Question

Search the internet and find a recent security breach involving WLANs and briefly describe the situation.

  • Search the internet and find a recent security breach involving WLANs and briefly describe the situation.

Homework Answers

Answer #1

The very recent security breach has been of Decathlon, French Sports Retailer. The breach exposed data of 123 million users. The data mainly consisted of usernames, PII, passwords, of employees, names, mobile numbers, birth dates, and addresses, etc.

The problem occured due to misconfiguration in the database. The database of approximate size of 10 GB was found on Elasticsearch server and the server was unsecured.

The malicious users or cyber-criminals made use of administrator log-in credentials. It helped them conduct espionage. They also sent phishing mails for identity fraud. The company discovered the whole situation after four to five days. The public access and other privileges to the database were shut down immediately.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Conduct an Internet search to find companies noted for best practices in management development. Describe what...
Conduct an Internet search to find companies noted for best practices in management development. Describe what these best-practices companies do in management development. What are the similarities across companies? Describe any major differences.
By doing a search of the Internet or by other research methods, find an example of...
By doing a search of the Internet or by other research methods, find an example of an organization that faced an information systems security issue or crisis. 1) How did the organization identify that there was a security problem? 2) What, if any, security infrastructure and policies were in place when the problem occurred? 3) What initial actions were taken to deal with the situation? 4) From a management perspective, what, if any, new organizational policies and procedures did they...
Search the Internet for an AIS security threat or attack new story or article. Summarize your...
Search the Internet for an AIS security threat or attack new story or article. Summarize your findings in a discussion board post to share with your classmates. Answer the following questions: 1. Describe the company & it's business that was a victim of the Cyber security attack. 2. When did this security breech occur? 3. What method of attack was used (virus, worm, spam etc)? 4. How many users were effected? 5. What was the financial impact on the company?
Briefly describe a situation where you and another person remembered an experience or situation differently. Apply...
Briefly describe a situation where you and another person remembered an experience or situation differently. Apply what you have learned (Memory Models: get information into our brain: a process called encoding, retain that information: a process called storage, later get the information back out: a process called retrieval.) in an analysis of why your memories may have differed. Provide specific examples to support your response and then search the Internet for an article that supports your position and post the...
1. Search the Internet using a search engine (such as Google) for a recent article that...
1. Search the Internet using a search engine (such as Google) for a recent article that discusses a change in the price of something. For example, search "price increase," "price rise," "price drop," or "price decrease." (I recommend you avoid articles about the stock market.) Copy the URL address of the web site. You will need to post it. 2. Determine the cause of the price change by reading the article. Then try to identify which of the theoretical demand...
(4) Go to the internet, and type into Google the search phrase, “555 timer”. Find a...
(4) Go to the internet, and type into Google the search phrase, “555 timer”. Find a website that shows many other kinds of circuits using the LM555. Give the schematic for some circuit and describe what it is supposed to do according to the website.
In this activity, you search the Internet to find examples of devices that physically secure wireless...
In this activity, you search the Internet to find examples of devices that physically secure wireless components. Select a device and write a summary of it. Start your Web browser, and perform an Internet search for wireless physical security devices. Visit several sites, and examine at least three different devices. Select one device and write a two- to a three-paragraph summary of it. Include details such as the device’s cost, its purpose, how it works, and where to get it....
Do an Internet search to find the SOC 3 report for Google's Cloud Platform System for...
Do an Internet search to find the SOC 3 report for Google's Cloud Platform System for the latest period available. Required: a. Read the report. Identify the accounting firm that performed the SOC 3 attestation engagement. Which of the Trust Services Criteria are referenced in the report? b. Briefly explain why Google would want to pay a CPA firm to provide a SOC 3 report for its Cloud Platform System?
Do an Internet search to find the SOC 3 report for Google's Cloud Platform System for...
Do an Internet search to find the SOC 3 report for Google's Cloud Platform System for the latest period available. Required: a. Read the report. Identify the accounting firm that performed the SOC 3 attestation engagement. Which of the Trust Services Criteria are referenced in the report? b. Briefly explain why Google would want to pay a CPA firm to provide a SOC 3 report for its Cloud Platform System?
1. Search the internet for a story or article that relates to sound. When you find...
1. Search the internet for a story or article that relates to sound. When you find something that interests you describe what you learned about sound and try to post a related picture or figure. Note this can be anything related to sound from technical to cultural. It can be a video but you must describe the results and post the video if you do so. I'm leaving this a bit open so we get some interesting posts. Try to...