Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Assignment on Describe in detail how the attacker made the breach. Specifically, how was the attacker able to get in and out of the system? What was the threat vector?

Category: Computer Sciences Paper Type: Assignment Writing Reference: APA Words: 900

The data breach is referred is an incident at where the information has been take n from the system in stolen way without any permission of the owner of the systems. Due to this process of breaches both combines either its small or large can be suffers. Here the problem is that how the breaches are made by the attackers (Bbc.com, 2018). The complete process is discuss below in order to explain the process in which attackers are involved to make the breaches. There are the three particular steps that are made to able the attackers in and out of the systems and these are;

Research of Data breaches

In this first phase; the picked target is selected by the attackers and they seeks weaknesses in order to exploiting the network, employees and systems. It requires research long hours for the part of the attackers. It also includes stalking of the social media profiles of employees in order to observe the infrastructure of the AMCA (Mohr, 2016).

Attack of Data breaches

In this phase; initial contacts are made by the attackers for measuring the scoped target weaknesses’ and it can be through social attack or network based. Two steps and process are includes in it’s by which the attackers can easily in and out from the system these are; network based attacks and social. Attacks.  

Exfiltrate of Data breaches

The attackers can easily extract the data after entering inside the network. This data is extracted from the network of the AMCA. Such kind of the data can be easily used cyber propaganda and blackmailing.   


The threat vectors is refereed as the particular routes and paths which can malicious attacks and it can take to get past of your defences even your networks. The email threat vectors is targeted by the targeted malicious attachments and phishing attacks (Isaca Org, 2019).

Explain what the attacker did during the breach.

During the breach the first of all the attackers’ research to finds out the particular weaknesses of the AMCA in order to enter in that AMCA for hacking their data. The process if this research is particularly attempted in order to observe and find out the weaknesses and after instigating the weakness the attackers enter this systems and starts to hack the data and this process is commonly occurs by those person who have complete knowledge about the systems and its lacking security. The attackers found out the various particular sources to stooling the data and in this process the particularly used the personal profiles of the employees for examples their social media profilers. The attackers targets the reputation of the AMCA for the perceived ‘betrayal of trust. The major part of the stolen information is financial losses relevant to the records victims and their customers are suffer from it. The attackers try to hack the data and secure information of the people (Oecd-ilibrary.org, 2019).        
Describe the effects of the attack on the various stakeholders. Be sure to include non-technical elements of the entire corporation (e.g., public relations, marketing, and/or sales).

There are the various ways in which the attacks are effected on the business and numerous stake holders. From all of these ways; the first one is; cost of protection;
The wallets must be put out by the companies that wants to save themselves from various online thieves. In order to identify the risk there are the various cost such as; to build safer and new operating procedures as well as the purchasing the of new hardware and software. The business that are engaged in the sensitive and complex operations needs consultancy of the cyber security in order to develop the effective customize solution. The attacks are affecting the stake holders by losing their sales (Anat Hovav, 2014).

 The business can business can be affected by the attackers in more than just financial ways. There are the numbers of the companies that are reducing their online stores out of concerns which cannot be adequately protected from the cyber theft. In addition the attacks impacts rely upon the stakeholders who are involved in this. The stake holders can be transitional in the case of the attacks hacking (Agrafiotis, 2018). For example; the hackers is one of the active stake holders; who has interest in the target AMCA for theft their data as well for the duration of the attack. The attacks are effected on the non-technical elements of the AMCA and stake holders (Lindsey, 2019).      

References of Data breaches

Agrafiotis, I. N. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. . Journal of Cybersecurity.

Anat Hovav, P. G. (2014). Describe the effects of the attack on the various stakeholders. Communications of the Association for Information Systems, 893-912.

Bbc.com. (2018). British Airways breach: How did hackers get in? Retrieved from https://www.bbc.com/news/technology-45446529

Isaca Org. (2019). Information Security Threat Vectors. Retrieved from https://www.isaca.org/chapters5/Virginia/Events/Documents/Past%20Pres%202011-03%20Threat%20Vectors.pdf

Lindsey, N. (2019). AMCA Healthcare Data Breach Could Set a New Precedent for Health IT Security. cpomagazine.

Mohr, A. (2016). 3 Ways Cyber-Crime Impacts Business. investopedia.

Oecd-ilibrary.org. (2019). Types of cyber incidents and losses . Retrieved from https://www.oecd-ilibrary.org/docserver/9789264282148-4-en.pdf?expires=1573622422&id=id&accname=guest&checksum=1B65E7A972E8BA04AF867F78A5B2B2B8

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Math Exam Success

ONLINE

Math Exam Success

1239 Orders Completed

Best Coursework Help

ONLINE

Best Coursework Help

1554 Orders Completed

Top Grade Tutor

ONLINE

Top Grade Tutor

11445 Orders Completed