SlideShare a Scribd company logo
1 of 1
Research a case that has been in the news in the last few years where a major security breach
occurred on a network; evaluate where it falls short and propose new solutions to mitigate future
attacks.
Solution
JP MORGAN CHASE ATTACK IN 2014: It involves a cyber attack which took place in the the
summer which compromised the information of about 76 million households. The information
included customer names, addresses, phone numbers and email contact information. In addition,
the breach affected about seven million of J.P. Morgan’s small businesses customers..The
hackers were able to break into the computer system and access the information.
It falls shows due to unencryted information and no intrusion detection systems acquired by the
company.
In order to mitigate these attacks:
1.Create a firewall.
2.Perform packet inspection of all the data enetering and leaving the network.
3.intrusion detection systems to detect intrusions and disconnect intruders immediately.
4.encrypting sensitive information so that unknown users cannot access them.

More Related Content

Similar to Research a case that has been in the news in the last few years where.docx

White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
 
Cyber security master class 2018
Cyber security master class 2018Cyber security master class 2018
Cyber security master class 2018Sanjana Khound
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxtidwellveronique
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial PlannersMichael O'Phelan
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersUnited Security Providers AG
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...MZERMA Amine
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBakerTillyConsulting
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019ImekDesign
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101Welch LLP
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
2014 Trustwave Global Security Report
2014 Trustwave Global Security Report2014 Trustwave Global Security Report
2014 Trustwave Global Security Reportworldwidebranding
 

Similar to Research a case that has been in the news in the last few years where.docx (20)

White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
Cyber security master class 2018
Cyber security master class 2018Cyber security master class 2018
Cyber security master class 2018
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
 
Document-3.docx
Document-3.docxDocument-3.docx
Document-3.docx
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
2014 Trustwave Global Security Report
2014 Trustwave Global Security Report2014 Trustwave Global Security Report
2014 Trustwave Global Security Report
 

More from mtruman1

Wages and salaries incurred in March amounted to $10-000- of which $4-.docx
Wages and salaries incurred in March amounted to $10-000- of which $4-.docxWages and salaries incurred in March amounted to $10-000- of which $4-.docx
Wages and salaries incurred in March amounted to $10-000- of which $4-.docxmtruman1
 
Visual Studio Short Answer- 1- What is the name of the tool that lets.docx
Visual Studio Short Answer- 1- What is the name of the tool that lets.docxVisual Studio Short Answer- 1- What is the name of the tool that lets.docx
Visual Studio Short Answer- 1- What is the name of the tool that lets.docxmtruman1
 
Visit two or more social media sites and review information that peopl.docx
Visit two or more social media sites and review information that peopl.docxVisit two or more social media sites and review information that peopl.docx
Visit two or more social media sites and review information that peopl.docxmtruman1
 
Visual Basic Short Answer- 1- What is the primary advantage to definin.docx
Visual Basic Short Answer- 1- What is the primary advantage to definin.docxVisual Basic Short Answer- 1- What is the primary advantage to definin.docx
Visual Basic Short Answer- 1- What is the primary advantage to definin.docxmtruman1
 
Vanadium is a transition metal that can be found in the four consecuti.docx
Vanadium is a transition metal that can be found in the four consecuti.docxVanadium is a transition metal that can be found in the four consecuti.docx
Vanadium is a transition metal that can be found in the four consecuti.docxmtruman1
 
Virtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docxVirtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docxmtruman1
 
VB Create a Class named file that contains the following properties- I.docx
VB Create a Class named file that contains the following properties- I.docxVB Create a Class named file that contains the following properties- I.docx
VB Create a Class named file that contains the following properties- I.docxmtruman1
 
Virtual Computing Question-- Answer the following question that listed.docx
Virtual Computing Question-- Answer the following question that listed.docxVirtual Computing Question-- Answer the following question that listed.docx
Virtual Computing Question-- Answer the following question that listed.docxmtruman1
 
Ventura Capital is a financier who specializes in capitalizing start-u (1).docx
Ventura Capital is a financier who specializes in capitalizing start-u (1).docxVentura Capital is a financier who specializes in capitalizing start-u (1).docx
Ventura Capital is a financier who specializes in capitalizing start-u (1).docxmtruman1
 
VB -What is the primary advantage to defining an interface type in an.docx
VB -What is the primary advantage to defining an interface type in an.docxVB -What is the primary advantage to defining an interface type in an.docx
VB -What is the primary advantage to defining an interface type in an.docxmtruman1
 
Valence electrons are not responsible for A- B- O D- The chemical reac.docx
Valence electrons are not responsible for A- B- O D- The chemical reac.docxValence electrons are not responsible for A- B- O D- The chemical reac.docx
Valence electrons are not responsible for A- B- O D- The chemical reac.docxmtruman1
 
Vertically polarized light that has an intensity of 200 W-m2 is incide.docx
Vertically polarized light that has an intensity of 200 W-m2 is incide.docxVertically polarized light that has an intensity of 200 W-m2 is incide.docx
Vertically polarized light that has an intensity of 200 W-m2 is incide.docxmtruman1
 
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docxWeek 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docxmtruman1
 
Week 2 Discussion- I need help understanding the following question- C.docx
Week 2 Discussion- I need help understanding the following question- C.docxWeek 2 Discussion- I need help understanding the following question- C.docx
Week 2 Discussion- I need help understanding the following question- C.docxmtruman1
 
We will assume the universe is expanding at a constant rate- At t - t0.docx
We will assume the universe is expanding at a constant rate- At t - t0.docxWe will assume the universe is expanding at a constant rate- At t - t0.docx
We will assume the universe is expanding at a constant rate- At t - t0.docxmtruman1
 
We normally think of the arts as very different from technologies in s.docx
We normally think of the arts as very different from technologies in s.docxWe normally think of the arts as very different from technologies in s.docx
We normally think of the arts as very different from technologies in s.docxmtruman1
 
We discussed how the processor routes data between internal components.docx
We discussed how the processor routes data between internal components.docxWe discussed how the processor routes data between internal components.docx
We discussed how the processor routes data between internal components.docxmtruman1
 
We normally think of the arts as very different from technologies in s (1).docx
We normally think of the arts as very different from technologies in s (1).docxWe normally think of the arts as very different from technologies in s (1).docx
We normally think of the arts as very different from technologies in s (1).docxmtruman1
 
We reproduce the class Money here- in part- class Money{ public- Mone.docx
We reproduce the class Money here- in part- class Money{ public-  Mone.docxWe reproduce the class Money here- in part- class Money{ public-  Mone.docx
We reproduce the class Money here- in part- class Money{ public- Mone.docxmtruman1
 
We have two oscillators- used to measure time- One is a vertical mass-.docx
We have two oscillators- used to measure time- One is a vertical mass-.docxWe have two oscillators- used to measure time- One is a vertical mass-.docx
We have two oscillators- used to measure time- One is a vertical mass-.docxmtruman1
 

More from mtruman1 (20)

Wages and salaries incurred in March amounted to $10-000- of which $4-.docx
Wages and salaries incurred in March amounted to $10-000- of which $4-.docxWages and salaries incurred in March amounted to $10-000- of which $4-.docx
Wages and salaries incurred in March amounted to $10-000- of which $4-.docx
 
Visual Studio Short Answer- 1- What is the name of the tool that lets.docx
Visual Studio Short Answer- 1- What is the name of the tool that lets.docxVisual Studio Short Answer- 1- What is the name of the tool that lets.docx
Visual Studio Short Answer- 1- What is the name of the tool that lets.docx
 
Visit two or more social media sites and review information that peopl.docx
Visit two or more social media sites and review information that peopl.docxVisit two or more social media sites and review information that peopl.docx
Visit two or more social media sites and review information that peopl.docx
 
Visual Basic Short Answer- 1- What is the primary advantage to definin.docx
Visual Basic Short Answer- 1- What is the primary advantage to definin.docxVisual Basic Short Answer- 1- What is the primary advantage to definin.docx
Visual Basic Short Answer- 1- What is the primary advantage to definin.docx
 
Vanadium is a transition metal that can be found in the four consecuti.docx
Vanadium is a transition metal that can be found in the four consecuti.docxVanadium is a transition metal that can be found in the four consecuti.docx
Vanadium is a transition metal that can be found in the four consecuti.docx
 
Virtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docxVirtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docx
 
VB Create a Class named file that contains the following properties- I.docx
VB Create a Class named file that contains the following properties- I.docxVB Create a Class named file that contains the following properties- I.docx
VB Create a Class named file that contains the following properties- I.docx
 
Virtual Computing Question-- Answer the following question that listed.docx
Virtual Computing Question-- Answer the following question that listed.docxVirtual Computing Question-- Answer the following question that listed.docx
Virtual Computing Question-- Answer the following question that listed.docx
 
Ventura Capital is a financier who specializes in capitalizing start-u (1).docx
Ventura Capital is a financier who specializes in capitalizing start-u (1).docxVentura Capital is a financier who specializes in capitalizing start-u (1).docx
Ventura Capital is a financier who specializes in capitalizing start-u (1).docx
 
VB -What is the primary advantage to defining an interface type in an.docx
VB -What is the primary advantage to defining an interface type in an.docxVB -What is the primary advantage to defining an interface type in an.docx
VB -What is the primary advantage to defining an interface type in an.docx
 
Valence electrons are not responsible for A- B- O D- The chemical reac.docx
Valence electrons are not responsible for A- B- O D- The chemical reac.docxValence electrons are not responsible for A- B- O D- The chemical reac.docx
Valence electrons are not responsible for A- B- O D- The chemical reac.docx
 
Vertically polarized light that has an intensity of 200 W-m2 is incide.docx
Vertically polarized light that has an intensity of 200 W-m2 is incide.docxVertically polarized light that has an intensity of 200 W-m2 is incide.docx
Vertically polarized light that has an intensity of 200 W-m2 is incide.docx
 
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docxWeek 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
 
Week 2 Discussion- I need help understanding the following question- C.docx
Week 2 Discussion- I need help understanding the following question- C.docxWeek 2 Discussion- I need help understanding the following question- C.docx
Week 2 Discussion- I need help understanding the following question- C.docx
 
We will assume the universe is expanding at a constant rate- At t - t0.docx
We will assume the universe is expanding at a constant rate- At t - t0.docxWe will assume the universe is expanding at a constant rate- At t - t0.docx
We will assume the universe is expanding at a constant rate- At t - t0.docx
 
We normally think of the arts as very different from technologies in s.docx
We normally think of the arts as very different from technologies in s.docxWe normally think of the arts as very different from technologies in s.docx
We normally think of the arts as very different from technologies in s.docx
 
We discussed how the processor routes data between internal components.docx
We discussed how the processor routes data between internal components.docxWe discussed how the processor routes data between internal components.docx
We discussed how the processor routes data between internal components.docx
 
We normally think of the arts as very different from technologies in s (1).docx
We normally think of the arts as very different from technologies in s (1).docxWe normally think of the arts as very different from technologies in s (1).docx
We normally think of the arts as very different from technologies in s (1).docx
 
We reproduce the class Money here- in part- class Money{ public- Mone.docx
We reproduce the class Money here- in part- class Money{ public-  Mone.docxWe reproduce the class Money here- in part- class Money{ public-  Mone.docx
We reproduce the class Money here- in part- class Money{ public- Mone.docx
 
We have two oscillators- used to measure time- One is a vertical mass-.docx
We have two oscillators- used to measure time- One is a vertical mass-.docxWe have two oscillators- used to measure time- One is a vertical mass-.docx
We have two oscillators- used to measure time- One is a vertical mass-.docx
 

Recently uploaded

DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfJerry Chew
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfcupulin
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...Gary Wood
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 

Recently uploaded (20)

DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 

Research a case that has been in the news in the last few years where.docx

  • 1. Research a case that has been in the news in the last few years where a major security breach occurred on a network; evaluate where it falls short and propose new solutions to mitigate future attacks. Solution JP MORGAN CHASE ATTACK IN 2014: It involves a cyber attack which took place in the the summer which compromised the information of about 76 million households. The information included customer names, addresses, phone numbers and email contact information. In addition, the breach affected about seven million of J.P. Morgan’s small businesses customers..The hackers were able to break into the computer system and access the information. It falls shows due to unencryted information and no intrusion detection systems acquired by the company. In order to mitigate these attacks: 1.Create a firewall. 2.Perform packet inspection of all the data enetering and leaving the network. 3.intrusion detection systems to detect intrusions and disconnect intruders immediately. 4.encrypting sensitive information so that unknown users cannot access them.