Wednesday, May 6, 2020
Computer Security Risk Management And Legal Issues
AT T Server Attack Bharath Reddy Aennam (1079250) New York Institute of technology Professor: Leo de Sousa INCS 618 - Computer Security Risk Management and Legal Issues 04th Oct 2015 Contents Abstract 4 Introduction: 5 Key Terms: 5 Risk: 5 Threat: 6 Encryption and Decryption 6 Encryption: 7 RISK MANAGEMENT FRAME WORK 7 Criteria: 8 IMPACT OF LOSS: 8 Brute force attack: 9 GOATSE SECURITY: 10 Conclusion 12 References 12 Abstract Day by Day cyber-crimes have becomes more more popular with dramatic increase in no of internet users. The Hackers are the persons responsible for this type of crime issues those type of typical people studies the weakness of a System as their advantage to make achieve his/herâ⬠¦show more contentâ⬠¦This was the foolish security mistake makes the firm to pay for the loss. The major threat created by the attackers was they Created an HTML document called anâ⬠I pad 3G account Slurpur (for code reference link is as follow https://gist.github.com/sneak/4127270) and hackers moved this code to the at t servers , the code was fabricated in order to dig the I pad Users E-mail address with their ICC-ID. The account Slurpur was designed with world more popular algorithm thatââ¬â¢s used decode the encrypted password called ââ¬Å"Brute Force Attackâ⬠.it is deployed against the servers by comparison process of ICC-ID with guessing ID, as a result it harvest the data ou t if the data is matched. This process is repeated randomly to steal the data of as many I pad users. Introduction: Before going to discuss an article we need to understand some Basics modules of network security and their risk. Network Security is one of the most important attribute for Every Business firm in the real world entity, in order to protect their capital investment of firm owner. Network is the word refereed as group of computers interconnected to each other to share the data or communication purpose. The data can be sent through wireless or wired through some protocols. Security is provided to every network nodes for some authentication purpose thatââ¬â¢s free from Attacks. Key Terms: â⬠¢ Security Issues â⬠¢ Threat â⬠¢ Risk â⬠¢ Risk
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.