Identify a Major Breach Draft Identify a major breach of a virtualized environment that has occurred in the recent past (within the last five years). For your Portfolio Project Assignment, you will wr

Our papers are 100% unique and written following academic standards and provided requirements. Get perfect grades by consistently using our writing services. Place your order and get a quality paper today. Rely on us and be on schedule! With our help, you'll never have to worry about deadlines again. Take advantage of our current 20% discount by using the coupon code GET20


Order a Similar Paper Order a Different Paper

Identify a Major Breach Draft

Identify a major breach of a virtualized environment that has occurred in the recent past (within the last five years). For your Portfolio Project Assignment, you will write a critical evaluation of your chosen breach, and review and analyze the breach along the following dimensions:

  1. What went wrong?
  2. Why did it occur?
  3. Who was responsible?
  4. How could it have been prevented?
  5. What advice would you offer to prevent such a breach from occurring in the future?

For the purposes of this assignment, you will write the draft for the Portfolio Project.  Your outline should meet the following requirements:

  • Be approximately 4 pages in length, not including the cover page and reference page.
  • Your outline should include an introduction, a body, and a conclusion.
  • Cite a minimum of eight to 10 related sources—five of which should be academic peer-reviewed scholarly sources—to support your positions, claims, and observations, in addition to your textbook.r

Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Identify a Major Breach Draft Identify a major breach of a virtualized environment that has occurred in the recent past (within the last five years). For your Portfolio Project Assignment, you will wr
Outline: Breach in a Virtualized Environment Student’s Name Institutional Affiliation Professor Course Name and Number Date Outline: Breach in a Virtualized Environment Introduction Breaches can occur in any environment, whether physical or virtualized environments. Several factors contributed to the breach that occurred at Facebook. Therefore, understanding preventive measures could be an effective measure to curb the breaches. Breach in a Virtualized Environment One of the major breaches in a virtualized environment occurred when more than 540 million Facebook user records were publicly exposed on the Amazon cloud computing server (Silverstein, 2019; Rahmani et al., 2022; Li & Kumar, 2022; Yankson, 2022). What happened was that two-third party Facebook app developers posted the records in plain sight, which caused another major data breach on one of the world’s biggest social networking platforms. Therefore, the breach of the virtualized environment occurred because of an error made by the two-third party Facebook app developers when they posted the plain records in the eyes of the public. The two major parties responsible for the breach in the virtualized environment were Cultura Colectiva and At the Pool. Cultura Colectiva is a Mexican-based media company that helped to uncover the fact that approximately 146 gigabytes of Facebook user data (including account names, identities, comments to posts, and specific reactions to posts had been exposed by Cultura Colectiva (Silverstein, 2019). This caused the biggest leak. On the other hand, At the Pool is a separate app that was held responsible for exposing databases that contained data with information such as user IDs, photos, friends, location check-ins, and even unprotected passwords for about 22,000 users (Silverstein, 2019). The breach could have been prevented by conducting network monitoring. Network monitoring could have helped to monitor the network traffic and devices for threats, vulnerabilities, and suspicious activities. This could have helped to easily prevent the breach before more records were accessed by the cyberattackers. Checking audit reports regularly could have also helped to flag suspicious activity before and during the breach (Gabriel et al., 2018). This could have helped to prevent the breach. Most importantly, immediate action should have been taken after the alert was issued by UpGuard. The advice that I would have offered to prevent such a breach from occurring in the future would be to train and educate the employees and the users about the need for conducting password changes on a regular basis. I would require policies and procedures to be developed to stipulate password changes at least every three months where the users should not use the same password they had used before (Bhagavatula et al., 2020; Mayer et al., 2021). Conclusion In summary, the breach that occurred in the virtualized environment in the case of Facebook had serious repercussions. It led to the exposure of account names, identities, comments to posts, specific reactions to posts, IDs, photos, friends, location check-ins, and even unprotected passwords for about 22,000 users (Susukailo et al., 2022). However, measures such as network monitoring could have helped to prevent the breach. References Bhagavatula, S., Bauer, L., & Kapadia, A. (2020). (How) Do people change their passwords after a breach?. arXiv preprint arXiv:2010.09853. Gabriel, M. H., Noblin, A., Rutherford, A., Walden, A., & Cortelyou-Ward, K. (2018). Data breach locations, types, and associated characteristics among US hospitals. Am J Manag Care, 24(2), 78-84. Harnal, S., & Chauhan, R. K. (2020). Towards secure, flexible, and efficient role-based hospital’s cloud management system. A case study. EAI Endorsed Transactions on Pervasive Health and Technology, 6(23). Li, B., & Kumar, S. (2022). Managing Software‐as‐a‐Service: Pricing and operations. Production and Operations Management. Mayer, P., Zou, Y., Schaub, F., & Aviv, A. J. (2021). “Now I’m a bit {angry:}” Individuals’ Awareness, Perception, and Responses to Data Breaches that Affected Them. In 30th USENIX Security Symposium (USENIX Security 21) (pp. 393-410). Rahmani, M. K. I., Shuaib, M., Alam, S., Siddiqui, S. T., Ahmad, S., Bhatia, S., & Mashat, A. (2022). Blockchain-Based Trust Management Framework for Cloud computing-based Internet of Medical Things (IoMT). A Systematic Review. Computational Intelligence and Neuroscience, 2022. Silverstein, J. (2019, April 4). Hundreds of millions of Facebook user records were exposed on the Amazon cloud server [CBS News]. Retrieved from https://www.cbsnews.com/news/millions-facebook-user-records-exposed-amazon-cloud-server/ Susukailo, V., Opirsky, I., & Yaremko, O. (2022). Methodology of ISMS Establishment against Modern Cybersecurity Threats. In Future Intent-Based Networking (pp. 257-271). Springer, Cham. Yankson, B. (2022). Social Media Privacy Using EDEE Security Model. In International Conference on Cyber Warfare and Security (Vol. 17, No. 1, pp. 366-374).

Writerbay.net

We offer the best essay writing services to students who value great quality at a fair price. Let us exceed your expectations if you need help with this or a different assignment. Get your paper completed by a writing expert today. Nice to meet you! Want 15% OFF your first order? Use Promo Code: FIRST15. Place your order in a few easy steps. It will take you less than 5 minutes. Click one of the buttons below.


Order a Similar Paper Order a Different Paper