Question

Case Project 1-6: Preventing Attacks Select one of the recent attacks listed under Todays Security Attacks earlier in the ch
0 0
Add a comment Improve this question Transcribed image text
Answer #1

UK-based reseller Dixons Carphone suffers cyber attack on customer data

It is a British mobile phone retailer fall prey to the security attacks.

Where the card details of the customer has miss-used.

How the following principles can defend the attack on the customer data:

Layering:

It has multiple defences in preventing the data instead of having a single defence layer. More the layers more will be the security for our customer data.

Limiting:

None other people who are unauthorized are allowed to use our data at any cost of time or at any emergency period.

Other than database custom data maintainer no one has to access it.

Diversity:

As of layer each layer should have different type of security, that makes our security more complex, and it makes hacker a bit challenge.

Obscurity

The thing happening inside should not be known outside of the company.

Privacy policy has to be maintained very strictly.

Company’s secret has not been exposed outside, proper sleeper cells has to be kept to notice everyone.

Simplicity

Making much harder security will leaves the user in hardship. And they will feel lazy and leads to missing of any vulnerability in protection process.

If the above solution is helpful to you in any way please rate it Or if you have any concerns please comment it, I will help you through

Add a comment
Know the answer?
Add Answer to:
Case Project 1-6: Preventing Attacks Select one of the recent attacks listed under Today's Security Attacks...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Case project 1-6

    Select one of the recent attacks listed under Today’s Security Attacks earlier in the chapter. How could the attack been prevented if the five fundamental security principles—layering, limiting, diversity, obscurity, and simplicity—had been applied? Create a table that lists each of these security principles and how they could have been used to mitigate the attack. You may need to be creative in your thinking.

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Read “Instituionalizing our Demise: America vs Multiculturalism” by Roger Kimball on pg 268 and “Reinventing America”...

    Read “Instituionalizing our Demise: America vs Multiculturalism” by Roger Kimball on pg 268 and “Reinventing America” Call for a new national indentity” by Elizabeth Martinez on pg 275. Create a double entry notebook for each reading selection It should be atleast five observation and responses. wric 268 PART 2 essay pro. exactly how and why their authors disagree. Instead of with parties in conflict as mediators do, you will nt of view designed to appeal to both sides, mediatn posing...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT