Question

In: Computer Science

Case Study 1 (Hundreds of millions of social media accounts compromised by data breach) Published on...

Case Study 1 (Hundreds of millions of social media accounts compromised by data breach) Published on August 18, 2020.

Security researchers have discovered an exposed database online which contains scraped data from the social media profiles of nearly 235m social media users. For those unfamiliar with the practice, web scraping is an automated technique used to gather data from websites that is often employed by analytics firms who use it to create large databases of user information. Although the practice is legal, it is strictly prohibited by social media companies as it puts the privacy of their users and their data at risk.

Comparitech's lead researcher Bob Diachenko discovered three identical copies of the exposed database online at the beginning of August. After examining the database, Diachenko and his team learned that it belonged to a company called Deep Social which has shut down its operations. When the team reached out to the now-defunct company, its request was forwarded to a Hong Kong based firm called Social Data. While Social Data denied having any connection to Deep Social, the firm did acknowledge the breach and was able to secure the exposed database with a password.

Q1. While scraping user data from social media sites is not illegal, failing to secure this data after it has been collected poses a serious risk to the affected users as cybercriminals could use the information from the database to target them online. What are your recommendations to the online risk policy makers as you think it is a breach of PII (Personal Identifiable Information). Justify your answer. Explain the need for cybersecurity experts in such a case scenario. [5 marks + 4 marks + 1 mark for Referencing Style = 10 marks]

Solutions

Expert Solution

Cyber Security

A cyber attack is accessing data without the knowledge of a user and this data may be used for some illegal activities.

While we are using data in the social media site or any other platforms there is a possibility of data breach.

Data Breach is an incident in which information is accessed without authorization. Due to such cases we may lost our personal information, financial data like credit card, debit card details, online banking data etc.

These data Hackers seek personally identifiable information to steal money, compromise identities, or sell the data over the dark net.

Normally a data breach can occur these ways:

1. Exploiting the system vulnerabilities.

If our system has an out-dated software, then it creates a hole to attacker to attack easily for stealing the data.

2. Weak Passwords.

If we are using simple or predictable passwords for the hacker, then it is easier to hack our system. That is the reason to choose a strong password in all situations.

3. Drive by downloads.

If we download anything on the internet. It may be a virus or malware. Or it contains virus attacks. In some cases, the hacker can easily enter into our system even if we have some less fault.

4. Targeted Malware Attack.

Normally an attack is occurred through our email account. These types of mails are mostly spams. So, the best action is to recommend not to open any mails with unknown sender.

Data Scrapping is also known as Wed scrapping is the process of importing information from a website into a spreadsheet or local file saved on your computer. This is the most efficient way to get data from the web. And the scrapper use these data or sell the data for any kind of misuse activities.

The data breach and data scrappers are make the user data in an unauthorized way like money looting, stealing of data and kind of terrorist activities.

So, a Cyber security experts can identify these risk and also reduce it from the root level. these experts use efficient mechanism for avoiding such types of attck from the attcker.


Related Solutions

Case Study (Hundreds of millions of Instagram, TikTok, YouTuube accounts compromised by data breach) Published on...
Case Study (Hundreds of millions of Instagram, TikTok, YouTuube accounts compromised by data breach) Published on August 18, 2020. Security researchers have discovered an exposed database online which contains scraped data from the social media profiles of nearly 235m Instagram, TikTok and YouTuube users. For those unfamiliar with the practice, web scraping is an automated technique used to gather data from websites that is often employed by analytics firms who use it to create large databases of user information. Although...
1- Social deviance is a breach of ________; crime is a breach of ________. a. society;...
1- Social deviance is a breach of ________; crime is a breach of ________. a. society; persons b. norms; law c. propriety; decency d. private norms; public norms 2- J. P. Morgan trader Bruno Iksil placed a giant risky trade and lost $6 billion for the bank. His boss and assistant conspired to cover up the losses by filing false reports. These crimes are known as: a. corporate crimes. b. violations. c. violent crimes. d. street crimes 3- The student...
Case study - customers Businesses of all sizes are finding Facebook, Twitter, and other social media...
Case study - customers Businesses of all sizes are finding Facebook, Twitter, and other social media to be powerful tools for engaging customers, amplifying product messages, discovering trends and influencers, building brand awareness, and taking action on customer requests and recommendations. Half of all Twitter users recommend products in their tweets. About 1.6 billion people use Facebook, and more than 30 million businesses have active brand pages, enabling users to interact with the brand through blogs, comment pages, contests, and...
Case Incident: Organizational Leveraging of Social Media As you know, social media have transformed the way...
Case Incident: Organizational Leveraging of Social Media As you know, social media have transformed the way we interact. The transparent, rapid-fire communication they make possible means people can spread information about companies more rapidly than ever. Do organizations understand yet how to use social media effectively? Perhaps not. Recent findings indicated that only three out of ten CEOs in the Fortune 500 have any presence on national social media sites. Many executives are wary of these new technologies because they...
Define, explain and give a case study example of the following terms: • Remedies of Breach...
Define, explain and give a case study example of the following terms: • Remedies of Breach • Implied Warranties • Intangible Property
1. How are social media sites affecting social influence?
1. How are social media sites affecting social influence?2. Why do companies sometimes target opinion leaders for marketing attention?3. Why is word of mouth so important for marketers?
please!!!!!!!!!!!!!1 To study how social media may influence the products consumers​ buy, researchers collected the opening...
please!!!!!!!!!!!!!1 To study how social media may influence the products consumers​ buy, researchers collected the opening weekend box office revenue​ (in millions of​ dollars) for 23 recent movies and the social media message rate​ (average number of messages referring to the movie per​ hour). The data are available below. Conduct a complete simple linear regression analysis of the relationship between revenue​ (y) and message rate​ (x). Q1: Determine the estimate of the standard deviation. s=????? Q2: What is the test...
1. The data below show the volume of transactions​ (in hundreds of​ thousands) in shares of...
1. The data below show the volume of transactions​ (in hundreds of​ thousands) in shares of a corporation over a period of 12 weeks. Using these​ data, estimate a​ first-order autoregressive​ model, and use the fitted model to obtain forecasts of volume for the next 3 weeks. Week   Trading Volume 1   27.8 2   14.6 3   14.4 4   13.8 5   23.4 6   17.8 7   7.2 8   25.3 9   21.8 10   17.2 11   26.5 12   21.5 The estimated​ first-order autoregressive model is...
While scraping user data from social media sites is not illegal, failing to secure this data...
While scraping user data from social media sites is not illegal, failing to secure this data after it has been collected poses a serious risk to the affected users as cybercriminals could use the information from the database to target them online. What are your recommendations to the online risk policy makers as you think it is a breach of PII (Personal Identifiable Information). Justify your answer. Explain the need for cybersecurity experts in such a case scenario.
While scraping user data from social media sites is not illegal, failing to secure this data...
While scraping user data from social media sites is not illegal, failing to secure this data after it has been collected poses a serious risk to the affected users as cybercriminals could use the information from the database to target them online. What are your recommendations to the online risk policy makers as you think it is a breach of PII (Personal Identifiable Information). Justify your answer. Explain the need for cybersecurity experts in such a case scenario. Hackerssuccessfully infiltrated...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT