INFO5301 Information Security Management of OU data Breach
Part A :
Part B :
- What was the problem?
- Who were affected and how?
- How was the attack carried out?
- What could have been done to prevent the attack?
Answers
Part A
Computer security breach in the University of Oklahoma
The Oklahoma Daily of the University of Oklahoma had discovered that there is a data breach to the university’s document sharing system in June 2017. The newspaper exposed that many educational old records were unintentionally exposed public and there were more than 29000 examples of such incidents. In these incidents, private information was exposed publically to the users of OU’s email system (Ablon et al., 2016). This sensitive information included financial information, grades and Social Security numbers.
Problems in OU’s Computer security
Lax security measures, as that allowed users of OU email to access the educational records in more depth including private information, which they should not be allowed to access. Thirty out of hundred documents were made public and discoverable on Microsoft Office Delve. All of these incidents make violation of the Family Education Rights and Privacy (FERPA), which states “students have complete control over who can access their records related to education (Zeide, 2015). LeRoy Rooker (FERPA expert) commented, “This isn’t even gray. It’s very clear in FERPA- you’ve got to have signed consent to do this or meet one of the exceptions to signed consent.” Anyone with OU email services within OU’s 365 Office system uses Delve; it is a Microsoft Office Service, which aims to learn about an individual and the people. With whom they are working with in order to show the documents on which the current work is going on, including other’s documents of work. Another aim of this service is to be intelligent by showing the information it thinks and individual would be interested in that topic. The files and information saved in the Microsoft Office Services shows them like One Drive and Share Point assuring the saved data is secure by a comment, “Yes, your documents are safe Delve never changes any permissions” (Qaisar, 2012). Only you can see your private documents in Delve.” During the breach, any user could have access to private files of any user with an additional option to download it.
Victims of OU data Breach
All the students of the institutions that comes under OU were affected by this data breach, as every student in the OU uses OU’s email service, Microsoft Office Service and Delve, whether an individual know or does not know about Delve, everyone was using it. This data breach put all the very personal files and information on the shake of all individual student of OU or might be several had become prey of this because there was download option as discussed earlier. This data breach also put the federal funding at the shake offered by the government, which may lead to several serious damages to the University’s management system (Watch, 2017). Without proper funding the university would not be able to provide students all the extra benefits including scholarship. This also led serious damage to the IT team managing these services as experienced person of FERPA said this mainly happened due to human errors, they had to do a lot of extra work in securing those files almost six days continuously.
How the attack was carried out?
As reported by the Daily of OU, IT of OU had reported that any outsider did not do this, whereas someone from inside had breached the server’s security and made all the sensitive information and data of students public to every users of OU email service (Branham, 2017). According to the IT department of OU, the files and information were save at the university’s server which could be accessed only by correct credentials used by any user using unique id. Delve was the medium for the hacker to enter the server, as earlier OU was using share point then it changed their server to Cloud Servers. This new implementation was completely secured, but there are possibilities of some human errors, which were neglected by the IT team of OU that led this situation happen. Using Cloud Server no doubt gave all users more facility to interact with the needed information but also open a window for such unauthorized hackers to enter the server and manipulate the data and information kept secure on that server. IT team had also not properly audit the whole system on regular basis, even the IT was seems to be involved in the situation after the news get published in the Daily newspaper of DU (Branham, 2017).
Preventive Measures (Possible Solutions)
Following preventive measures can be taken in order to stop such data breaches in future or can be applied in the system of OU, which could have stopped such unwanted incident:
- Provide proper training to the IT team.
- Encrypting the files saved in the server.
- There should be system that can detect if any intrusion happens or any unauthorized user is trying to access the server (Vacca, 2012).
- Data breaching can also be reduced by using techniques of content filtering on the files that are being saved in the server.
- Regular audit to the vulnerability that may cause damage to the data saved in the servers should be done in regular basis.
- Human error should be minimized at the extent level, as it cannot be extent completely (Xiao & Xiao, 2013).
- A monitoring system should be implemented in the system to monitor the activities of the insiders.
- Proper training to the users should be provided to aware them about how to keep personal credentials safe and not expose to anyone who can misuse that information.
- Creating an effective risk plan management can also help in eliminating such unwanted accident that can affect private or privacy risk of any user.
- Proper penalty should be introduced to the organization, which is not capable of securing collected data (Cismpa, 2012).
Part B
Ransomware Cyber Attack
There was an initiation of global cyber-attack between the duration 12th may to 15th may which was targeting the computers which were based on windows operating systems under the name Wanna-Cry ransomware. The mode of payment was asked by the Bit Coin Crypto currency (Young & Young, 2017). This attack was at global level that was affecting a mass number of computers, as reported first attack infected more than 230,000 computers in 150 countries. Many organizations suffered and blackmailed by this attack, which makes it a global concern (Swenson, 2017).
What was the problem?
This attack was generally initiated and taking place for money by the mode of blackmailing the users. In actual the malicious malware, which was attacking the system, generally encrypt the files saved in the system and ask for money in exchange for decrypting those files. At the starting, some Web security researchers found that the speed of attack could be reduced by registering a domain name, which was found out during research about the virus. After this slowing down process, updates of virus started being uploaded on the systems and again attack process was on (Kuner et al., 2017). Many of them found the way to decrypt the file without paying any ransom to the hackers but several were suffered a lot by this attack. However, the organization and individual operating old version of windows like, window XP and server 2003 were the first who were being affected by this ransomware attack. However, Microsoft launches new security patches for the users of system, which were running on Window 7 and Window 8 into the market including some emergency patches. The virus was introduced as network worm by the global ITs, which has the ability to transform and transport itself (Renaud, 2017).
Who were affected and how?
There were many victims of this attack including hospitals, federals and many more, which cannot be listed in a page, but the highly affected organizations can be listed as:
National Health Service, UK |
This ransomware attack forced the hospital to delay several surgeries; many appointments were cancelled, which resulted in a big mess for the organization of the hospital. |
US hospitals |
Uncountable numbers of hospitals became prey of this cyber-attack and many of them were broadcasting the delays and cancellation of appointments on the radiology machines (Mohurles & Patil, 2017). |
FedEx |
Many packages’ delivery was delayed, reporting that it was due to the ransomware cyber-attack. |
Nissan |
Nissan can be listed under least affected as when it hits first of the company, IT team was wise enough to shut down rest of the factory and stopped it from being spread to other factories. |
Russia |
The WannaCry ransomware attack also damages several telecom service providers in Russia, including, federals and railways. Systems damage was uncountable but the attack can be put in a mass destruction or damage. |
Indian Police |
In Andhra Pradesh (India), it was reported that this virus affected around 25% of the computers used by the police. Those systems were taken offline to prevent further loss. |
Universities of China |
It affected more than 100,000 computers of Chinese Universities, which was a very big number. The large size in number was because of the mega use of software from the black market. There were not any updates or anti-virus launched for such Operating Systems and bootlegged software. |
Chinese police |
This virus forced a station to go offline and affected the Chinese Public Security Bureau. |
Hitachi |
According to the Japanese organization, there was minimum loss to the assets, but Wannacry ransomware virus attacked the Hitachi. |
Renault |
Renault was also prey of this cyber-attack which no doubt had affected the systems of Renault. |
How was the attack carried out?
The attack was started at London on 12th may 2017 by injecting this virus into a system. This virus was in the form of compressed zip file, which needed some housekeeping on its part to be performed before it could be replicated over the network. A step included in the kill switch was the initiation by injecting it with a host computer and then a coding command to connect with obscure website. These steps were unnoticeable in the starting hours but were found out after some research in the form of coding, which was enough time for the virus to infect other computers connected to the same network. After rooting virus in the system, a command is executed to check the file sharing system of the computers that were infected. A software stolen by the Agency of US named ‘EternalBlue’ was the biggest tool for the hackers as it was stolen and sold out at black market which was almost leaked all over the internet. Several researcher ITs reported that virus was using ‘Ethernal Blue’ being exploited in the window system in order to gain access to the files and the system. After receiving the ransom amount, hackers used to install ‘DoublePulsar’ in the system and eliminate the copy of virus, which led the users again gain the access to their systems (Ehrenfeld, 2017).
What could have been done to prevent the attack?
Following steps can be taken to be safeguard from such ransomware virus attacks:
- By using updated original Operating systems.
- Updating the existed Operating System or keeping the system in auto update mode.
- Ware blocker software can be a better option, which will resist any of such viruses or malware to be installed in the system (Swenson, 2017).
- Operating System security patches should have been pre-installed in the system.
- User that started this event should not have installed the virus.
References
Ablon, L., Heaton, P., Lavery, D., & Romanosky, S. (2016). Data Theft Victims, and Their Response to Breach Notifications.
Branham, D. (2017). OU shuts down file sharing service after failing to protect thousands of students' records. [online] OU Daily. Available at: https://www.oudaily.com/news/ou-shuts-down-file-sharing-service-after-failing-to-protect/article_4f9a5e2c-50a2-11e7-a807-2f591e6c54f0.html [Accessed 22 Aug. 2017].
Ciampa, M. (2012). Security+ guide to network security fundamentals. Cengage Learning.
Ehrenfeld, J. M. (2017). WannaCry, Cybersecurity and Health Information Technology: A Time to Act. Journal of Medical Systems, 41(7), 104.
Kuner, C., Svantesson, D. J. B., H Cate, F., Lynskey, O., & Millard, C. (2017). The rise of cybersecurity and its impact on data protection. International Data Privacy Law, 7(2), 73-75.
Mohurle, S., & Patil, M. (2017). A brief study of Wannacry Threat: Ransomware Attack 2017. International Journal, 8(5).
Qaisar, E. J. (2012, March). Introduction to cloud computing for developers: Key concepts, the players and their offerings. In Information Technology Professional Conference (TCF Pro IT), 2012 IEEE TCF (pp. 1-6). IEEE.
Renaud, K. (2017). It makes you Wanna Cry.
Swenson, G. (2017). Bolstering Government Cybersecurity Lessons Learned from WannaCry.
Vacca, J. R. (2012). Computer and information security handbook. Newnes.
Watch, O. (2017). Security Breach at OU Exposes Thousands of Students’ Data. [online] Oklahoma Watch. Available at: https://oklahomawatch.org/2017/06/14/security-breach-at-ou-exposes-thousands-of-students-data/ [Accessed 22 Aug. 2017].
Xiao, Z., & Xiao, Y. (2013). Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials, 15(2), 843-859.
Young, A. L., & Yung, M. (2017). Cryptovirology: The birth, neglect, and explosion of ransomware. Communications of the ACM, 60(7), 24-26.
Zeide, E. (2015). Student Privacy Principles for the Age of Big Data: Moving Beyond FERPA and FIPPs. Drexel L. Rev., 8, 339.
Buy INFO5301 Information Security Management of OU data Breach Answers Online
Talk to our expert to get the help with INFO5301 Information Security Management of OU data Breach Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.
Get Online Support for INFO5301 Information Security Management of OU data Breach Assignment Help Online
Resources
- 24 x 7 Availability.
- Trained and Certified Experts.
- Deadline Guaranteed.
- Plagiarism Free.
- Privacy Guaranteed.
- Free download.
- Online help for all project.
- Homework Help Services
Resources
- 24 x 7 Availability.
- Trained and Certified Experts.
- Deadline Guaranteed.
- Plagiarism Free.
- Privacy Guaranteed.
- Free download.
- Online help for all project.
- Homework Help Services