How do fake social media accounts breach

Assignment Help Other Subject
Reference no: EM132950053

LAB 1 - CIA and Identity Theft

Confidentiality, Integrity, Availability

Part 1
Within your organization, you have a server called Server1 that is running Windows Server 2008 R2. On Server1, you create and share a folder called Data on the C drive. Within the Data folder, you create a folder for each user within your organization. You then place each person's electronic paycheck in his or her folder. Later, you find out that John could go in and change some of the electronic paychecks and delete others.

Explain which of the CIA components was not followed in this scenario.
The CIA component fail was Integrity, because did not maintain the expected state of the information due to it was modifying for John.

Part 2

Is it a breach of confidentiality, integrity, or availability? Answer the following questions:
1. How did the 2017 Equifax exposure of 143 million records breach the CIA Triad?
Some hackers won access to systems by exploiting a website application vulnerability to gain access to certain files by software that had not to update on Equifax servers (Wikipedia, June 2021).

2. Downloading what appears to be a legitimate app, a user installs malware that contains keylogging software. What type of breach is the downloading of malware?
The type of malware is Spyware that infects the computer or network and steals information and any other valuable data, however not always is illegal software malware(Malwarebytes website)

3. An email phishing attack results in ransomware, in which the files and folders on a computer are encrypted. What type of breach is ransomware?
The ransomware is a form of malware that some files are encrypted and, the organization or person has to pay a ransom to retrieve access to the data(csoonline.com).

4. How do fake social media accounts breach the CIA Triad?

Confidentiality is a major flaw in social media safety, but depending on how you use the network, you may limit who sees your information. Spread propaganda and disinformation with some curiosity about the types of propaganda that are spread and how they are published on social media. Only a few times has the integrity and availability of the system been compromised.

Part 3
What is identity theft and how to avoid it? Check this link from the American's Federal Trade Commission about "Avoiding Identity Theft". Explore the information on the Federal Trade Commission's website and answer the following questions:
• What is identity theft? When someone stolen personal information about you without your permission (oxford language) .
• How to Avoid identity theft? It is unlike to find way to avoid becoming a victim of identity theft but there are, some steps to bring down the risk of being robbery: Safeguard Social Security number, Protect your mobile phone, create strong passwords and change them regularly (April 20, 2022, Experian).

Reference no: EM132950053

Questions Cloud

Business process re-engineering : Identify how an organization can use business process re-engineering to improve its business.
Timing and extent of substantive procedures : Explain how the information provided above would affect the nature, timing and extent of substantive procedures for occupancy revenue in situation (i) and purch
How can hedge the exposure using currency futures : Explain how you can hedge the above exposure using currency futures. The one- year forward rate is $0.12/¥. Show the example for one trapdoor.
Attacks to gain unauthorised access : Attacks to Gain Unauthorised Access - Briefly explain how attackers gain unauthorized access using these attack methods
How do fake social media accounts breach : How do fake social media accounts breach the CIA Triad and What is identity theft and how to avoid it? Check this link from the American's Federal Trade
What amount should the company charge : Costs of PI 52,000 were incurred in the registration of the patent. What amount should the company charge to patent amortization expense
What is the? project npv : This investment requires an initial outlay of ?$105,000 and will generate net cash inflows of ?$21,000 per year for 8 years. What is the? project NPV
Explain which of the CIA components was not followed : Explain which of the CIA components was not followed in this scenario. The CIA component fail was Integrity, because did not maintain the expected state
Develop an estimate of the appropriate materiality amount : Develop an estimate of the appropriate materiality amount of planning materiality for Tyler Co., and describe how you arrived at the estimate.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd