Monday, May 25, 2020

The Oil And Gas Industry - 2910 Words

The oil and gas industry has been largely dependent on the collaboration between oil and gas companies and governments represented by environmental and regulatory agencies. This collaboration has been in place to regulate the practices and to protect the environment around the field operations sites. Some of the environmental agencies roles in the oil and gas industry includes: †¢ The design of safety procedures and drills. †¢ The implementation of these procedures to ensure they’re respected and carried out effectively. †¢ Serving as an overseer to the different operating companies if they encounter conflicting circumstances. †¢ Help with the design of the necessary equipment – like capping stacks – in times of emergency. †¢ Look through the specifications of the different equipment used during field operations. For a number of years since the increase of exploration and development of sites in deep offshore waters, there has been an increasing effort to design appropriate safety procedures necessary to prevent catastrophes and to contain them after they have happened. Companies and regulatory agencies haven’t been able to do this extremely necessary task with ease due to the novelty of the conditions surrounding procedures being completed. Drilling in deep offshore waters for example has been a very recent event which has been carried out by mostly very large multinational operators as usual conventional fields become uneconomical for them. Some of the measures put in placeShow MoreRelatedThe Oil And Gas Industry1293 Words   |  6 PagesThe oil and gas industry is characterized by many processes, including exploration, resource extraction, refining, transport, and the trade of products. These resources are important to a number of other industries, and have become vital to the main tenance of industrial civilization. Not only does energy affect the big businesses on the coasts and across the oceans; but it also affects everyday people in rural America, from pump jacks to coal mines. It’s easy to see that technology affects retailRead MoreThe Oil And Gas Industry1146 Words   |  5 PagesThe oil and gas industry is crucial to the U.S. economy and plays a central role in its environment, society, and economic development . The U.S. consumes more oil than any other country. Products derived from oil include medicine, recreational sports items, cosmetics, plastic, chemicals, transportation liquids, etc... This is to say, crude oil is the most important natural resource of the industrialized nations, as it has assisted in the technical expansion and discovery of new sources and productionRead MoreThe Oil And Gas Industry2146 Words   |  9 Pagesand production one like Cairn Energy, operate in the oil and gas industry. Each of these companies faces some financial, commercial or contractual considerations similar throughout the industry, and some peculiar to the area of operation within the industry. Problems within the oil and gas companies have occurred in the past due to askew interests and these problems are likely to occur in the future. Managers within the oil and gas industries requires essential working knowledge of the concepts involvedRead MoreThe Oil And Gas Industry2308 Words   |  10 PagesWhen thinking about how all this oil and gas gets from the platforms in the gulf to land to be produced, you will run across the phrase, â€Å"flow assurance.† Flow assurance is what makes sure these oils and gases get from point A to point B without any hesitations or problems. Its main purpose is to prevent hydrates, clogged pipes, and wax depositions. So can the oilfield industry survive without flow assurance, especially in deep water operations? By reading this, you will learn how important flowRead MoreThe Oil And Gas I ndustry1285 Words   |  6 Pagesthe largest in the southern U.S. and Texas, has been developing strong economy, especially in oil and gas industry. During the last decades of the twentieth century, Houston focused on developing energy industry—which comprises oil and gas exploration and production, oilfield equipment manufacturing and wholesaling, and pipeline transportation. However, some economists doubt that depending on oil and gas too much could make Houston particularly vulnerable to economic downturns determined by energyRead MoreThe Oil And Gas Industry1662 Words   |  7 PagesOne of the most capital intensive and globalized industries is the energy sector because of its operations that are inherently complex. As such, the oil and gas projects experience overruns of costs that exceeds 100 percent at times, which have created the need for adoption of new contracting strategies (Schramn, Meibner, Weidinger, 2009). The risks in most cases are contractually distribut ed and shared among the energy project stakeholders instead of leaving it to the owner. Some of the risksRead MoreThe Oil And Gas Industry1070 Words   |  5 PagesStarting my petroleum engineering degree, the oil and gas industry was doing very well at the time.The price of oil was around a hundred dollars per barrel, new independent companies were frequently being created, and the employment rate after graduating with a petroleum engineering degree was close to one hundred percent.However, the outlook of the industry has drastically changed while being in school.The price of oil is now hovering around thirty dollars per barrel and many companies are now havingRead MoreThe Oil And Gas Industry2120 Words   |  9 Pages The oil and gas industry happens to be the largest industry in the world as it is the singular point of growth for a civilisation. Its importance lies in the fact that it is a fundamental aspect involving every individual’s lives from petrochemical products to transportation, heating and electricity fuels. Edwin Drake in Titusville, Pennsylvania drilled the very first oil well during 1859 and it paved the way to the beginning of the oil industry in America. While Edwin Drake focused on drillingRead MoreIfrs And Oil And Gas Industry985 Words   |  4 PagesTracy SzeWai Yim Professor. Karen (Jingrong) Lin Advanced Financial Accounting - Sec 061 June 20, 2016 GAAP vs IFRS in Oil and Gas Industry (Exxon Mobil vs Royal Dutch Shell) Oil and Gas industry is not a stranger in the international market since everyone around the world has a certain level of demand on Oil and Gas. Therefore, different oil and gas companies are founded across the world and a lot of them have gone global. Becoming global has enlarged the companies’ revenue but also complicatedRead MoreIndustry Analysis : The Oil And Gas Industry976 Words   |  4 PagesIndustry Analysis: The oil and gas industry is expansive and rather complex industry consisting of oil, fossil fuels, natural gas, oil and green energy sources. Combined the above sources make-up 32% of total energy consumed worldwide. Three sectors define the value chain of the oil industry; Upstream – which is the process of exploration and extracting the natural resource, control storage and entail refinement process. Midstream – consisting of distribution by pipelines and large quantity shipments

Thursday, May 14, 2020

The Career Fields Of Accounting - 1572 Words

Many students eventually come to a point in their collegiate career that they must decide what path to pursue in their professional careers. For the majority of accounting students, this could not be more challenging since there are such a large variety of career paths to choose from. To further complicate this decision making process, many of the career fields in accounting mandate the individual to obtain certain field related certifications that are essential to that particular field of study. Examples of these certifications are as follows: Certified Financial Manager (CFM), Certificated Public Accountant (CPA), and Certified Management Accountant (CMA). These accounting certifications can sometime prove to be incredibly difficult to obtain. The majority of the available certifications required exam preparation, fees to be paid, background checks, character references, and the exam itself. Once an individual passes the exam and obtains the other required credentials, he or she must be able to maintain their certification. In most instances accountants usually must seek continuing professional education (CPE) classes and pay membership dues annually in order to maintain these certifications. We will examine some of these previously mentioned certifications and others in the follow text. In addition, we will compare the similarities and differences of these certifications in order to assist UHD graduates in this complicated decision. Certified Internal Auditor (CIA) vs.Show MoreRelatedCareer Management For The Accounting Field1327 Words   |  6 PagesCareer Management for Accountants is designed to prepare students in the accounting field. As part of this class every student is assigned to a mentor. In my case, Jim Ahlborn was selected as my mentor. In the following narrative I hope to underline Ahlborn’s career path including his education and professional experiences, his views on ethics, and finally the commitment that his employer has to corporate social responsibility. Ahlborn’s Career Path. When Ahlborn was about to graduate from high schoolRead MorePsychology or Accounting?775 Words   |  4 PagesPsychology or Accounting Choosing a career is one of the most important decisions a person has to make in their life. It is so important because that is what people will have to do to support their selves throughout life. For the past ten years psychology and accounting were two of the top ten potential career choices. According to the U.S. Department of Education, National Center for Education Statistics up to 70,000 bachelors degrees in psychology were awarded, and up to 30,000 in accounting all aroundRead MoreThe Career Field Of A Forensic Accountant Essay900 Words   |  4 Pagesclass about the career field I plan to go into after college. The following information informs you about what must be done in order to become a Forensic Accountant and how life is as a Forensic Accountant in today’s society. Introduction I was asked to research a job in the career field I plan to work in after graduating, then write an informal report on the information I gathered. The job I chose for my report is a Forensic Accountant. A Forensic Accountant is when one uses accounting skills to investigateRead MoreCareer in Accounting1577 Words   |  7 PagesCareers in Accounting One of the major careers being practiced today is accountancy. Thousands of people are completing their degrees in accounting because there seems to be a bright future for accountants with the appropriate qualifications. Accountants, in their career, help ensure that the organizations are running more efficiently, public records are kept more accurately, and taxes are paid properly and on time. They perform important functions by offering a wide volume of business and accountingRead MoreAccounting Is The Language Of Business1286 Words   |  6 PagesAccounting is a major that teaches the language of business, it opens doors to the business world all over the globe, the possibilities with a accounting major is endless in the business field. Whether you want to run your own business or become a certified public accountant majoring in accounting gives you the establishment. A major plus in having a career in business is the flexibility it offers. Many businessmen can make their own hours and handle their business at the comfort of their own homeRead MoreWhy I Chose Business Accounting to Secure My Future1132 Words   |  5 PagesI Chose Business Accounting to Secure My Future While I have never had a career in my life I have had many jobs throughout the years. Throughout my life I have learned there is a great difference between having a job and having a career. Business accounting is my opportunity to follow a dream and work toward having a career. Business accounting can be a very lucrative and fulfilling career. Through business accounting you can learn constantly and find a job in various fields because almost everyRead MoreAn Interview With Professor Clarissa Wilkerson, Jd, Cpa857 Words   |  4 PagesOn Wednesday, February 24, 2016, I conducted an interview with Professor Clarissa Wilkerson, JD, CPA. As an accounting major, I am extremely interested in pursuing a career in accounting and am a student in Professor Wilkerson’s class. Her enthusiastic personality continues to inspire me to pursue a career in this field. After explaining my career goals and the details of this assignment, she gladly accepted when I asked if she would be willi ng to conduct an interview to help me complete thisRead MoreAssignment 1 Acc 100 Careers in Accounting1553 Words   |  7 PagesASSIGNMENT 1 ACC 100 CAREERS IN ACCOUNTING To purchase this tutorial visit here: http://mindsblow.us/question_des/ASSIGNMENT1ACC100CAREERSINACCOUNTING/17 contact us at: help@mindblows.us ACC 100 ASSIGNMENT 1 CAREERS IN ACCOUNTING Assignment 1: Careers in Accounting Due Week 8 and worth 240 points Accounting is the study of how businesses track their income and assets over time. Accountants engage in a wide variety of activities besides preparing financial statements and recording businessRead MoreIt Took Me Three Semesters1646 Words   |  7 Pagesmajor. I decided I wanted to go for Accounting. Ever since I was in elementary school I really enjoyed my math classes, but at that age I didn t quite have a clear idea of where I wanted to go with that. Math has aways been my favorite subject. I always thought about going into a field that required a lot of math or numbers in general . My two top choices were either being a Math Teacher or somewhere in the Medical Field. I first grew interest in the Business Field when I was in high school and workingRead MoreWriting Of The Discipline Of Accounting1627 Words   |  7 Pages Writing in the Discipline of Accounting Eduardo Salabert Durham Technical Community College Abstract This research focuses on the career of accountants in order to find some of the types of writing done in their field. It is also to help me better understand what accountants do and what types of writing are required as this is a career in which I am pursuing a degree. The methods used to gather information for this research were from primary resources: one email interview, also

Wednesday, May 6, 2020

Religion - The Opiate of the People Essay - 1352 Words

I’m not often fond of Marx, the poor fool never recognized the inherent problems of his rather incoherent and unrealistic philosophy, but, I do think that an intelligent man, no matter how deluded can occasionally hit on the right idea. What idea? Simple, â€Å"Die Religion ... ist das Opium des Volkes,† that is, Religion is the opiate of the (common) people. On this, there can be no question he is absolutely right, opiates and religion are one in the same. A man addicted to opiates finds his world more cheerful under the influence of the latex of poppies, sees value in life through the dreamy gaze of opium induced euphoria, and acts in a neurotic and delusional manner with his mind impaired in the opiate induced stupor he brings upon himself.†¦show more content†¦The Christian tries to force secular law to conform to the grotesque morality of the Old Testament and its vindictive and childish god, while praising the nihilistic slave morality of the New Testamen t, laboring endlessly so that rational man must live in a society governed by the most irrational and stupid of laws and customs drawn from the most irrational and contradictory mythological volume compiled by man. To the Christian, those who sin must be treated as criminals, and those who do not accept the morality of Christian neurosis should be forced to by the will of the majority. Otherwise perfectly rational positions, being pro-choice, for instance, are attacked not through logic, but through arguments formulated from a tome which to any rational person should appear no more valid than the Iliad. The Christian forces his Ten Commandments and Creation Science onto a secular nation through the majority of people (which means little when the majority of this country is immensely stupid and ignorant), in contravention of the Constitution. The Christian demands the criminalization of gambling, of drugs, of prostitution, it demands that crimes with no victim except their variant of Odin or Zeus be punished with mandatory minimum sentences. They cannot allow sin to exist in this world, for fear their deity will bring down his wrath upon those who permit it. This of course isShow MoreRelatedReligion Is The Opiate Of The People1566 Words   |  7 Pageswhile we question our existence and the deeper meaning of life. We have discovered that religion answers these disconcerting questions. From worldly tradition, we have learned that religion fills those empty gaps in places that we cannot answer our own questions. It creates hope and gives people a meaning and feeling of belonging. Carl Marx describes, â€Å"Religion is the opiate of the people.† It makes people forget about inequality and oppression. It is more than a practice or a belief. It isRead More Pass The Opium, Please Essay1016 Words   |  5 Pages Religion is said to be the opiate of the masses, and it is definitely a point of interest in George Orwells famous novel Animal Farm. In it, Orwell pointedly attacks religion in general and Christianity in particular through the use of a well placed symbolic bird by the name of Moses. Orwells stance is rather apparent as Moses darts about the farm scene conveying the duality of Christianity quite superbly. At the first mention of the raven Moses, one immediately gets the impression that he standsRead MoreMarx And Durkheim On Religion839 Words   |  4 PagesMarx and Durkheim on Religion SOC201 998036931 Kirsten Kelleher Both Karl Marx and Emile Durkheim formulate similar sociological theories regarding the epistemology and origin of religion and religious beliefs. Both thinkers acknowledge a necessary connection between community and religion. As antagonistic, functionalist thinkers, both Marx and Durkheim maintain that â€Å"God† or the â€Å"divine†, is merely a projection of human beings highest ideals and greatest characteristics creating a â€Å"God† like illusionRead MoreHow the Social Importance of Religion Has Receded with Modernity1617 Words   |  7 PagesReligion has always been of high social importance and influence within civilization and their society. This essay will argue that as modernity has progressed the social importance of religion has receded, but the gradient of this recession and by how much varies upon the society. Modernity typically refers to a â€Å"post-medieval historical period, one marked by the move from feudalism toward capitalism, indust rialization, secularization, rationalization, the nation-state and its constituent institutions†Read MoreKarl Marx And Max Weber1332 Words   |  6 Pagesfascinated by religion science as they talked about different religion in depth that exist on earth and various perspectives of well known people on the study of religion. I chose Karl Marx and Max Weber for my paper assignment. Two sociologists and philosophers have discussed their views on religion and its impact on society. Most of the Sociologist of that time wrote about the role of religion in society, Karl Marx and Max Weber observations are particularly relevant for our course. Religion is one ofRead MoreMarx Weber and Durkheim on Religion Essays1378 Words   |  6 PagesA religion can be seen as a unified system of beliefs and practices which are relative to sacred things and beliefs (Giddens 1972, p.224). It can shape ones thoughts and feelings and gives people a sense of hope and something to believe in. All three main sociologist writers Karl Marx, Max Weber and Emile Durkheim offer different perspectives on religion and how important it is to society. Some of the theorists chose to have a positive view whilst others argue the unimportance of religion. This essayRead More Marx’s Views on Religion vs. My Own Essay514 Words   |  3 PagesMarx’s Views on Religion vs. My Own Karl Marx wrote that religion was, â€Å"an opiate of the people.† Although those words were not published in The German Ideology, they best describe his various views on religion. Marx wrote that there was a social relationship between the upper class or bourgeoisie and religion. The upper class that owned the means of production used religion as a tool to keep the working class or proletariat, oppressed and poor. Marx criticized that religion had so many ulteriorRead MoreImmanuel Kant And Karl Marx1690 Words   |  7 Pages The works of German philosopher’s Immanuel Kant and Karl Marx have played significant roles in the development of different sects of philosophy and religion. Immanuel Kant was born in 1724 in Konigsberg, East Prussia, now presently Kaliningrad, to a devout, poverty-stricken family of eleven children. Through his works, it is evident that Kant was raised in the religious teachings and values of pietism as his theories show a heavy influence of his religious upbringing. Kant as a young boy was accustomedRead MoreThe Video Opiate Addiction : Understanding Replacement Therapy Essay952 Words   |  4 PagesIn the video Opiate Addiction: Understanding Replacement Therapy, Scott Farnum talks about methadone replacement therapy. There were many topics covered in this video and the topics were introduced in a psychoeducational format. The topics covered included a brief history opioids, brain chemistry, post acute withdrawal syndrome, abstinence based treatment programs verses harm reduction, and how an individual asses the damages of opioids on the brain. As a counselor in training, I found all the informationRead More Functionalist View on the Role and Functions of Religion in Society716 Words   |  3 PagesFunctionalist View on the Role and Functions of Religion in Society Assess the view that sociological arguments and evidence support the Functionalist view of the role and functions of religion in contemporary society. Functionalists believe that religion is a conservative force, and an institution which adds to the requirements of society. They say it ultimately operates as an agency of socialisation. Durkheim (1912) said that all societies are separated into

Tuesday, May 5, 2020

Information Security Data Breach

Question: Discuss about the Information Securityfor Data Breach. Answer: Background Data breach is referred to as the incident in which the confidential and sensitive information might get stolen from the data server by unauthorized person unethically without permission. As the technology is growing up the concept of hacking is also becoming devastating. Nowadays data theft has become one of the most challenging phases in technology. Among the recent data breaches roundup, in September 2015, security and data breaches occurred in Apple centre, which become a headline (Data-breaches, 2015). After detail analysis, it has been found that for creating free application Utopia, iOS malware named as Key-raider, stole around 225,000 apple accounts. The suspicious Apple iOS tweak was analyzed by Weip Tech and it has been reported that, more than 225,000 valid apple accounts along with their password are stored on the apple server. The aim of the attack is to develop two iOS jailbreaks tweaks for downloading different applications from the official application store of Apple (Wang et al., 2013). Without proper payment, the attackers wanted to utilize the applications efficiently. The jailbreak tweak software packages are used by the attackers because it allows them to perform the required actions that are not generally possible in iOS. In the command and control serer of the malware attackers the stolen information were used to stored and utilized on required time phase. About the Problem Scenario The incident of malware attack in the iOS app store took place in the year of 2015, September. All Apple users have apple accounts and their registered id and passwords are stored in the app server (Sun, Akiyama Mori, 2016). The keyrider software package rather malware, attacked on the apple server and hacked all confidential information including thousands of certificates, private keys, purchase receipt etc. The stolen data were stored in C2 server that contains threat itself to expose the information of the users. In order to unlock the functionalities and operations of the iphones and ipads, the Key-raider malware stole apple push notification service (Shahriar, Klintic Clincy, 2015). The two tweaks were capable to hack the app purchase requests and to steal the purchase receipt from the C2 server. The Reason Behind its Occurrence The main reason behind this attack is to theft the sensitive information of the users without informing them and to utilize those data for different unethical purposes. Initially apple store was found to be one of the most secured servers where, the external users were not able to attack easily (Jang et al., 214). Thus, the official information of the users were enough secured from the external attackers. In order to hijack the official information from the data server the key-raider malware was used by the attackers. In addition to this, the attackers actually used this malware to assault directly the app store and without paying accurate payment they wanted to use the application of Apple. After this the attackers will be able to perform those tasks also which are not actually possible to be performed on the OS platform. The tweaks had downloaded over 20,000 times, which stated, that more than 20,000 users are abusing 225,000 stolen data from the app store (Stankovic, 2014). Initia lly it was very difficult for the owners to identify the actual reason and process of attack but gradually, after conducting vast investigation, i_82 discovered the key-raider malware attack appropriately. Possible Solution to Mitigate the Occurred Issue Different strategies are there, used by the software and hardware analysts to protect their data server from the external attacks. If proper strategies are used, then only the owners will be able to keep their server data secured. Based on the type of information and vulnerabilities, appropriate mitigation strategies are needed to be adapted (Xing et al., 215). The possible solutions against the malware attacks are as follows: Data encryption: In order to keep the data secured from the key-raiders malware, proper encryption algorithm is required to be adapted by the data server. In this process the sender and receiver both are bound to use symmetric and asymmetric keys according to the background of the situation. After the application of proper encryption algorithm none of the external users will be able to get the details of the public and private keys. Due to the disruptive services the nature of malicious code as been actively shifted. Antivirus adaptation: Another important technique that can be used to keep the information secured from the attackers is adaptation of antivirus. Depending on the nature of the data the anti viruses should be installed. Authentication: Authentication is referred to as another important component that is strictly required to be considered to maintain the data security. With the help of authentication only the authorized users will be able to visit the app stores whenever required. The non-registered users or the unauthorized users are not competent to hijack the information from the app server. Firewall implementation: In order to keep the data secured and to reduce the number of attackers, application firewall is also required to be configured. Introduction In the year of 2015, icloud hacking is found to be as one of the biggest controversial hacking cases. Though, the incident took place in the summer 2014, but officially it was exploited in the year of 2015 (Hacking Cases, 2015). The victim of the attack was number of celebrities. It has been found that, in 2014, dozens of icloud of the celebrities were mainly attacked by the external attackers. In order to hijack, the photos of the celebrities mainly the attackers attacked the cloud server. This is referred to as one of the popular hacking cases that occurred between 2012 and 2016. The report depicts the background scenario of this incident including the victim and the attackers of the incident. It also elaborates the way through which the attack incident carried out (Choo, 2014). In addition Ito this, lastly it will illustrate different prevention technologies that are needed to be adapted by the owners to protect the photos of the celebrities from the attackers. Overall Problem Scenario This scenario took place in the year of 2014 summer but is officially reported in 2015. After investigating incident, it has been determined that, more than 500 private images of the celebrities from different domain are hijacked by the attackers. Most of the victims of the incident are women though many men are also found to be victim of the attack. After hijacking the images the attackers posted those in different social networks and other websites. From the security investigation it has been determined that the images are retrieved from the apple cloud named as icloud (Braunstein, 2016). The attack become easier for the attackers because the cloud server allows the users to make multiple attempts for guessing the password. Due to the allowance for unlimited times password guessing options on the Application Programming Interfaces (API), the icloud access became easier. The attackers need not to take any permission from the users rather the chance of redundancy also enhances rapidl y. The Problem scenario The images hijacked from the cloud storage were obtained by the attackers from the online storage that has been offered by the Apple Icloud (Hacking Cases, 2015). The cloud storage automatically stores the images of the celebrities and also keeps the backup of the images in the storage. The attackers targeted on the icloud account in terms of account identity and passwords directly. The attacks are phishing and brute force attacks (Elhai et al., 2017). Due to lack of security in the cloud storage the photos are hacked by the attackers. The apple privacy security was questioned due to lack of security. Even before public release the photos were getting revealed in front of everyone. The main activity center of the phishing attack was the link sharing website Reddit. Moreover, the critics realized that distribution of the images publically is one of the major privacy invasions. Not only images but also the private information was also hijacked by the external attackers. The Affected Person or Victim After analyzing the incident it has been found that the victims of the attack are the celebrities Most of the celebrities including men and women are the victims of this incident. The icloud data storage leaked the pictures of the celebrities and publically released those. The image content and the confidential information both get hijacked by the external attackers. Though some of the photographs are referred to as fake but most of the photos are stated as authenticated rather original. The external attackers attacked on the icloud service provider were the confidential data and the images both get stored. In this phishing attack the attackers get opportunity to make multiple attempts to identify the account id and password at the same time. As there was no prominent limitation of the attempt thus, the attackers too several attempts and hijacked the images. The Way through the Attack Carried Out After matching the id and password of the apple accounts it become easier for the attackers to search for the desired products (Hacking Cases, 2015). After hijacking the photos, they promoted those to the public platform where all the users will be able to look for the photographs. The Possible Attack Prevention Strategies In order to mitigate the problems, different possible strategies could be undertaken. These are as follows: Data encryption: The fundamental concept of encryption is required to be undertaken by the owners to overcome the issues. Server authentication: The server is required to be authorized, so that the unauthorized users cannot attack and hijack images from the server. Limited attempts: There should be limit for making attempts on the password verification. If it is found that user are making more than 3 attempts then, for that particular person the access should be blocked. Conclusion From the overall discussion it can be concluded that, information security is one of the major concerns of operating system and data server. If the owner fails to adapt accurate security measures, then the attackers will easily hack information from the server even without permission. By developing vast investigation on malicious activities, the computer activities can be controlled and monitored accurately. The report elaborated the incident appropriately and after analysis, the victims of the incident are also identified. In addition to this, the background of the problem scenario, the victim of the incident and the way through which the attack had carried out are also elaborated in this report. After identifying the problems, possible mitigation strategies are also elaborated in this report. Accurate mitigation approaches will help to overcome the issues. References Ahmed, M., Litchfield, A. T., Ahmed, S. (2014). A Generalized Threat Taxonomy for Cloud Computing. ACIS. Braunstein, A. (2016). Standing Up For Their Data: Recognizing the True Nature of Injuries in Data Breach Claims to Afford Plaintiffs Article III Standing.Journal of Law and Policy,24(1), 3. Choo, K. K. R. (2014). Mobile cloud storage users.IEEE Cloud Computing,1(3), 20-23. Data-breaches,.(2015).recent-data-breaches-september-2015.www.identityforce.com. Retrieved 19 September 2015, from [online] https://www.identityforce.com/blog/recent-data-breaches-september-2015 Elhai, J. D., Chai, S., Amialchuk, A., Hall, B. J. (2017). Cross-Cultural and Gender Associations with Anxiety About Electronic Data Hacking.Computers in Human Behavior. Hacking Cases,. (2015).The Most Controversial Hacking Cases of 2015.Blog.tcitechs.com. Retrieved 29 September 2015, from [online] https://blog.tcitechs.com/blog/the-most-controversial-hacking-cases-of-2015 Jang, Y., Song, C., Chung, S. P., Wang, T., Lee, W. (2014, November). A11y attacks: Exploiting accessibility in operating systems. InProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security(pp. 103-115). ACM. Shahriar, H., Klintic, T., Clincy, V. (2015). Mobile Phishing Attacks and Mitigation Techniques.Journal of Information Security,6(03), 206. Stankovic, J. A. (2014). Research directions for the internet of things.IEEE Internet of Things Journal,1(1), 3-9. Sun, B., Akiyama, M., Mori, T. (2016). Towards Automatically Detecting Promotional Attacks in Mobile App Store. Ur, B., Bees, J., Segreti, S. M., Bauer, L., Christin, N., Cranor, L. F. (2016, May). Do Users' Perceptions of Password Security Match Reality?. InProceedings of the 2016 CHI Conference on Human Factors in Computing Systems(pp. 3748-3760). ACM. Wang, T., Lu, K., Lu, L., Chung, S. P., Lee, W. (2013, August). Jekyll on iOS: When Benign Apps Become Evil. InUsenix Security(Vol. 13). Wei, T., Zheng, M., Xue, H., SongFireEye, D. (2014). Apple Without A Shell Ios Under Targeted Attack. InVirus Bulletin Conference. Xing, L., Bai, X., Li, T., Wang, X., Chen, K., Liao, X., ... Han, X. (2015, October). Cracking app isolation on apple: Unauthorized cross-app resource access on mac os. InProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security(pp. 31-43). ACM.