logo

Securing Your Home Network

   

Added on  2022-08-17

10 Pages2907 Words13 Views
Running head: HOME USERS AND DATA SECURITY
Home Users and Data Security
Name of the student:
Name of the university:
Author Note

HOME USERS AND DATA SECURITY
1
Discussion on threats faced by Internet users and the case of Yahoo:
The dependence of human beings on Internet and usage of Internet has brought dangerous
and new risks. It is because of rise in attempts from the third parties who are unauthorized. This to
make compromise with the private data from their individual advantages from the overall sector of
cyber-crime. Thus, it is important that every user can evaluate risks of utilizing the online. Here, the
significance to secure the personal data and results as that is never done properly. Particularly, the
home users are vulnerable to this and cyber criminals have those users squarely under target.
Further, the vulnerability of the home users are because of various factors and the most vital one is
the fact that those home users at many cases are never aware of risks to use Internet. They frequently
access the cyber world despite any sort of preparation or awareness for the journey. The following
study makes a discussion on various threats regarding the case of Yahoo. Besides, the additional
treats witnessed by the users are also investigated here. Lastly, different prevention mechanisms of
those threats are also analyzed.
Different threats for the given case of Yahoo:
Yahoo is a popular Internet portal. They includes search engine along with the directory of
World Wide Web websites that are arranged in hierarchical manner of various categories of topic.
They being a directory has provided the seasoned and new users of Web with the reassurance of
structured point of view of numerous sites and webpages. Yahoo has been seen to be warning their
various users that their respective accounts having the service of Yahoo might get compromised
under huge data breach. There is a warning present in the email messages that are sent from the side
of Yahoo CISO Bob Lord, state the users that they forged cookie might be utilized for accessing the
accounts. There has a data breach that is related to more than one billion accounts of users during
2013. Earlier, they have reported a distinct database that has been putting impact on more than five

HOME USERS AND DATA SECURITY
2
million users that happened during 2014. Further, from a new warning that was sent again, the
business reported that the issue of forged cookie permitted hackers to achieve the access to the
accounts of the users without any password. This problem was related to the breach. On the basis of
investigation, they believed that the forge cookie has been utilized during 2015 or 2016 for accessing
the accounts. Again, they have linked few cookie forging the tasks to similar state-sponsored actor
who are seen to be liable for the theft of data that was disclosed during 2016. Moreover, the
organization has been unable to determine the actor that was state sponsored. Here, a new email has
been sent to users who had the accounts breached that as apparently a common attack. Here, the
individual users has seemed to be targeted specially from the side of the actor that was state-
sponsored sending extra notice.
Different other threats that are faced by users of Internet:
Keylogger:
The keylogger is also known as the system monitor or keystroke logger. It is a kind of
surveillance technology that utilized for monitoring and recording every keystroke hat is typed on
particular keyboard. It is able to record the instant messages, mails and can capture the data that one
type at any point of time through the keyboard. This includes the passwords, usernames and
additional personally identifiable data (Haque, 2019). Apart from that, unlike other kinds of
malicious programs, there pose no such threat to the system. However, they can present serious
threat to the users since they are able to use the interception of passwords and additional confidential
data that is been entered through keyboard. Due to that, the cyber criminals are able to get PIN codes
and different account numbers that are related t e-payment systems and password for the email
addresses, email passwords, online gaming accounts, user-names and so on (Shillair & Dutton,
2016). As the cyber criminals get hold of the confidential user information, they can simply make
transfer of the money from account of user and access online gaming account of users. It is

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Yahoo Data Breach Case Assignment
|9
|3207
|30

Managerial Decision Making
|15
|3525
|198

Technology Security Assignment 2022
|12
|3721
|11

Information Security : Assignment
|11
|2578
|35

How Serious Are Cyber Security Attacks
|13
|3593
|224

National Institute of Standards and Technology (NIST) Cyber Security Framework and Terminologies
|11
|1515
|26