Information Security and Mitigations
MInformation Systems
The protection of organizational and consumer data is an ever-evolving challenge for any business that maintains or handles such information. Responsibilities to protect data are inherent in all job roles and is a necessary requirement for the perseverance and livelihood of all organizations.
Select and conduct a case analysis on the Yahoo breach mentioned in the article “Five of the Biggest Data Breaches Ever.”
After you’ve selected your case and reviewed the information, write a 3–5 page paper in which you:
Identify and describe the data breach incident and the method used by the perpetrator to launch the attack (data breach).
Provide details on the time frame of the attack. Specifically, detail when it started, when it was discovered by the organization, and when it was mitigated.
Analyze how the data breach could have been prevented with the proper security controls in place.
Identify the mitigations that the organization put in place to prevent a recurrence of the attack.
Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. The Strayer University Library has many excellent resources.
Your assignment must follow these formatting requirements:
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
The specific course learning outcome associated with this assignment is:
Implement cybersecurity controls and policies to protect an organization’s assets.
________________
Data breaches have become a significant concern for businesses across the globe. These breaches not only result in monetary losses but also damage the organization’s reputation and customer trust. The Yahoo data breach is one of the most significant data breaches in history. In this paper, we will analyze the Yahoo data breach incident and identify the methods used by the perpetrator to launch the attack. We will also discuss the timeframe of the attack and how it could have been prevented with the proper security controls in place. Finally, we will identify the mitigations that Yahoo put in place to prevent a recurrence of the attack.
Yahoo Data Breach
The Yahoo data breach incident occurred in 2013 and was first reported in 2016. Yahoo reported that the breach had affected all of its 3 billion user accounts. The breach was carried out by Russian hackers, who gained access to Yahoo’s user database and stole usernames, email addresses, dates of birth, and telephone numbers. The attackers also stole encrypted passwords, but they were later discovered to have stolen Yahoo’s source code, which could have allowed them to bypass the encryption and gain access to users’ accounts.
The Method Used by the Perpetrator to Launch the Attack
The attackers used a spear-phishing attack to gain access to Yahoo’s network. The spear-phishing attack involved sending emails to Yahoo employees with a link to a fake login page. When the employee entered their login credentials, the attackers were able to capture them, giving them access to Yahoo’s network.
Time Frame of the Attack
The attack started in 2013, but it was not discovered by Yahoo until 2016. Yahoo immediately launched an investigation and found evidence of the breach. Yahoo took swift action to mitigate the attack and notified its users. Yahoo also worked with law enforcement agencies to identify and apprehend the perpetrators.
Preventing the Data Breach
The Yahoo data breach could have been prevented with the proper security controls in place. One of the primary reasons for the breach was the lack of proper security controls and procedures. Yahoo failed to implement a robust security policy that could have prevented the breach. A few security controls that could have prevented the breach are:
Two-factor authentication – Yahoo could have implemented two-factor authentication to add an extra layer of security to its user accounts. This would have made it difficult for the attackers to gain access to user accounts even if they had stolen the login credentials.
Security Awareness Training – Yahoo could have provided its employees with security awareness training to help them identify and avoid phishing emails. This could have prevented the attackers from gaining access to Yahoo’s network.
Encryption – Yahoo could have implemented encryption on its user database to prevent the attackers from accessing users’ data.
Mitigations Implemented by Yahoo
Yahoo took swift action to mitigate the data breach. Yahoo notified its users of the breach and recommended that they change their passwords. Yahoo also invalidated unencrypted security questions and answers to prevent the attackers from using them to gain access to user accounts. Yahoo implemented two-factor authentication for all of its users and also introduced new security controls and procedures to prevent a recurrence of the attack.
Conclusion
The Yahoo data breach is a clear example of why organizations need to implement robust security controls and procedures to protect their data. The breach not only resulted in significant monetary losses but also damaged Yahoo’s reputation and customer trust. The breach could have been prevented with