Solving Essays

Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

Question: Please describe an instance of which you are aware

Question: Please describe an instance of which you are aware

Question: Please describe an instance of which you are aware of which an act of internet crime took place.Instructions:Need minimum 250 wordsNeed 3 APA ReferencesNo plagiarism pleaseNeed 1 response to below discussion:Internet crimes are very rife these days. We have heard it in the news about many companies that have got hacked and their data compromised. These is a very genuine and big concerns for the general people. Hackers are usually after customer data from the companies. The steal the data and perform illegal activities such as identity theft, blackmailing to name a few. However, one of the biggest examples of internet crime I am aware of is the Equifax data breach in 2017.Equifax along with Experian and TransUnion is one of the three consumer credit reporting agencies in the US. They are responsible for gathering consumer information from various creditors. Consumer information usually includes their Social Security Number, physical address, phone numbers and bill paying habits. These information helps the consumers in the future when they need to take credit from the banks.In September 2017, Equifax had announced that they had become a victim of the cybercrime where the hackers had stolen personal information of about 145 million US consumers. This is considered one of the biggest data breaches in the history. According to Equifax, the hackers had stolen the Social Security numbers, date of birth, addresses, driver licenses and even credit card numbers of millions of US consumers (DeMarco Jr. & Mason, 2017). As a result of this breach, Equifax has been hit with a number of lawsuits. Equifax later explained that the breach was due to a flaw in its server. The flaw was with regards to the Apache Struts where they found a vulnerability (Ping & Johnson, 2018). Using this vulnerability, the got access to the Equifax servers and started extracting consumer information slowly so that it would not raise any alarm. The most infuriating fact about this hack is that Equifax was aware of this flaw but failed to enact in a timely manner to address the issue. Other issues Equifax had was with inadequate encryptions and ineffective breach detection systems. Equifax had failed to maintain proper security protocol which resulted in this disaster.ReferencesDeMarco Jr., E., & Mason, B. (2017, November). THE EQUIFAX DATA BREACH AND ITS CONSEQUENCES. RMA Journal, 100(3), 80-83. Retrieved from http://0-search.ebscohost.com.library.acaweb.org/l…Ping, W., & Johnson, C. (2018). CYBERSECURITY INCIDENT HANDLING: A CASE STUDY OF THE EQUIFAX DATA BREACH. Issues in Information Systems, 19(3), 150-159. Retrieved from http://0-search.ebscohost.com.library.acaweb.org/l…Instructions:Need minimum 125 words.Need 1 response to below discussion:Back in 2013 unknown and unauthorized people hacked into the Yahoo databases and personal information of people’s accounts was accessed. Although Yahoo did not disclose this fact immediately it became a major topic of discussion when the company was being sold to Verizon Communications. It is believed that approximately one billion user accounts were hacked in 2013. Another major hacking to the Yahoo user accounts also took place in 2014. Accessing unauthorized data of a different company or individual without permission is a crime and for this case, it is referred to as cybercrime.Hacking of Yahoo user accounts was a major cybercrime of the century and I being referred to as the single biggest hacking of user account belonging to the same company. It is estimated that all the three billion user accounts of Yahoo were compromised in the two major hacking instances of 2013 and 2014 respectively. Although the hacker has never been identified, there are speculations of the true identity of the real hackers.This instance of cybercrime took place at a time when digital information is very valuable and also since it concerns user accounts personal details which include usernames and passwords, such kind of information can be used to perpetrate other crimes. Digital data experts say that it is possible those in possession of such vital data to use it to access bank accounts of the Yahoo users since it is a well-known fact that people tend to use same usernames and passwords for different sites and bank accounts as well.If the data was used to access other accounts that belong to these Yahoo users, the impact could be devastating and far implicating. If such data was in the hands of cybercriminals, then it is very dangerous and other related sites had been warned to be vigilant about the same. The news of the Yahoo hacking was devastating to the business especially about the sale of Yahoo deal that had already been finalized.ReferencesCalifornia Senate Judiciary Committee. (2018). AB 375 Legislative History.Perlroth, N. (2017). All 3 billion Yahoo accounts were affected by the 2013 attack. New York Times.Redish, M. H., & Nugent, S. V. (1987). Dormant Commerce Clause and the Constitutional Balance of Federalism, The. Duke LJ, 569.Instructions:Need minimum 125 words

Can't find what you are looking for?

Post your question on solvingessays and get help from one of our expert tutors in topics ranging from mathematics to rocket science!