Write a critical analysis of Yahoo's 2014 Data Breach.
To understand how to write the critical analysis, use the following as guidelines:
Use various sources such as newspapers, magazines, publications, journals, books etc..
Note: Please ensure to understand the purpose of critical analysis as per the guidelines
Data Breaching at Yahoo
The article regarding data breaches in Yahoo at 2014 has been published in MIT Technology Review. The article is written by Jamie Condliffe. The main idea of the paper is to discuss about data and the security breaches happened in Yahoo(Condliffe 2018). The main focus is on the data breach happened in the year 2014. The paper discusses about the consequences those were happened due to the data breach in Yahoo.
The paper discusses about various data breaches happened in the yahoo from 2012 to 2018. However, the main focus can be set on the data breach happened in year 2014. The series of events those have happened from 2012 to 2018 will help to identify the problems and the areas responsible for the data breaches and the security threats in the systems of the organization. The data breach happened in the year 2014 is regarding an attempt of hacking of the email of the consumers. The organization had forced to admit the data breach in this case. The hackers used list contained username and the password acquired from the third party server to hack the email of the users(Condliffe 2018). In order to stop the data breaching yahoo rest the passwords of the users. It can be said that Yahoo has taken immediate step to stop the data breach whichis positive step (Dayanim and George 2018). However, the happening of this incident is not acceptable as Yahoo is a famous organization and the users expect that this organization will provide better security. The overall analysis indicates the type of the data breaches.
The topic is about the data breaches of Yahoo in 2014. However, the article has discussed about the various security and the data breached happened in Yahoo from 2012 to 2018. The main advantage of discussion various types of major data breaches happening over the year will help to identify the changing pattern f the data breaches. However, the data breaching in the year 2014 was major attempt for the violation of the security. However, the organization has taken quick steps to the prevention of the data breaching (Karatzogianni and Gak 2015). It can be said that Yahoo has taken necessary steps. However, the expectation regarding the security of maintaining the confidentiality of the data in a famous organization like Yahoo is high and in this context the whole situation is not acceptable(Condliffe 2018). The cases of data breaching is ruining the goodwill of the company which will lead to the loosing of the users using the products and services of Yahoo. The paper has achieved the goal of analysis of the consequences of data breaching in the Yahoo (Thomas et al. 2017). The breaching of the data can lead to the violation of the security of the data. The hacking of the emails of various users will lead to the serious problem (Keegan 2017). The personal information of the users can be manipulated and this can cause the security threats for the users. The main reason for using the services provided by Yahoo is that the goodwill of the company. Users are assured that this organization will use advanced technology and will take care of the safety and the security of the data. The repetitive data breaching cases at Yahoo is not good for both the organization and the users(Azzimonti and Marks 2016). The organization has taken steps for 2014 data breaching case.It can be said with the advancement of the technology the way of hacking of the data is becoming advanced. In order to prevent the data breaching and maintaining the security in the systems and services of the organization the latest technologies are needed to be adopted. The hackers got the list from the third party organization. In this case, the negotiation of the organization with the third party organizations are needed to be done in a proper way. On the other hand the organization needs to choose the third party vendor in order to provide the service with collaboration carefully.
The discussion of this paper is regarding the data breaching cases of Yahoo. The paper discusses about the incidents of various data breaching cases happened at Yahoo. The analysis in this case has been focused on the data breaching case of 2014. It can be said that the data breaching happened in 2014 can be regarded as the security threat of large scale. Yahoo has taken certain steps to prevent data breaching however, the security system in the organization like Yahoo should be maintained in a proper way.
Azzimonti, M. and Marks, A., 2016. Hacking induced externalities and the apathy of stockholders.
Condliffe, J. 2018. A brief history of Yahoo hacks. [online] MIT Technology Review. Available at: https://www.technologyreview.com/s/603157/a-history-of-yahoo-hacks/ [Accessed 8 Sep. 2018].
Dayanim, B. and George, E., 2018. Data breach litigation and regulatory enforcement: A survey of our present and how to prepare for the future. Cyber Security: A Peer-Reviewed Journal, 1(4), pp.301-315.
Karatzogianni, A. and Gak, M., 2015. Hack or be hacked: The quasi-totalitarianism of global trusted networks. New Formations, 84(84-85), pp.130-147.
Keegan, M., 2017. It takes just one mistake for a company to be hacked. Computer Fraud & Security, 2017(4), pp.16-18.
Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., Markov, Y., Comanescu, O., Eranti, V., Moscicki, A. and Margolis, D., 2017, October. Data breaches, phishing, or malware?: Understanding the risks of stolen credentials. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1421-1434). ACM.