Computer Security Risk Management And Legal Issues

Better Essays

AT & T Server Attack
Bharath Reddy Aennam (1079250)
New York Institute of technology
Professor: Leo de Sousa
INCS 618 - Computer Security Risk Management and
Legal Issues
04th Oct 2015

Abstract 4
Introduction: 5
Key Terms: 5
Risk: 5
Threat: 6
Encryption and Decryption 6
Encryption: 7
Criteria: 8
Brute force attack: 9
Conclusion 12
References 12

Day by Day cyber-crimes have becomes more & more popular with dramatic increase in no of internet users. The Hackers are the persons responsible for this type of crime issues those type of typical people studies the weakness of a System as their advantage to make achieve his/her …show more content…

This was the foolish security mistake makes the firm to pay for the loss. The major threat created by the attackers was they Created an HTML document called an” I pad 3G account Slurpur (for code reference link is as follow and hackers moved this code to the at & t servers , the code was fabricated in order to dig the I pad Users E-mail address with their ICC-ID. The account Slurpur was designed with world more popular algorithm that’s used decode the encrypted password called “Brute Force Attack”.it is deployed against the servers by comparison process of ICC-ID with guessing ID, as a result it harvest the data out if the data is matched. This process is repeated randomly to steal the data of as many I pad users.

Before going to discuss an article we need to understand some Basics modules of network security and their risk. Network Security is one of the most important attribute for Every Business firm in the real world entity, in order to protect their capital investment of firm owner. Network is the word refereed as group of computers interconnected to each other to share the data or communication purpose. The data can be sent through wireless or wired through some protocols.
Security is provided to every network nodes for some authentication purpose that’s free from Attacks.
Key Terms:
• Security Issues
• Threat
• Risk
• Risk

Get Access