Custom Writing Help For You!

Special Discounts Offers! 20-30% Off!

Posted: May 3rd, 2023

Information Security and Mitigations

Information Security and Mitigations
MInformation Systems
The protection of organizational and consumer data is an ever-evolving challenge for any business that maintains or handles such information. Responsibilities to protect data are inherent in all job roles and is a necessary requirement for the perseverance and livelihood of all organizations.

Select and conduct a case analysis on the Yahoo breach mentioned in the article “Five of the Biggest Data Breaches Ever.”
After you’ve selected your case and reviewed the information, write a 3–5 page paper in which you:
Identify and describe the data breach incident and the method used by the perpetrator to launch the attack (data breach).
Provide details on the time frame of the attack. Specifically, detail when it started, when it was discovered by the organization, and when it was mitigated.
Analyze how the data breach could have been prevented with the proper security controls in place.
Identify the mitigations that the organization put in place to prevent a recurrence of the attack.
Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. The Strayer University Library has many excellent resources.
Your assignment must follow these formatting requirements:
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
The specific course learning outcome associated with this assignment is:
Implement cybersecurity controls and policies to protect an organization’s assets.

________________

Data breaches have become a significant concern for businesses across the globe. These breaches not only result in monetary losses but also damage the organization’s reputation and customer trust. The Yahoo data breach is one of the most significant data breaches in history. In this paper, we will analyze the Yahoo data breach incident and identify the methods used by the perpetrator to launch the attack. We will also discuss the timeframe of the attack and how it could have been prevented with the proper security controls in place. Finally, we will identify the mitigations that Yahoo put in place to prevent a recurrence of the attack.

Yahoo Data Breach

The Yahoo data breach incident occurred in 2013 and was first reported in 2016. Yahoo reported that the breach had affected all of its 3 billion user accounts. The breach was carried out by Russian hackers, who gained access to Yahoo’s user database and stole usernames, email addresses, dates of birth, and telephone numbers. The attackers also stole encrypted passwords, but they were later discovered to have stolen Yahoo’s source code, which could have allowed them to bypass the encryption and gain access to users’ accounts.

The Method Used by the Perpetrator to Launch the Attack

The attackers used a spear-phishing attack to gain access to Yahoo’s network. The spear-phishing attack involved sending emails to Yahoo employees with a link to a fake login page. When the employee entered their login credentials, the attackers were able to capture them, giving them access to Yahoo’s network.

Time Frame of the Attack

The attack started in 2013, but it was not discovered by Yahoo until 2016. Yahoo immediately launched an investigation and found evidence of the breach. Yahoo took swift action to mitigate the attack and notified its users. Yahoo also worked with law enforcement agencies to identify and apprehend the perpetrators.

Preventing the Data Breach

The Yahoo data breach could have been prevented with the proper security controls in place. One of the primary reasons for the breach was the lack of proper security controls and procedures. Yahoo failed to implement a robust security policy that could have prevented the breach. A few security controls that could have prevented the breach are:

Two-factor authentication – Yahoo could have implemented two-factor authentication to add an extra layer of security to its user accounts. This would have made it difficult for the attackers to gain access to user accounts even if they had stolen the login credentials.

Security Awareness Training – Yahoo could have provided its employees with security awareness training to help them identify and avoid phishing emails. This could have prevented the attackers from gaining access to Yahoo’s network.

Encryption – Yahoo could have implemented encryption on its user database to prevent the attackers from accessing users’ data.

Mitigations Implemented by Yahoo

Yahoo took swift action to mitigate the data breach. Yahoo notified its users of the breach and recommended that they change their passwords. Yahoo also invalidated unencrypted security questions and answers to prevent the attackers from using them to gain access to user accounts. Yahoo implemented two-factor authentication for all of its users and also introduced new security controls and procedures to prevent a recurrence of the attack.

Conclusion

The Yahoo data breach is a clear example of why organizations need to implement robust security controls and procedures to protect their data. The breach not only resulted in significant monetary losses but also damaged Yahoo’s reputation and customer trust. The breach could have been prevented with

Tags: ,

Order for this Paper or similar Answer/Assignment Writing Service

Place your order by filling a guided instructions form in 3 easy steps.

Why choose our Study Bay Services?

Like every student, Focusing on achieving the best grades is our main goal

Top Essay Writers

We have carefully cultivated a team of exceptional academic writers, each with specialized expertise in particular subject areas and a proven track record of research writing excellence. Our writers undergo rigorous screening and evaluation to ensure they hold relevant advanced degrees and demonstrate mastery of English grammar, citation style, and research methodology. Recent projects completed by our writers include research papers on topics such as sustainable energy policy, cognitive behavioral therapy, and molecular genetics.

Student-Based Prices

We prioritize attracting highly skilled writers through competitive pay and strive to offer the most cost-effective services for students. References from recent years include surveys of customer satisfaction with online writing services conducted by the American Customer Satisfaction Index between 2018 to 2022, demonstrating our commitment to balancing affordable costs with high standards of work through positive reviews and retention of expert writers.

100% Plagiarism-Free

We guarantee 100% original and plagiarism-free final work through a thorough scanning of every draft copy using advanced plagiarism detection software before release, ensuring authentic and high-quality content for our valued customers. To note, we also do not generate assignment content with AI tool, thus you a guaranteed 0% similarity index for your final research paper.

How it works

When you decide to place an order with Study Pro Essay, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and,the support and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.