Professional Documents
Culture Documents
UNIVERSITY-BANGLADESH
Faculty of Business Administration
Assignment Title: Compare Data with a Hash & What was Taken
Assignment No: 1 Date of Submission:
Course Title: Internet Security (MIS)
Course Code: 01052 Section: A
Semester: Fall 2020 Course Teacher: DANILO G. MORGIA
* Student(s) must complete all details except the faculty use part.
** Please submit all assignments to your course teacher or the office of the concerned teacher.
Marks Obtained
Total Marks
STEP 1 STEP 2
My surname is SULTANA My title name is SULTANA
13f339050149ae7350b1d85a2b40f018 ddec567dfb84b74d5b71d26ddb583634
STEP 3
Notice that many of the hash types create a hash of a different length. Why?
Answer: A long length hash can provide more security.
Hash bits differ in length due to specified algorithms so any collision can be
avoided. Algorithm is a set of rules that are followed in case of calculating,
problem-solving operations by a computer.
Incident Affected How many victims? What exploits were used? Ref
Date Organization So
What was Taken? How do you protect yourself?
28/07/2020 Avon.com Both the customer and 7GB worth of exposed data on
organization was victim the servers constituted “all
as attacker got access to production server information. SC M
customer details and Hackers would be able to
internal network data. establish full server control and
conducting actions that
permanently damage the brand
more than 40,000
exposed security This attack shows how important it is
tokens for organizations to ensure that every
server and endpoint is properly
19 million monitored and secured From back-end
exposed infrastructure to end-user mobile
documents devices.
22/10/2020 Microsoft 5,500 compromised After an account is
Sharepoint online Microsoft tenants. compromised, the attackers
upload a malicious file SC M
Onedrive 5.9 million email
messages Changing the sharing
permissions to “public” to
capture the contacts or other
targeted individuals.
Reflection
After reading about the security breaches, what can you do to prevent these
types of breaches?
Answer: These 5 steps mentioned below could help in prevention of data breaches