Question

1. Search the web for news on computer security breaches that occurred during April-August 2015-2018. Research...

1. Search the web for news on computer security breaches that occurred during April-August 2015-2018. Research one such reported incident. Prepare a report focusing on what the problem was, how and why it occurred and what are the possible solutions.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Computer security breach incident reported to have occurred during April-August 2015-2018:
Google Plus or Google+ with 52.5 million and 500,000 records stolen in 2015 and 2018 and has been assumed any exposed data being publicly available. This happened between 2015 to March 2018, and from November 7 to November 13. Google Plus is a social network type of business. This business is run by Google, Inc.

What the problem was:
Private information of people, end users, home users, employees of different companies on their Google+ profiles, paying G Suite users, where the APIs let the developers view profile information not marked as public (private), including full names, email addresses, birth dates, age, gender, profile photos, places lived, job title, occupation, employer, and relationship status were compromised and exposed.

How it occurred:
It occurred because of poor security. A software glitch or malfunction caused Google exposing the personal profile data of 500,000 Google+ users. The second data breach affected 52.5 million users exposing information including names, email addresses, occupations, and ages. This happened between November 7th and November 13th.

Why it occurred:
It was due to a huge security lapse and specifically due to API failures. There was an issue in meeting users’ privacy expectations. It was due to a flaw in programming interfaces Google had made available to applications' developers that interacted with users’ Google+ profiles.

What possible solutions are:
Google decided to shut down Google+ social networking service to consumers for good. Google informed it resolved the issue and will contact those users whose information has been compromised. Google announced it would cut off API access to the product within the next 90 days. Google's decision was not to publicly disclose the glitch. They conducted a two-week test that was designed to measure the impact of the API bugs before they were fixed.

Add a comment
Know the answer?
Add Answer to:
1. Search the web for news on computer security breaches that occurred during April-August 2015-2018. Research...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. Research recent computer security news articles. Choose one security event that occurred within the last...

    1. Research recent computer security news articles. Choose one security event that occurred within the last 3 months. 2. Summarize the article in 4-5 complete sentences. 3. What could have been done to prevent this type of security breach? 4. How does this security article affect your daily use of technology? What security measures should you change to help protect yourself from this type of security breach? 5- Post the URLs of the sources that you use.

  • INSTRUCTIONS The web-based assignment for this unit considers social security. Over the next few decades, retiring...

    INSTRUCTIONS The web-based assignment for this unit considers social security. Over the next few decades, retiring baby boomers will increase outflows in the social security system. Will there be sufficient funds to keep social security going; and should it be kept going? The issue has become highly politicized, often obscuring facts about the system and limits to what we know about future economic data. In this Web Assignment, you look into Social Security currently and its possible need for reform....

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • By the end of this week, your Career Development Research paper rough draft is due.   To ensure you receive ample fee...

    By the end of this week, your Career Development Research paper rough draft is due.   To ensure you receive ample feedback on your draft as well as ideas to improve it, please post your draft to the discussion board this week. This will allow your classmates to offer ideas.   When you examine the drafts submitted by others, please comment on the following: 1) Is the thesis offered by the writer effective? Why/why not? 2) Do you notice any issues with...

  • haven't been able to afford medical care. A news organizetion randomly sampled 801 Americans from the...

    haven't been able to afford medical care. A news organizetion randomly sampled 801 Americans from the Pacific Northwest, of whom 305 reported that there had been times in the last year ISA report on hcalth care .n the US said that 28% of Americans have experienced times when they care. At a 05 level of significance does this when t indicate that this problem is more severe among people in our region? A, Test an appropriate hypothesis and state your...

  • CASE 14: BREACHING THE SECURITY OF AN INTERNET PATIENT PORTAL Major theme: IT security Background Information...

    CASE 14: BREACHING THE SECURITY OF AN INTERNET PATIENT PORTAL Major theme: IT security Background Information Kaiser Permanente is an integrated health delivery system that serves over eight million members in nine states and the District of Columbia. 1 In the late 1990s, Kaiser Permanente introduced an Internet patient portal, Kaiser Permanente Online (also known as KP Online). Members can use KP Online to request appointments, request prescription refills, obtain health care service information, seek clinical advice, and participate in...

  • Business Events and Transactions for August 2019: The following transactions that occurred during the first week...

    Business Events and Transactions for August 2019: The following transactions that occurred during the first week of August are to pay the outstanding liabilities from July 31" • August 1 Pay the July accrued interest to the bank. Also make a $40,000 payment on the bank note principal • August 5 Sunhurst Country Club, LLC paid its outstanding accrued July payroll of $7,000 plus an additional $1,000 for salaries incurred between August 1 and August 5. • August 7 Sunhurst...

  • Problem 7-27 activities would be reported on the 2018 statement of d. What amount of total...

    Problem 7-27 activities would be reported on the 2018 statement of d. What amount of total liabilities would be reported on the Dee J e. What amount of retained earnings would be reported on the December 31, 2018, balance f. What amount of cash flow from financing activities would be reported on the 20 cash flows? g. What amount of interest expense would be reported on the 2019 income statement? h. What amount of cash flows from operating activities would...

  • Peer Reviewer: Describe the problem in your own words. What is the scope? What is the...

    Peer Reviewer: Describe the problem in your own words. What is the scope? What is the severity? Is the problem statement objective? Explain why or why not. Describe the problem statement quality and provide one suggestion for improvement. How was the problem measured? Explain the derivation of the metric and the baseline and the unit of the metric. Make a comment on the quality of the metric used, providing one alternative or additional metric for the problem. List the factors...

  • 1. SANCHEZ COMPUTER CENTER During the month of November the following transactions occurred. a. Record the...

    1. SANCHEZ COMPUTER CENTER During the month of November the following transactions occurred. a. Record the following transactions in the general journal and post them to the general ledger. b. Prepare a trial balance as of November 30, 201X. Assume the following transactions: Nov. 1 Billed Vita Needle Company $6,800, invoice no. 12675, for services rendered. Nov. 3 Billed Accu Pac, Inc., $3,900, invoice no. 12676, for services rendered. Nov. 5 Purchased new shop benches for $1,400 on account from...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT