Answer the following questions: Part A: 1. Search the web for news on computer security breaches that occurred during April-August XXXXXXXXXXResearch one such reported incident. Prepare a report...

1 answer below »
subject is IT Security, need to answers all the following questions and all the instructions written in the assignment and plz read rational and read how do the assignment thankx


Answer the following questions: Part A: 1. Search the web for news on computer security breaches that occurred during April-August 2015-2018. Research one such reported incident. Prepare a report focusing on what the problem was, how and why it occurred and what are the possible solutions. Length: Around 800 words 2. Explain why asynchronous I/O activity a problem with many memory protection schemes is, including base/bounds and paging. Suggest a solution to the problem. Length: Around 600 words Part B: 3. Research the 2011 Sony PlayStation Network outage case on the web and prepare a report focusing on the following questions: • What was the problem? • Who were affected and how? • How was the attack carried out? • What could have been done to prevent the attack? Length: Around 900 words Rationale: This assessment task is based on the following topics discussed in the subject: the overview of Information security fundamentals, security threats, cryptography, malicious software and its countermeasures, operating system security and software security. The assessment task is aligned with the following learning outcomes of the subject: On successful completion of this subject, students will • be able to justify security goals and the importance of maintaining the secure computing environment against digital threats; • be able to explain the fundamental concepts of cryptographic algorithms; • be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats. • be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general-purpose operating system; Presentation: • You are recommended to write the answers in a word document and submit. You can also submit your document in pdf format as well. • Your answers to the questions should be precise but complete and informative. • Each question should be answered individually with the corresponding label to indicate the tasks completed e.g. Task 1 a. • A cover page must be included and should contain relevant identifying information.
Answered Same DayApr 19, 2021

Answer To: Answer the following questions: Part A: 1. Search the web for news on computer security breaches...

Kuldeep answered on Apr 24 2021
140 Votes
Security Breaches
(
4/22/2019
) (
Student Name:
Student ID:
) (
Security Breaches
)
Contents
PART –A -1    2
Hacking Case    2
The issue in 'Network City Hall Computers Hacked with Ransomware.'    2
How issue Arise    3
Possible solution    3
PART –A -2    5
Asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging    5
PART –B    6
y Play station Network Outage Case    6
References    10
PART –A -1
Hacking Case
On April 24
, 2017, a security breach occurred in the “Network City Hall computer was stolen by hackers”. The ransomware also hurts the Australian rest time of global organizations. Australians at DLA Piper's workplace advise customers to provide "safe global network events" and stop sending emails, such as cautious steps. A nearby novel reported that the PC in "Cadbury Chocolate Processing Factory" of the Intercontinental Company of Mondrel has already indicated the news of ransomware(Ali, Saleh & Ali, 2011).
The issue in 'Network City Hall Computers Hacked with Ransomware.'
The problem appeared about 12:30 pm. For a limited time, IT managers said diverse email servers are being attacked. Different government departments gradually declined, after which the mysterious NHS director said that "the message of bitcoin infection took off" began to win the PC screen again. They may accept information about the problem or may be able to use the data to support persuade individuals who handle monetary subsidies to provide more mindfulness in retaliation for cybersecurity. The Cybersecurity is not a speculative problem; these days indicate that it can die or live. We asked the police head office to report on the issues and information they viewed on their personal computers (Almashhadani, Kaiiali, Sezer&Okane, 2019). The problem is that when we break in and make computer keys, we cannot control who acquires them. Therefore, this kind of rupture is triggering a basic problem that we are talking about, that is, the NSA check is to ensure that the individual is still making a surprisingly mischievous, thus achieving greater weakness. Ransomware is a digital attack that attracts programmers to control the PC framework as well as make congested access to it, waiting for payment. The record reveals that the city is organized by RSA-2048 encryption, that encodes PC report files, such as Excel and Word records, picture records, and other records that run on the PC's work area. In the document, programmers clarify that PC cities can be opened through bitcoin payment electronic types, which are a typical automated type of payment that is tough to follow.
These securities undermine PCs that affect different governments, including the Department of Regional Transportation Office, and data related to GSWAN are affected, such as data; anyhow, the infection affects approximately 120 Personal Computers in a unique government office associated with GSWAN. Specific PCs in the internal system are limited and do not affect customers and administrations (Doerr, Hebbinghaus& Werth, 2015). Major digital attacks affecting the World Association of Spain's NHS as well as Telefonica. The product saw an email which was double processed based on sinless things. Once opened, it will encode the hard drive, making it tough to recover as well as get anything, such as recording music, photos anddocuments. The hacker mechanical component known as the Eternal Blue can use Microsoft Windows, which is the world-renowned work arrangement of PC, with easy access to all PCs. It is created by the NSA and accesses PC by through rivals and psychoactive countries.
How issue Arise
Programmers will test some of the weaknesses in using PC networks, and Gesner wishes PC owners to introduceor refreshanti-virus programming, programmingandfirmware, downloading scraps into the work frame and using presence of the mind. Digital packages are being blamed for hacking(Green, 2017).
Possible solution
This strange association stole the digital weapons of the National Security Agency, and the US groundbreaking army is a unit of knowledge. The hacker mechanical component known as the Eternal Blue can use Microsoft Windows, which is world-renowned work arrangement for PCs that provides easy access to all PCs. It was created by the NSA to access the PCs used by enemies and fear traffickers. Although digital scammers continue to adopt a unique approach to regulate this guarantee, anti-virus software is used to protect our machines, files and photos(Ji & Zheng, 2011). Through the inability of the Microsoft Windows framework, Ransom products cross-link in associations. This was determined with Wanna Cry; both are committed to using Eternal Blue's defense-free...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here