In: Computer Science
Search the Internet for one instance of a security breach that took advantage of each:
(A) Desktop/Laptop PC with full client operating system,
(B) Mobile Device with mobile OS,
(C) IOT or other device with embedded operating system.
Identify each operating system and at least one step that could have been taken on each of the three operating systems to protect from that attack.
A) The security breach for desktop/laptop PC with full client operating system:
Malware attack, personal firewall protection, weak drive encryption.
For this, the anti-malware protection system should be implemented.
B) The mobile device with the mobile OS are as follows:
Hacking the information from the banking application and hacking the other relevant information from G-mail via mobile.
A proper encryption and anti-virus system should be enabled. Also, a strong password should be given to protect.
C) IoT as well as other devices with an embedded operating system.
The Shaky web interface, improper user authentication, and authorization mechanisms, insecure network service, privacy issues etc.
This should be protected by placing the encryption technique.