logo

Information System Breaches - Yahoo

Analyzing case studies to apply course concepts and demonstrate understanding of business principles.

4 Pages1091 Words38 Views
   

Added on  2022-08-12

About This Document

Case Study: Yahoo Wins the Gold and Silver Medal for the Worst Hacks in History! Page 2 of Chapter 5. There seems to be a cybersecurity headline once a week about at least one company or government agency being hacked or reporting some type of breach. In this module, you have learned about the challenges associated with cybersecurity and ways the threats can be mitigated. You will focus on the challenges experienced by Yahoo in this case study. Write a 2-3 page paper not including the cover page or reference pages, that answers the questions from the textbook case study 5.1 - Yahoo Wins the Gold Medal and Silver Medals for the Worst Hacks in History! You must cite at least five independent scholarly sources to support your position, using the appropriate APA format. These are the found in the case study questions that you can go by... 1. Why do you think Yahoo was targeted for these data breaches? 2. Why did Yahoo keep the breaches from the public eye?

Information System Breaches - Yahoo

Analyzing case studies to apply course concepts and demonstrate understanding of business principles.

   Added on 2022-08-12

ShareRelated Documents
Running head: INFORMATION SYSTEMS
INFORMATION SYSTEMS
Name of the Student:
Name of the University:
Author’s Note:
Information System Breaches - Yahoo_1
INFORMATION SYSTEMS
1
Reason of Breaches:-
On 2016, 22nd September, Yahoo openly revealed that over one billion account evidence
was hacking in mid-2013. In 2016 they also disclosed that more than 500 million data are
misplaced for the second cyber-attack. An unknown illegal third party directed the Yahoo data
breach. The attacks mainly occurred for the weak database and lack of security issues (Thomas et
al., 2017). The defenses applied for a database covering the personal and login evidence were
inadequate to defend against the progressive approaches used by the cyber attackers. In this
circumstance, the encryption technique active in the database was ruined by the hacker. The
attackers took the evidence illegally from Yahoo gently and carefully to not draw focus to the
data break taking place.
Impression in public Eye:-
These attacks are not disclosed at the initial time. Two years later, the yahoo authority
declared their database was hacked, and any information was stolen. The main reason behind that
if the public knows about this incident. The people suffering from panic and also lose their faith
from Yahoo. It is very much dangerous situation for their business. If persons do not know a
hack has happened and that they want to take these protecting steps, they remain exposed.
Since the hacks were shocking and extensive to a maximum of Yahoo's client base,
Verizon is taking another opinions about the acquisition. The data break will take a substantial
impression on the contract records and the probability that it will necessarily occur (Wang &
Park, 2017). Yahoo will take to satisfy Verizon that the break will not disturb future procedures
in the business and that more safety structures have been and will be executed.
It is also demanding that Yahoo also misinforms Verizon with false evidence and ended
up validation a stock arrangement containing no data about the significant break. The deficiency
of cybersecurity responsibility protection caused it to be the one business that could not be
reliable with confidentiality and safe defense of sensitive information.
Damage:-
For these attacks, the hackers are collecting a huge number of e-mail informations, street
addresses, telephone details, unencrypted safety queries, and responses. It is a fact that the
Information System Breaches - Yahoo_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Data Breaching in Yahoo: Impact on Reputation and Finances
|7
|1761
|485

Critical Analysis of Yahoo's 2014 Data Breach
|5
|1125
|278

Cyber-Attacks in the World
|11
|2065
|317

Yahoo Data Breach Case Assignment
|9
|3207
|30

MANAGING INFORMATION SYSTEMS.
|3
|347
|52

Security | Cyber Attackers | Essay
|6
|1104
|18