Question

1. Research recent computer security news articles. Choose one security event that occurred within the last...

1. Research recent computer security news articles. Choose one security event that occurred within the last 3 months.

2. Summarize the article in 4-5 complete sentences.

3. What could have been done to prevent this type of security breach?

4. How does this security article affect your daily use of technology? What security measures should you change to help protect yourself from this type of security breach?

5- Post the URLs of the sources that you use.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer 1

Hacking of bezos mobile phone.

Answer 2

Most latest event is hacking of Jeff bezos mobile. News is coming that it was hacked by saudi arabia using a single message sent by arab prince to bezos shared through whatsapp. Bezos's cyber security consultant said that atleast 6 gb data was leaked from the phone.

Answer 3

We can follow some steps-

1. Never open those links which come from unidentified sources and if we get one we should not share it further.

2. Don't give your personal details to any unknown. Keep your private details like phone number, account number etc. Within yourself and with your known ones only.

3. If you think you are hacked immediately contact police so that they get to know you aren't behind any crimes done by hacker.

4. Whenever you are dowloading something it should be from identified source because hacker can attach malicious files with your desired file , if you download from unidentified source.

Answer 4

After reading this article, i was shocked because it was the richest man's mobile which got hacked. Now i am more aware of these frauds. I never share my personal details with any unknown. I never open links from unidentified sources. I always download required applications from playstore only because they will be safe.

Lastly, i get my apps and system updated to remain safe from new threats.

Answer 5

  https://www.npr.org/2020/01/23/798630195/dont-be-like-jeff-bezos-here-s-how-to-keep-your-phone-safe-from-hackers

Add a comment
Know the answer?
Add Answer to:
1. Research recent computer security news articles. Choose one security event that occurred within the last...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • For this discussion, find a recent news story that details a breach in information security. The...

    For this discussion, find a recent news story that details a breach in information security. The breach could have occurred in a government organization or in a private company. Give a high-level summary to provide context to your peers (including a link to the article), then, in your posting, include the following: What kinds of policies would have helped to prevent this breach? Why would the policies you suggest help the organization? What can the organization do differently (in regards...

  • 1. Search the web for news on computer security breaches that occurred during April-August 2015-2018. Research...

    1. Search the web for news on computer security breaches that occurred during April-August 2015-2018. Research one such reported incident. Prepare a report focusing on what the problem was, how and why it occurred and what are the possible solutions.

  • 1. Open a new Microsoft Word document, and enter your answer to one of the prompts...

    1. Open a new Microsoft Word document, and enter your answer to one of the prompts below: a. Select two articles from the RSS feed, one that details a recent attack and one that explains a new stronger security technology or procedure. Summarize each article and include a concluding paragraph that explains how you as a security professional would use this information. b. Scan the articles that appeared over the last two weeks. Use those articles to create your own...

  • Current Event 1-Comparative Advantage The Current Events must be based on the economic topics dis...

    Current Event on Comparative Advantage 1-2 pages Please post/use citations Current Event 1-Comparative Advantage The Current Events must be based on the economic topics discussed within the Module (comparative advantage). See the rubric for specific points and require- ments. Your Current Event should include 5 terms. Terms should be used accurately within the text of your paper. To receive full points, terms must be highlighted, used appro- priately within the narrative, and not provided in a list of terms simply...

  • MGMT SS STATS, an umbrella body that facilitates and serves various Social Security Organizations...

    MGMT SS STATS, an umbrella body that facilitates and serves various Social Security Organizations/Departments within the Caribbean territories, stood poised to meet the needs of its stakeholders by launching an online database, located at www.SSDCI.gov. The database will provide members and the public with access to the full set of services that can (also) be initiated face to face; and it will provide managed, private, secure access to a repository of public and/or personal information. For example, insured persons accumulate...

  • Using the Internet, find a recent case in the news about business fraud (within the last...

    Using the Internet, find a recent case in the news about business fraud (within the last 18 months) that involved systems and/or information breach. Summarize the situation, identify the control issues that were compromised and discuss what could have been done to mitigate the loss. Please refer to the six questions on page 143 related to Case 5-1. Adapt those questions to your case in the news and they will serve as good guidance for your paper. To understand the...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e.,...

    Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e., utilitarian view, moral rights view, justice view, practical view) you feel are being used by both sides of the argument (i.e., for and against downloading) to justify their positions? High Court Enters File-Sharing Spat; Justices Must Determine Software Providers' Liability For Copyright Violations by Anne Marie Squeo. Wall Street Journal. (Eastern edition). New York, N.Y.: Mar 30, 2005. pg. A.2 WASHINGTON -- The Supreme...

  • I have an Assignment of Marketing Research on Climate Change. Where i have to take an...

    I have an Assignment of Marketing Research on Climate Change. Where i have to take an interview of an industry professional, which is done. I have all answer what he said, now i just need to analysis all answer into sub category which are as follow: - 1. Level of Concern of Professionals 2. Impacts on Industry 3. Awareness of Millennials' Knowledge 4. Attitudes Among Millennials If you think any other category could be included please add it. i have...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT