Review the given post related to hoop up sites

Assignment Help Computer Engineering
Reference no: EM132165945

Question: One of the world's largest hoop up sites, which has over 40 million members who logged in at least once every two years was attacked in the month of October in 2016, The social site contained over 339 million subscribers with the addition to other sites that consisted of over 62 million, 7 million, and 2.5 million users within the domain of the sites combined. The breach exposed a total of over 412 million accounts, passwords, last visited sites, browser information, Ip addresses, and membership status across the network's domain. The breach also went to the extent that deleted accounts that still had information on the servers may also have been compromised and the fact that the information obtained could be used for blackmail or if the information pulled from the breach was made public then the integrity of a person's personal privacy could be at risk.

The organization reacted by stating that the reports received pertaining to potential security vulnerabilities were false claims that proved to be false extortion attempts. The organization also stated that identified issues such as a vulnerability that was related to the ability to access source code was patched and now more secure then ever. According to the security director the breach could not be explained, and he stated the company has majorly flawed security practices (Martin, 2016). To rectify and mitigate the situation the company used was a cryptography hash with a SHA-1 algorithm which is a cryptographic hash function that takes the input and produces a 160-bit hash value known as a message digest that usually rendered as a hexadecimal number that consist of 40 digits. The implications of the security breach were simple and easy passwords that were allowed, common email address was included instead of a unique user name, and the servers log data base login information was stored as lower case which made it easier to hack. The hackers were able to penetrate the site by a vulnerability known as "1x0123" also known as "revolver" which consisted of unprotected local file inclusions flaws that allowed further access to the company's internal databases (Cluley, 2016 ).

Some lessons learned from this incident is to not take security for granted the company had multiple acknowledgements regarding security flaws within there websites but never toke them serious. Also keeping up with technology would have prevented flaws in the company's security measures the company was using cryptography when they could have been using VPN tunneling or encryption. If the company doesn't reevaluate their sites security practices this may well happen again seeing that a few years after the first attract another attract was introduce in relation to the previous.

Reference: 339 Million adult friend finder accounts exposed. (2016, November 14).

Adult friend finder and penthouse in massive personal data breach. (2016, November 14).

Adultfriendfinder data breach. (2016, November 14).

Reference no: EM132165945

Questions Cloud

Develop a mind-map for mcdonald to solve the problem : Q1. How you can solve the problem? Use the critical thinking steps Q2. Develop a mind-map for McDonald to solve the problem.
Develop targeted direct mailings and emails : In a highly controversial move, your favorite social network has just agreed to allow Walmart access to the postings, messages, and photos of its users.
How much will the company pay in separation costs : The exit interviews are estimated to cost $100 per employee, How much will company pay in separation costs if these exit interviews are implemented next year
Cultures accepting of individual and collective conflict : Why do some organisations have industrial relations cultures accepting of individual and collective conflict and others
Review the given post related to hoop up sites : One of the world's largest hoop up sites, which has over 40 million members who logged in at least once every two years was attacked in the month of October.
Strategic drivers to assess annually : How would one determine the appropriate measurements and strategic drivers to assess annually?
Determine which types of managers create each type of plan : Describein a total of 175 words the strategic, tactical, and operational plans employed by the company.
Management is a skilled combination of planning : Management is a skilled combination of planning, organizing, leading and controlling; yet, many feel that the job of a mid-level manager is a difficult one.
Responsibilities in relation to organizational objectives : Explain how you would identify and understand roles and responsibilities in relation to organizational obj ectives, policies and procedures

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain the difference between a weak and strong entity set

Explain the difference between a weak and a strong entity set. Define the concept of aggregation. Give two examples of where this concept is useful.

  Give appropriate to string methods for all classes

create a class Employee with a name and salary.give appropriate to String methods for all classes

  Derive ones and twos complement

Following the conversion technique of the preceding problem, convert (2574), to base 3. If (130)x = (28)10, find the value of X (X is a positive integer).

  1 search the web mainly ieee and acm publication databases

1. search the web mainly ieee and acm publication databases to find a recent article on a biomedical application using

  Assess the techniques used for memory management policy

Assess the techniques used for memory management policy and mechanism separation and their utility in managing complexity.

  Explain what is importance of testing for the vulnerability

Explain What is the importance of testing for this vulnerability? What happens when you attempt to add a pop-up window to the email input field?

  Implement a text-only version of the game hangman

The game should pick a random word from the dictionary using rules of your choosing. Give the user a series of chances to guess the letters in it.

  Write a program that prompts the user for name of code file

Write a program that prompts the user for the name of a Java source code file. The program shall read the source code file and output the contents to new file.

  Write a program which requests that the user enters model

Write a program which requests that the user enters a computer model, year purchased, blue plate number and owner.

  Is quality simply a matter of coordinating excellent

Is quality simply a matter of coordinating excellent organizational effort? Can quality be simplified to this degree? Or is quality about much more?

  Identify shadow are b a scene illuminated by a distant point

Set up an algorithm. h used on one of the visible-surface dt le( non methods, that %% di identify shadow are.b 11 a scene illuminated by a distant point source.

  What are the unicode characters

What are the ASCII characters? What are the Unicode characters? What are the major differences and similarities of ASCII and Unicode characters?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd