Posts

Showing posts from June, 2023

Case Study (Literature Review)

  This analysis of the relevant literature explores the big WhatsApp hack that took place in May 2019. The review gives a summary of the incident, looks at how it may have affected user privacy and security, and highlights scholarly research on the subject. This review seeks to give a thorough knowledge of the WhatsApp hack and its influence on the digital environment by synthesising pertinent papers, articles, and reports. WhatsApp Hack: Overview of the Incident Detailed overview of the May 2019 WhatsApp hack taking advantage of a flaw in the WhatsApp calling function      2.Pegasus spyware from NSO Group's involvement in the attack        Consequences for User Security and Privacy        Analysis of the effect on user security and privacy End-to-end encryption breach and trust implications Concerns about surveillance and human rights ramifications Conclusion This study intends to add to a deeper understanding of the occurrenc...

Case Study (Method)

  An outline of the WhatsApp hacking technique utilised in May 2019 is provided below: Attackers made a phone call to the target's WhatsApp number by taking advantage of the voice calling feature. Even if the target didn't pick up the phone, the attacker might still take advantage of the weakness.  Buffer Overflow Vulnerability: During the conversation, the attackers delivered a series of specially designed binary code packets that caused WhatsApp to experience a buffer overflow vulnerability. Remote Code Execution: The attackers could run malicious code on the target device by making use of the buffer overflow vulnerability. This made it possible for them to covertly install surveillance software like the Pegasus spyware from the NSO Group.  Installation of spyware: After seizing control of the target device, attackers could remotely set up surveillance software to keep an eye on the device's activities, including calls, messages, and other data. Reference: Chambers...

Case Study (Conclusion)

  CONCLUSION In conclusion, the WhatsApp breach in May 2019 exposed the possible weaknesses in messaging apps by having a substantial impact on a particular population. Quick action was taken by WhatsApp to rectify the problem and put protective measures in place for its users. The event did, however, serve as a reminder of the difficulties that still exist in protecting the security and privacy of digital communications. 

Case Study (Introduction)

Introduction to WhatsApp hacked in may 2019  One of the most widely used messaging services, WhatsApp, suffered a serious security breach in May 2019 that led to user accounts being hijacked. With over 1.5 billion users at the time and being owned by Facebook, WhatsApp was a popular target for hackers. The hack made use of a flaw in WhatsApp's voice call feature, which let attackers install spyware on customers' handsets. The malicious code was created to take advantage of a weakness in the end-to-end encryption used by the app to make sure that only the sender and recipient can see the content of their communications. WhatsApp addressed the issue almost away and released a patch to shield users from further misuse. Users were also urged to update their apps to the most recent version to make sure they are safe. Reference: Nagar, S., 2019. WhatsApp Hacking–A Wake-up Call for Users.

Student Ideas

Image

Academic Paper Summary

Image
 PAPER SUMMARY As businesses increasingly rely on cloud computing for storage, processing, and application deployment, cloud security is becoming a crucial concern in today's digital economy. Although cloud computing has many advantages, it also poses a special set of security problems and difficulties that must be resolved. A thorough and multi-layered approach is necessary for cloud security. To protect the privacy, integrity, and accessibility of data and applications in the cloud, a variety of technical controls, strong rules and processes, staff training and awareness, and ongoing monitoring are used. Organisations may take use of cloud computing's advantages while reducing potential security threats by being aware of and addressing these challenges. Paper link:  http://dx.doi.org/10.1016/j.jnca.2016.11.027 Reference: Ashish Singh⁎ , Kakali Chatterjee (2016) Cloud security issues and challenges: A survey , Journal of Network and Computer Applications . Available at: ...

Software (Example) ALTERYX

Image
 You will drop and connect several tools in the workspace to create your workflows, just as we did with our first workflow. By dragging, dropping, and connecting various tools into the workspace to process your data, all workflows are created in the same manner. We can instruct particular tools or even the workflow itself on how to act and handle our data through the Configuration Window. Any tool that is selected in a workflow will display its configuration window, allowing you to change any associated parameters. In this instance, the input tool from our initial process has been chosen, and several settings for our csv import, such as the file's delimiter, are displayed.( Alteryx designer interface  no date) References: Avidon, E. (2019) Alteryx analytics platform focuses on ease of use: TechTarget , Business Analytics . Available at: https://www.techtarget.com/searchbusinessanalytics/news/252474294/Alteryx-analytics-platform-focuses-on-ease-of-use (Accessed: 04 June 2023)....

Software (Evaluation-Functionalities) ALTERYX

Image
 SOFTWARE FUNCTIONS This is the software window The functionalities of ALTERYX include the following: FAVORITES The Favorites category includes the most common tools used in workflow creation. You can add a tool to the Favorites by clicking on the gray star in the top right of the tool icon on the Tool Palette. A Favorite tool is indicated by a yellow star. Browse: Within the Alteryx process, the Browse tool produces full visualisations of the underlying data. Anywhere along the workflow stream, the resultant data can be seen using a browser that can be outputted by a Browse tool.  Filter: The Filter tool examines your file for records that fit certain requirements. True and False are the conclusions that the tool produces. When the data matched the criteria that had been established, the result was True; if not, it was False. Formula: The Formula tool is an effective data and formula processor. Use it to add a field to an input table, to generate new data field...

Software (OVERVIEW): Alteryx

Image
  Alteryx Alteryx is a software platform that allows people to work with data more easily .  Alteryx makes accessing, cleansing, testing, combining, analyzing, and outputting data MUCH easier than Excel, SQL, Power Query, or similar tools.   Alteryx  allows teams to build data processes in a more efficient, repeatable, less error-prone, and less risky way. The process can be in any department where data requires manipulation, consolidation, testing, or analysis. ( Spruchman, 2023)                                       References :  Spruchman, J. (2023) Alteryx tool: What is Alteryx and how it works , Capitalize Analytics . Available at: https://capitalizeconsulting.com/what-is-alteryx/ (Accessed: 03 June 2023).

Primary Research (Demographic Question Analysis)

Image
 

Primary Research (General Question Analysis)

Image
 

Plan for main project

Image
 

Major Project

  Cloud security Cloud security, also known as  cloud computing security , is the practice of protecting cloud-based data, applications and infrastructure from cyber attacks and cyber threats. The goals of cloud security and cybersecurity as a whole are the same. Operators of cloud security must protect assets that are located within the infrastructure of a third-party service provider, which distinguishes it apart from traditional cybersecurity. Why Cloud security is important? Business-critical apps and data are moving to trustworthy third-party cloud service providers (CSPs) as enterprise cloud usage increases. The majority of major CSPs include standard cybersecurity instruments with monitoring and alerting features in their service offerings, but internal IT security staff may find that these tools don't cover all of the bases, indicating that there are cybersecurity gaps between what the CSP offers and what the enterprise needs. Data loss and theft are now more l...