Data Breaching at Yahoo - Analysis and Consequences
VerifiedAdded on  2023/06/08
|5
|1116
|359
AI Summary
This article discusses the data breaches and security threats faced by Yahoo from 2012 to 2018, with a focus on the major data breach in 2014. The consequences and analysis of the breach are discussed.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: DATA BREACHING AT YAHOO
DATA BREACHING AT YAHOO
Name of the Student:
Name of the University:
Author Note:
DATA BREACHING AT YAHOO
Name of the Student:
Name of the University:
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1DATA BREACHING AT YAHOO
Introduction
The article regarding data breaches in Yahoo at 2014 has been published in MIT
Technology Review. The article is written byJamie Condliffe. The main idea of the paper is to
discuss about data and the security breaches happened in Yahoo(Condliffe 2018). The main
focus is on the data breach happened in the year 2014. The paper discusses about the
consequences those were happened due to the data breach in Yahoo.
Summary
The paper discusses about various data breaches happened in the yahoo from 2012 to
2018. However, the main focus can be set on the data breach happened in year 2014. The series
of events those have happened from 2012 to 2018 will help to identify the problems and the
areas responsible for the data breaches and the security threats in the systems of the organization.
The data breach happened in the year 2014 is regarding an attempt of hacking of the email of the
consumers. The organization had forced to admit the data breach in this case. The hackers used
list contained username and the password acquired from the third party server to hack the email
of the users(Condliffe 2018). In order to stop the data breaching yahoo rest the passwords of the
users. It can be said that Yahoo has taken immediate step to stop the data breach whichis positive
step (Dayanim and George 2018). However, the happening of this incident is not acceptable as
Yahoo is a famous organization and the users expect that this organization will provide better
security. The overall analysis indicates the type of the data breaches.
Analysis:
The topic is about the data breaches of Yahoo in 2014. However, the article has discussed
about the various security and the data breached happened in Yahoo from 2012 to 2018. The
Introduction
The article regarding data breaches in Yahoo at 2014 has been published in MIT
Technology Review. The article is written byJamie Condliffe. The main idea of the paper is to
discuss about data and the security breaches happened in Yahoo(Condliffe 2018). The main
focus is on the data breach happened in the year 2014. The paper discusses about the
consequences those were happened due to the data breach in Yahoo.
Summary
The paper discusses about various data breaches happened in the yahoo from 2012 to
2018. However, the main focus can be set on the data breach happened in year 2014. The series
of events those have happened from 2012 to 2018 will help to identify the problems and the
areas responsible for the data breaches and the security threats in the systems of the organization.
The data breach happened in the year 2014 is regarding an attempt of hacking of the email of the
consumers. The organization had forced to admit the data breach in this case. The hackers used
list contained username and the password acquired from the third party server to hack the email
of the users(Condliffe 2018). In order to stop the data breaching yahoo rest the passwords of the
users. It can be said that Yahoo has taken immediate step to stop the data breach whichis positive
step (Dayanim and George 2018). However, the happening of this incident is not acceptable as
Yahoo is a famous organization and the users expect that this organization will provide better
security. The overall analysis indicates the type of the data breaches.
Analysis:
The topic is about the data breaches of Yahoo in 2014. However, the article has discussed
about the various security and the data breached happened in Yahoo from 2012 to 2018. The
2DATA BREACHING AT YAHOO
main advantage of discussion various types of major data breaches happening over the year will
help to identify the changing pattern f the data breaches. However, the data breaching in the year
2014 was major attempt for the violation of the security. However, the organization has taken
quick steps to the prevention of the data breaching (Karatzogianni and Gak 2015). It can be said
that Yahoo has taken necessary steps. However, the expectation regarding the security of
maintaining the confidentiality of the data in a famous organization like Yahoo is high and in this
context the whole situation is not acceptable(Condliffe 2018). The cases of data breaching is
ruining the goodwill of the company which will lead to the loosing of the users using the
products and services of Yahoo. The paper has achieved the goal of analysis of the consequences
of data breaching in the Yahoo (Thomas et al. 2017). The breaching of the data can lead to the
violation of the security of the data. The hacking of the emails of various users will lead to the
serious problem (Keegan 2017). The personal information of the users can be manipulated and
this can cause the security threats for the users. The main reason for using the services provided
by Yahoo is that the goodwill of the company. Users are assured that this organization will use
advanced technology and will take care of the safety and the security of the data. The repetitive
data breaching cases at Yahoo is not good for both the organization and the users(Azzimonti and
Marks 2016). The organization has taken steps for 2014 data breaching case.It can be said with
the advancement of the technology the way of hacking of the data is becoming advanced. In
order to prevent the data breaching and maintaining the security in the systems and services of
the organization the latest technologies are needed to be adopted. The hackers got the list from
the third party organization. In this case, the negotiation of the organization with the third party
organizations are needed to be done in a proper way. On the other hand the organization needs to
choose the third party vendor in order to provide the service with collaboration carefully.
main advantage of discussion various types of major data breaches happening over the year will
help to identify the changing pattern f the data breaches. However, the data breaching in the year
2014 was major attempt for the violation of the security. However, the organization has taken
quick steps to the prevention of the data breaching (Karatzogianni and Gak 2015). It can be said
that Yahoo has taken necessary steps. However, the expectation regarding the security of
maintaining the confidentiality of the data in a famous organization like Yahoo is high and in this
context the whole situation is not acceptable(Condliffe 2018). The cases of data breaching is
ruining the goodwill of the company which will lead to the loosing of the users using the
products and services of Yahoo. The paper has achieved the goal of analysis of the consequences
of data breaching in the Yahoo (Thomas et al. 2017). The breaching of the data can lead to the
violation of the security of the data. The hacking of the emails of various users will lead to the
serious problem (Keegan 2017). The personal information of the users can be manipulated and
this can cause the security threats for the users. The main reason for using the services provided
by Yahoo is that the goodwill of the company. Users are assured that this organization will use
advanced technology and will take care of the safety and the security of the data. The repetitive
data breaching cases at Yahoo is not good for both the organization and the users(Azzimonti and
Marks 2016). The organization has taken steps for 2014 data breaching case.It can be said with
the advancement of the technology the way of hacking of the data is becoming advanced. In
order to prevent the data breaching and maintaining the security in the systems and services of
the organization the latest technologies are needed to be adopted. The hackers got the list from
the third party organization. In this case, the negotiation of the organization with the third party
organizations are needed to be done in a proper way. On the other hand the organization needs to
choose the third party vendor in order to provide the service with collaboration carefully.
3DATA BREACHING AT YAHOO
Conclusion
The discussion of this paper is regarding the data breaching cases of Yahoo. The paper
discusses about the incidents of various data breaching cases happened at Yahoo. The analysis in
this case has been focused on the data breaching case of 2014. It can be said that the data
breaching happened in 2014 can be regarded as the security threat of large scale. Yahoo has
taken certain steps to prevent data breaching however, the security system in the organization
like Yahoo should be maintained in a proper way.
Conclusion
The discussion of this paper is regarding the data breaching cases of Yahoo. The paper
discusses about the incidents of various data breaching cases happened at Yahoo. The analysis in
this case has been focused on the data breaching case of 2014. It can be said that the data
breaching happened in 2014 can be regarded as the security threat of large scale. Yahoo has
taken certain steps to prevent data breaching however, the security system in the organization
like Yahoo should be maintained in a proper way.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4DATA BREACHING AT YAHOO
References
Azzimonti, M. and Marks, A., 2016. Hacking induced externalities and the apathy of
stockholders.
Condliffe, J. 2018. A brief history of Yahoo hacks. [online] MIT Technology Review. Available
at: https://www.technologyreview.com/s/603157/a-history-of-yahoo-hacks/ [Accessed 8 Sep.
2018].
Dayanim, B. and George, E., 2018. Data breach litigation and regulatory enforcement: A survey
of our present and how to prepare for the future. Cyber Security: A Peer-Reviewed Journal, 1(4),
pp.301-315.
Karatzogianni, A. and Gak, M., 2015. Hack or be hacked: The quasi-totalitarianism of global
trusted networks. New Formations, 84(84-85), pp.130-147.
Keegan, M., 2017. It takes just one mistake for a company to be hacked. Computer Fraud &
Security, 2017(4), pp.16-18.
Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., Markov, Y., Comanescu, O.,
Eranti, V., Moscicki, A. and Margolis, D., 2017, October. Data breaches, phishing, or malware?:
Understanding the risks of stolen credentials. In Proceedings of the 2017 ACM SIGSAC
Conference on Computer and Communications Security (pp. 1421-1434). ACM.
References
Azzimonti, M. and Marks, A., 2016. Hacking induced externalities and the apathy of
stockholders.
Condliffe, J. 2018. A brief history of Yahoo hacks. [online] MIT Technology Review. Available
at: https://www.technologyreview.com/s/603157/a-history-of-yahoo-hacks/ [Accessed 8 Sep.
2018].
Dayanim, B. and George, E., 2018. Data breach litigation and regulatory enforcement: A survey
of our present and how to prepare for the future. Cyber Security: A Peer-Reviewed Journal, 1(4),
pp.301-315.
Karatzogianni, A. and Gak, M., 2015. Hack or be hacked: The quasi-totalitarianism of global
trusted networks. New Formations, 84(84-85), pp.130-147.
Keegan, M., 2017. It takes just one mistake for a company to be hacked. Computer Fraud &
Security, 2017(4), pp.16-18.
Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., Markov, Y., Comanescu, O.,
Eranti, V., Moscicki, A. and Margolis, D., 2017, October. Data breaches, phishing, or malware?:
Understanding the risks of stolen credentials. In Proceedings of the 2017 ACM SIGSAC
Conference on Computer and Communications Security (pp. 1421-1434). ACM.
1 out of 5
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.