logo

One of the Privacy Violation Incidence of Yahoo

   

Added on  2021-06-16

6 Pages2097 Words434 Views
 | 
 | 
 | 
PRT 574 Assignment 1 S2 2018AbstractPrivacy violation is a type of vulnerability, which is related with the misuse of private information. Itmight include the credentials of customers, password and SSN. In recent years, we can see there arenumber of incidents happened related with privacy violation. In this report we are going to discussone of the privacy violation incidence of yahoo. This incidence took place in 2017 and the main causeof this privacy violation issue was failing in identification of authenticated users and scanning all theEmail accounts illegally for advertisement.Table of ContentsAbstract.................................................................................................................................................1Introduction...........................................................................................................................................1Data breaches........................................................................................................................................1Causes of privacy violation....................................................................................................................2Case Study of JP Morgan.......................................................................................................................3Preventive measures.............................................................................................................................4References.............................................................................................................................................5IntroductionThe privacy of data and information is legal right for individual in era of digital communication. Theprivacy of information has many advantages and it is usually related with the security if personaldata while it is saved in computer systems. The secured information is preferred in almost all thefields such as the medical records of patients, the financial records of companies, the bank details ofcustomers, the examination results of students and many more[ CITATION Rob16 \l 1033 ]. Theprivacy of information is also called as the privacy of data[ CITATION SEA18 \l 1033 ]. In today’sworld of big data, where in every second the huge amount of digital data is generating continuously,the privacy of this information is the most crucial factor for everybody. It is not possible to save alldata in personal devices as the memory is limited for all the devices, so the concept of cloud is mostpopular nowadays. In cloud storage, the data is saved on remote locations thus the security of thisdata is on highest priority. In this report we are going to analyse the data breach which washappened in the year 2017 in J P Morgan. As per the report of financial regulator the JP Morganchase & co. have to pay around $2.8 million amount to its customers. The privacy violation washappened in JP Morgan in year 2017, due to which millions of customers were affected. The privacy of information can be ensured in many ways such as by using encryption, data maskingand implementing authorization. Data breachesPrivacy violations are very common in present scenario. According to a survey done by CSO in 2018,some of the biggest data breaches of present century are[ CITATION Tay18 \l 1033 ]: 1
One of the Privacy Violation Incidence of Yahoo_1

PRT 574 Assignment 1 S2 2018CompanyDescriptionYahooDuring September 2016, around 3 billion user accounts of yahoowere attacked. According to Yahoo the main victims of this privacyviolation were the passwords. In October 2017 it was stated that thesecurity question and answers were also affected and it wasconsidered as the biggest data breach in the history[ CITATIONDEN18 \l 16393 ]. Adult FriendFinderIt was happened during October-2016 and around 412.2 millionaccounts were affected due to this data breach. Six databases werehacked by hackers. Due to this around 20 years of user’s data whichincluded addresses, name, passwords and emails wereimpacted[ CITATION Mar16 \l 16393 ]. The main cause of this databreach was the weak encryption algorithm used in database.eBayIn May 2014, this cyber-attack was happened due to which nearabout 145 million users were affected. The private data of users wereexposed because of this attack. It was basically a network attack, inwhich hackers entered in the network using personal credentials ofsome employees of organization and they accessed the network for229 days.EquifaxIt is the biggest credit bureau in US. On September 7, 2017 due toone application vulnerability, the security of private data of around147.9 million customers was compromised.HeartlandpaymentsystemsIn this privacy violation incidence, around 134 million credit cards ofusers were exposed due to SQL injection.Target storesDue to this data breach the debit and credit card details of 110million users were affected. The breach was started just before thethanksgiving note. In this breach, hackers got the accessibility rightsthrough a third party software named HVAC at the POS and collectedthe personal details of plastic money.TJX CompaniesInc.In this data breach around 94 million credit cards were affected.Hackers took the advantage of weak encryption algorithm andcaptured the details of credit card during wireless transmission.UberIn 2016, around 57 million of users and drivers personal informationwas affected in this data breach. In personal information there wereno clues of credit and debit card information only the names,addresses, contact numbers and email ID of users were affected.JP MorganChaseThis is one of the largest bank in the world. Due to data breacharound 76 million households were affected and around 7 million ofsmall businesses lost their personal information.US OfficepersonnelmanagementIn this data breach, hackers of China were entered in the OPMsystem but could not be detected till 2014 March. The information ofusers were exposed and later misuse this data.Causes of privacy violation2
One of the Privacy Violation Incidence of Yahoo_2

PRT 574 Assignment 1 S2 2018It is clear from above table that almost all the companies are affected from the privacy violation inrecent years. These incidences of data breach were sufficient for the financial down gradation ofthese companies[ CITATION Dan14 \l 16393 ]. As per the study around 48 billion dollars were lost inUS due to the data breach. As per the report published by Forrester, some of the top 6 commonfactors for the privacy violations are[ CITATION Lew18 \l 16393 ]:Some of the top causes of data breaches are explained as:Misuse by Hacker: The most common cause of any type of privacy violation is deliberatelyaccess of the personal data or information of users. It can be resolved easily if the data canbe restricted and shared among the users on the basis of their role and credentials. The rulebased accessibility algorithms can be planned to resolve this type of data breach[ CITATIONCar14 \l 1033 ].Loss of assets: Due to unauthorized remote access of data and weak encryption algorithmcan easily erase the data from devices.Phishing: Phishing is a vulnerability, in which the user’s accounts can be hacked by sendingthem scams through mailing system. To overcome the chances of phishing, strong antivirusapplications or firewall implementation is preferred way. Firewall can filters the unwantedor suspicious data packets.Malicious users: These users can be of inside or outside of the organization. These users canaccess the data of authorized users. To control this data breach the accessibility algorithmscan be made strongly.Third party software: Mostly these types of software are enough to control the security ofdatabases and servers. To ensure the level of privacy it is recommended to design a clear setof policies. The agreement duly signed by both the parties will ensure the privacy ofcompany.Loss of assets: To control the privacy of data, the accessibility rules must be designed in databreach checklist. By keeping focus on above points the chances of data breach can beminimized.3
One of the Privacy Violation Incidence of Yahoo_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Law & Security - PDF
|10
|2184
|116

Data Breaching at Yahoo - Analysis and Consequences
|5
|1116
|359

JP Morgan Data Breach
|5
|722
|96

Data Breaching in Yahoo: Impact on Reputation and Finances
|7
|1761
|485

Software-Defined Networking for Data Breach Prevention: A Case Study of Myspace
|7
|1421
|457

Peer-To-Peer Communication Assignment
|5
|1170
|16