The Oklahoma Daily of the University of Oklahoma had discovered that there is a data breach to the university’s document sharing system in June 2017. The newspaper exposed that many educational old records were unintentionally exposed public and there were more than 29000 examples of such incidents. In these incidents, private information was exposed publically to the users of OU’s email system (Ablon et al., 2016). This sensitive information included financial information, grades and Social Security numbers.
Lax security measures, as that allowed users of OU email to access the educational records in more depth including private information, which they should not be allowed to access. Thirty out of hundred documents were made public and discoverable on Microsoft Office Delve. All of these incidents make violation of the Family Education Rights and Privacy (FERPA), which states “students have complete control over who can access their records related to education (Zeide, 2015). LeRoy Rooker (FERPA expert) commented, “This isn’t even gray. It’s very clear in FERPA- you’ve got to have signed consent to do this or meet one of the exceptions to signed consent.” Anyone with OU email services within OU’s 365 Office system uses Delve; it is a Microsoft Office Service, which aims to learn about an individual and the people. With whom they are working with in order to show the documents on which the current work is going on, including other’s documents of work. Another aim of this service is to be intelligent by showing the information it thinks and individual would be interested in that topic. The files and information saved in the Microsoft Office Services shows them like One Drive and Share Point assuring the saved data is secure by a comment, “Yes, your documents are safe Delve never changes any permissions” (Qaisar, 2012). Only you can see your private documents in Delve.” During the breach, any user could have access to private files of any user with an additional option to download it.
All the students of the institutions that comes under OU were affected by this data breach, as every student in the OU uses OU’s email service, Microsoft Office Service and Delve, whether an individual know or does not know about Delve, everyone was using it. This data breach put all the very personal files and information on the shake of all individual student of OU or might be several had become prey of this because there was download option as discussed earlier. This data breach also put the federal funding at the shake offered by the government, which may lead to several serious damages to the University’s management system (Watch, 2017). Without proper funding the university would not be able to provide students all the extra benefits including scholarship. This also led serious damage to the IT team managing these services as experienced person of FERPA said this mainly happened due to human errors, they had to do a lot of extra work in securing those files almost six days continuously.
As reported by the Daily of OU, IT of OU had reported that any outsider did not do this, whereas someone from inside had breached the server’s security and made all the sensitive information and data of students public to every users of OU email service (Branham, 2017). According to the IT department of OU, the files and information were save at the university’s server which could be accessed only by correct credentials used by any user using unique id. Delve was the medium for the hacker to enter the server, as earlier OU was using share point then it changed their server to Cloud Servers. This new implementation was completely secured, but there are possibilities of some human errors, which were neglected by the IT team of OU that led this situation happen. Using Cloud Server no doubt gave all users more facility to interact with the needed information but also open a window for such unauthorized hackers to enter the server and manipulate the data and information kept secure on that server. IT team had also not properly audit the whole system on regular basis, even the IT was seems to be involved in the situation after the news get published in the Daily newspaper of DU (Branham, 2017).
Following preventive measures can be taken in order to stop such data breaches in future or can be applied in the system of OU, which could have stopped such unwanted incident:
There was an initiation of global cyber-attack between the duration 12th may to 15th may which was targeting the computers which were based on windows operating systems under the name Wanna-Cry ransomware. The mode of payment was asked by the Bit Coin Crypto currency (Young & Young, 2017). This attack was at global level that was affecting a mass number of computers, as reported first attack infected more than 230,000 computers in 150 countries. Many organizations suffered and blackmailed by this attack, which makes it a global concern (Swenson, 2017).
This attack was generally initiated and taking place for money by the mode of blackmailing the users. In actual the malicious malware, which was attacking the system, generally encrypt the files saved in the system and ask for money in exchange for decrypting those files. At the starting, some Web security researchers found that the speed of attack could be reduced by registering a domain name, which was found out during research about the virus. After this slowing down process, updates of virus started being uploaded on the systems and again attack process was on (Kuner et al., 2017). Many of them found the way to decrypt the file without paying any ransom to the hackers but several were suffered a lot by this attack. However, the organization and individual operating old version of windows like, window XP and server 2003 were the first who were being affected by this ransomware attack. However, Microsoft launches new security patches for the users of system, which were running on Window 7 and Window 8 into the market including some emergency patches. The virus was introduced as network worm by the global ITs, which has the ability to transform and transport itself (Renaud, 2017).
There were many victims of this attack including hospitals, federals and many more, which cannot be listed in a page, but the highly affected organizations can be listed as:
National Health Service, UK |
This ransomware attack forced the hospital to delay several surgeries; many appointments were cancelled, which resulted in a big mess for the organization of the hospital. |
US hospitals |
Uncountable numbers of hospitals became prey of this cyber-attack and many of them were broadcasting the delays and cancellation of appointments on the radiology machines (Mohurles & Patil, 2017). |
FedEx |
Many packages’ delivery was delayed, reporting that it was due to the ransomware cyber-attack. |
Nissan |
Nissan can be listed under least affected as when it hits first of the company, IT team was wise enough to shut down rest of the factory and stopped it from being spread to other factories. |
Russia |
The WannaCry ransomware attack also damages several telecom service providers in Russia, including, federals and railways. Systems damage was uncountable but the attack can be put in a mass destruction or damage. |
Indian Police |
In Andhra Pradesh (India), it was reported that this virus affected around 25% of the computers used by the police. Those systems were taken offline to prevent further loss. |
Universities of China |
It affected more than 100,000 computers of Chinese Universities, which was a very big number. The large size in number was because of the mega use of software from the black market. There were not any updates or anti-virus launched for such Operating Systems and bootlegged software. |
Chinese police |
This virus forced a station to go offline and affected the Chinese Public Security Bureau. |
Hitachi |
According to the Japanese organization, there was minimum loss to the assets, but Wannacry ransomware virus attacked the Hitachi. |
Renault |
Renault was also prey of this cyber-attack which no doubt had affected the systems of Renault. |
The attack was started at London on 12th may 2017 by injecting this virus into a system. This virus was in the form of compressed zip file, which needed some housekeeping on its part to be performed before it could be replicated over the network. A step included in the kill switch was the initiation by injecting it with a host computer and then a coding command to connect with obscure website. These steps were unnoticeable in the starting hours but were found out after some research in the form of coding, which was enough time for the virus to infect other computers connected to the same network. After rooting virus in the system, a command is executed to check the file sharing system of the computers that were infected. A software stolen by the Agency of US named ‘EternalBlue’ was the biggest tool for the hackers as it was stolen and sold out at black market which was almost leaked all over the internet. Several researcher ITs reported that virus was using ‘Ethernal Blue’ being exploited in the window system in order to gain access to the files and the system. After receiving the ransom amount, hackers used to install ‘DoublePulsar’ in the system and eliminate the copy of virus, which led the users again gain the access to their systems (Ehrenfeld, 2017).
Following steps can be taken to be safeguard from such ransomware virus attacks:
References
Ablon, L., Heaton, P., Lavery, D., & Romanosky, S. (2016). Data Theft Victims, and Their Response to Breach Notifications.
Branham, D. (2017). OU shuts down file sharing service after failing to protect thousands of students’ records. [online] OU Daily. Available at: https://www.oudaily.com/news/ou-shuts-down-file-sharing-service-after-failing-to-protect/article_4f9a5e2c-50a2-11e7-a807-2f591e6c54f0.html [Accessed 22 Aug. 2017].
Ciampa, M. (2012). Security+ guide to network security fundamentals. Cengage Learning.
Ehrenfeld, J. M. (2017). WannaCry, Cybersecurity and Health Information Technology: A Time to Act. Journal of Medical Systems, 41(7), 104.
Kuner, C., Svantesson, D. J. B., H Cate, F., Lynskey, O., & Millard, C. (2017). The rise of cybersecurity and its impact on data protection. International Data Privacy Law, 7(2), 73-75.
Mohurle, S., & Patil, M. (2017). A brief study of Wannacry Threat: Ransomware Attack 2017. International Journal, 8(5).
Qaisar, E. J. (2012, March). Introduction to cloud computing for developers: Key concepts, the players and their offerings. In Information Technology Professional Conference (TCF Pro IT), 2012 IEEE TCF (pp. 1-6). IEEE.
Renaud, K. (2017). It makes you Wanna Cry.
Swenson, G. (2017). Bolstering Government Cybersecurity Lessons Learned from WannaCry.
Vacca, J. R. (2012). Computer and information security handbook. Newnes.
Watch, O. (2017). Security Breach at OU Exposes Thousands of Students’ Data. [online] Oklahoma Watch. Available at: https://oklahomawatch.org/2017/06/14/security-breach-at-ou-exposes-thousands-of-students-data/ [Accessed 22 Aug. 2017].
Xiao, Z., & Xiao, Y. (2013). Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials, 15(2), 843-859.
Young, A. L., & Yung, M. (2017). Cryptovirology: The birth, neglect, and explosion of ransomware. Communications of the ACM, 60(7), 24-26.
Zeide, E. (2015). Student Privacy Principles for the Age of Big Data: Moving Beyond FERPA and FIPPs. Drexel L. Rev., 8, 339.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download