Review the given post related to hoop up sites

Assignment Help Computer Engineering
Reference no: EM132165945

Question: One of the world's largest hoop up sites, which has over 40 million members who logged in at least once every two years was attacked in the month of October in 2016, The social site contained over 339 million subscribers with the addition to other sites that consisted of over 62 million, 7 million, and 2.5 million users within the domain of the sites combined. The breach exposed a total of over 412 million accounts, passwords, last visited sites, browser information, Ip addresses, and membership status across the network's domain. The breach also went to the extent that deleted accounts that still had information on the servers may also have been compromised and the fact that the information obtained could be used for blackmail or if the information pulled from the breach was made public then the integrity of a person's personal privacy could be at risk.

The organization reacted by stating that the reports received pertaining to potential security vulnerabilities were false claims that proved to be false extortion attempts. The organization also stated that identified issues such as a vulnerability that was related to the ability to access source code was patched and now more secure then ever. According to the security director the breach could not be explained, and he stated the company has majorly flawed security practices (Martin, 2016). To rectify and mitigate the situation the company used was a cryptography hash with a SHA-1 algorithm which is a cryptographic hash function that takes the input and produces a 160-bit hash value known as a message digest that usually rendered as a hexadecimal number that consist of 40 digits. The implications of the security breach were simple and easy passwords that were allowed, common email address was included instead of a unique user name, and the servers log data base login information was stored as lower case which made it easier to hack. The hackers were able to penetrate the site by a vulnerability known as "1x0123" also known as "revolver" which consisted of unprotected local file inclusions flaws that allowed further access to the company's internal databases (Cluley, 2016 ).

Some lessons learned from this incident is to not take security for granted the company had multiple acknowledgements regarding security flaws within there websites but never toke them serious. Also keeping up with technology would have prevented flaws in the company's security measures the company was using cryptography when they could have been using VPN tunneling or encryption. If the company doesn't reevaluate their sites security practices this may well happen again seeing that a few years after the first attract another attract was introduce in relation to the previous.

Reference: 339 Million adult friend finder accounts exposed. (2016, November 14).

Adult friend finder and penthouse in massive personal data breach. (2016, November 14).

Adultfriendfinder data breach. (2016, November 14).

Reference no: EM132165945

Questions Cloud

Develop a mind-map for mcdonald to solve the problem : Q1. How you can solve the problem? Use the critical thinking steps Q2. Develop a mind-map for McDonald to solve the problem.
Develop targeted direct mailings and emails : In a highly controversial move, your favorite social network has just agreed to allow Walmart access to the postings, messages, and photos of its users.
How much will the company pay in separation costs : The exit interviews are estimated to cost $100 per employee, How much will company pay in separation costs if these exit interviews are implemented next year
Cultures accepting of individual and collective conflict : Why do some organisations have industrial relations cultures accepting of individual and collective conflict and others
Review the given post related to hoop up sites : One of the world's largest hoop up sites, which has over 40 million members who logged in at least once every two years was attacked in the month of October.
Strategic drivers to assess annually : How would one determine the appropriate measurements and strategic drivers to assess annually?
Determine which types of managers create each type of plan : Describein a total of 175 words the strategic, tactical, and operational plans employed by the company.
Management is a skilled combination of planning : Management is a skilled combination of planning, organizing, leading and controlling; yet, many feel that the job of a mid-level manager is a difficult one.
Responsibilities in relation to organizational objectives : Explain how you would identify and understand roles and responsibilities in relation to organizational obj ectives, policies and procedures

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd