Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

After watching the movie Snowden, complete the following tasks. Answer the quest

ID: 3718970 • Letter: A

Question

After watching the movie Snowden, complete the following tasks.

Answer the questions below using the movie as a reference in regards to security threats.

Find 5 security issues in the movie and answer the questions below.

1) Identify and state security threats or breaches that you find in the movie. Include the type of threat it is. (ie. physical, data, personal, etc)

2) Verify the threat you find by using a stating where on the Internet you found verification the movie matched real life.

3) Rectify - describe how you would correct the security issue.

Explanation / Answer

Solution :-

The movie snowden is ased on the life of the NSA whistleblower Edward Snowden. In this movie the sensitive information is revealed by the snowden by using the technology and his own efforts. There some technologoal aspects shown in this movie that are used by the snowden to retrieve the information and further reveal. These techniques are helpful to snowden but from the security perspective these may be seen as security attacks. By this movie some security threats can be identified.

1) The 5 security issues are -

1. Unauthorized access - As the snowden was working in the CIA and further NSA then he made unauthorized access to the information for that hewas not previledged.

2. Snowden was inside person so he acquire the confidential informations for the bad purposes. He access theinformation by using the ID of other agents.

3. He physically access the secret servers and transfers the confidential information tohis hard drive.

4. Snowden remotely access the systems of the NSA like hacking and access the information on the system and used for the intentional purposes.

5. He stole the documents hardcopies that are confidential.

These are very likely to the security attacks that actions are performed by the snowden. These threats are called unauthorized access to data and identity theft.

2) This movie is matched with the real life of the Edward Snowden but at some places the drama is added for the entertainment. The military training part is added as the snowden has the very liittle militayr training performed. But the part of data acquiring is matched with the real life. The snowden reveales the mission that CIA monitorig the billions of citizens by their Social security numbers and their phone numbers. That is a very big issue and attack on the privacy of every person.

3) The security issues that are shown in thhis movie are very much happens in the real life. The organiation should use the security mehanisms to hanbdle these type of attacks. First is that there must not a single chance to happen unauthorized access in the organization. Each employee has itr's own previledges and passwords. So that he can access only the limited information that only concerns to him.

The employees should not share their passwords to ther employees to prevent from the identity theft attack. The security mechanism should be there to handle the malicioius attacks that are performed remotely. Thus by making the systems safe and secure these type of attacks can be handled and prevented.