
Description
* I have attached the first page for this assignment that you can gather the needed information from
Using the company/breach that you selected in Module 3, create an outline of your Portfolio Project that organizes the main points and sub points of your critical evaluation of the breach based on the following questions:
- What went wrong?
- Why did it occur?
- Who was responsible?
- How could it have been prevented?
- What advice would you offer to prevent such a breach from occurring in the future?
As you develop your outline, be sure to continue researching the breach so that your points are well-supported by in-text citations from sources in addition to course readings. A minimum of five sources must be fully cited and referenced as part of the Portfolio Project due in Module 8.
Submit your Portfolio Project Milestone by the posted due date. Review the rubric below for specific grading criteria.
Unformatted Attachment Preview
Purchase answer to see full attachment

Explanation & Answer

Attached.
Running head: GOOGLE CLOUD SECURITY BREACH
Google Cloud Security Breach
Name of student
Institutional affiliations
Date
1
GOOGLE CLOUD SECURITY BREACH
2
1. What went wrong?
The hackers attacked consumer routers through abusing google cloud platforms. There have been
numerous attacks in Domain Name Servers (DNS) to D-link routers, which are found in the
google cloud platforms. These hackers used malware to attack the cloud computing platforms to
redirect user information to the wrong websites (Howard, 2010). The hackers were interested in
hijacking information and struck some of the routers that facilitate Google cloud computing,
such as DLink, D-Link, and the ARGtek. The attackers sit in between the user communication
and servers and intercept the user request to the servers and the replies from the servers to
provide a loophole for hacking. The Google cloud contains fake Domain Name Servers, which
give a leeway for attackers to intrude and access the user information credentials.
2. Why did it occur?
The Google cloud attacks emerged since the google computing group provided free access
privileges to Google Cloud Shell to any person(s) with a google account. The google cloud
hacking happened because, in the cloud, there are fake DNS servers that...

