MN502 Recent Attacks and Cryptography | Network Security Assignment Help

In-depth Review of Attack 1

1. Identification and discussion of main reason for success

Microsoft Security Shocker has exposed customer records that were worth 250 million (Forbes.com, 2019). The major reason for this attack being successful is due to the records not being protected or encrypted with password. If records are properly encrypted these type of applications would be prevailing in any major company that deals with millions of dollars worth of valuable customer data and information. The aspect of 14 years of customer support and customer service data in the form of logs getting exposed is highly harmful for the trust factor between customer and company.

2. Importance of key terms in Information Security

            In this particular attack strategy, the necessary analysis has been structured with the priority on operational encryption. The applied concept of encryption is related with presentation of various ciphers and hash values to convert a plaintext into encrypted text. The application of private and public keys is also required to be implemented for proper cryptographic security provision (Informationisbeautiful.net, 2020). It is only because the customer data were not protected with passwords, the operational consideration could not be implemented by Microsoft to stop all those records from getting exposed.

3. Analysis of preventive measures

            In this particular approach, the specific customer data that was collected by Microsoft from their customers needed to be secured through two specific procedures to eradicate such mishaps. The procedures are stated below as preventive measures:

  • In this structure, the customer data needed to be associated with encryption security for the operations. The application of public and private key based cryptographic encryption needs to be applied throughout structure of designing data accountability
  • The necessary designing and development of database backup was required to be associated throughout 14 years of Microsoft customer data application. The designing and management secure data backup would be essential to prevent loss from exposure

In-depth Review of Attack 2

1. Identification and discussion of main reason for success

            In this cyber attack, the loss of 275 million data records being exposed through the application of unsecured MongoDB database has been stated (Bleepingcomputer.com, 2019). The MongoDB database servers were not secured through strategic authentication security and valid data were exposed containing crucial personally information of Indian nationals like phone numbers and addresses. This type of data was highly required to be made secured through proper consideration of database management application security. As such security was not present; the application of such attack was successful henceforth.

2. Importance of key terms in Information Security

The aspect of data server operations and their vulnerability would be the most key term under determination. The applied strategy is required to be implemented through relevant systematic applications and their evaluation. The procedure of systematic consideration of data backup and secure administrative application has to be implemented. The cache data needs to be considered throughout the operative management and structural definition of the systems through applied judgment and development (Informationisbeautiful.net, 2020). The relative designing and implementation has been strategized through relevant logic of data processing and development required for maintaining such huge MongoDB database data through AWS hosting cloud operations.

3. Analysis of preventive measures

            In this particular approach, the specific customer data that was hosted by AWS taken from Indian customers needed to be secured through two specific procedures to eradicate such mishaps. The procedures are stated below as preventive measures:

  • The security of data structure needed to be operated through two specific layers of security and development. The MongoDB applications required applied data security and analysis. The AWS platform also required additional authentication security
  • The network server maintaining the data needed to be analyzed for vulnerabilities. The application of data security approach needed to be implemented with proper designing and structural use of restricted access control to stop the leak
 

 

References

Websites

Bleepingcomputer.com, 2019. Over 275 Million Records Exposed by Unsecured MongoDB Database. Retrieved from https://www.bleepingcomputer.com/news/security/over-275-million-records-exposed-by-unsecured-mongodb-database/ [27/07/2020]

Forbes.com, 2019. Microsoft Security Shocker As 250 Million Customer Records Exposed Online. Retrieved from https://www.forbes.com/sites/daveywinder/2020/01/22/microsoft-security-shocker-as-250-million-customer-records-exposed-online/#1d65b8f44d1b [27/07/2020]

Informationisbeautiful.net, 2020. World's Biggest Data Breaches & Hacks. Retrieved from https://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ [27/07/2020]

 

No Need To Pay Extra
  • Turnitin Report

    $10.00
  • Proofreading and Editing

    $9.00
    Per Page
  • Consultation with Expert

    $35.00
    Per Hour
  • Live Session 1-on-1

    $40.00
    Per 30 min.
  • Quality Check

    $25.00
  • Total

    Free

New Special Offer

Get 25% Off

best-assignment-experts-review

Call Back