017, from https://www.cnbc.com/2015/10/01/experian-reports-data-breach-involving-info-for-more-than-15m-t-mobile-customers.html
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download