Question

In: Operations Management

(please type the answers) (system and technology 5360)case 5-1: Yahoo Wins the Gold and Silver Me......

(please type the answers) (system and technology 5360)case 5-1: Yahoo Wins the Gold and Silver Me...
(please type the answers) (system and technology 5360)

case 5-1: Yahoo Wins the Gold and Silver Medal for the Worst Hacks in History, case study listed below

Yahoo Wins the Gold and Silver Medal for the Worst Hacks in History!
It wasn’t until Fall 2016 that Yahoo alerted its users and the public to the first of two of the largest known breaches of user information in history that had occurred 2–3 years earlier. On September 22, 2016, Yahoo publicly disclosed that over 1 billion Yahoo account records were stolen in mid-2013. A second news release on December 15, 2016, revealed a second attack that occurred in 2014 when the account information of over 500 million Yahoo account holders was breached. The delay in reporting is partly due to the fact that Yahoo itself did not know of the breach until shortly before releasing these statements to the public. The information leaked in the attacks included e-mail accounts, telephone numbers, street addresses, unencrypted security questions and answers, but no financial information.

To add insult to injury, at the time of the first news release, Yahoo was in negotiations with mega-corporation Verizon to acquire Yahoo for $4.83 billion. After the first news release, Verizon said that the announcement could have a negative impact on their purchasing decision. The second news release caused Verizon to further review the financial implications of the two breaches and reduce its offer by $350 million.

The 2013 breach was conducted by an unknown unauthorized third party. The information stolen in the 2014 attack was sold by a “state-sponsored actor” on the Dark Web for 3 Bitcoins (approx. $1,900). The actor, who used the name “Peace” is of Russian origin and attempted to sell data from 200 million Yahoo users online. Yahoo urged all of its users to change their passwords and security questions and to review their accounts for suspicious activity. To date, little information has been released on the 2013 breach, but more is known about the incident that occurred in 2014.

How the Second Attack was Carried Out

The data theft was similar to the way in which a typical online attack of a database is carried out. The protections used for database containing the login and personal information were insufficient to protect against the advanced methods used by the hackers. In this case, the encryption method employed in the database was broken by the hacker. Additionally, cybercrime analyst Vitali Kremez maintains that the hacker stole the information from Yahoo slowly and methodically so as to not draw attention to the breach taking place.

Since the breach was not immediately detected, the hacker had plenty of time to leverage the information in a financially, personal, or politically beneficial manner. It is not clear if the seller is the original hacker.

Impact of the Data Breach

Since the breaches were so devastating and far reaching to most of Yahoo’s customer base, Verizon is having second thoughts about the acquisition. Craig Silliman, general counsel to Verizon, said Verizon has “a reasonable basis” to believe that the data breach will have a significant impact on the deal proceedings and the likelihood that it will actually happen (Fiegerman, 2016). He furthers to explain that Yahoo will have to convince Verizon that the breach will not affect future processes in the company and that more security features have been and will be implemented. Also, the incidents could make the Yahoo deal worth about $200 million less than the $4.8 billion initially settled upon. In addition to the decreased value of Yahoo’s core assets, the company’s stock fell about 2% after the comments by Craig Silliman.

Justice is Served

On March 17, 2017, the U.S. Department of Justice indicted two Russian Intelligence agents and two state-sponsored hackers, Alexsey Belan and Karim Baratov, for the theft of the Yahoo user data in 2014. Belan, one of the FBI’s most notorious criminal hackers, had been previously indicted in two other cases. In the indictments it was revealed that the targets of the theft included Russian journalists, U.S. and Russian government officials, military personnel, and private-sector employees of financial, transportation, and other companies (Balakrishnan, 2017).

The obvious issue surrounding the Yahoo data breaches is Internet security. Simple username, password, and security questions simply are not enough to keep hackers at bay. UC Davis professor Hemant Bhargava notes that two-factor authentication (TFA) is successful in many other companies and that Yahoo should follow suit (Matwyshyn & Bhargava, 2016). An example of TFA would be that a user is asked to enter information such as username and password, then a mobile app generates and sends a random number code for the user to enter before being granted access to his or her account. Both the Yahoo account and the mobile app are linked to a common, secure account. This method is exceptionally popular and useful since over 50% of Web users access the Web through their mobile phones.



question 1. provide a detailed overview of the case study and a detailed problem statement of the case study

Solutions

Expert Solution

System and Technology 5360 : Case 5-1 : Yahoo wins Gold and Seilver Medal for the worst hacks in History

Yahoo revealed on September 22, 2016 about data breach of user information history that occurred in mid 2013. The breach was conducted by an unknown unauthorized third party. One more news released on December 15, 2016 that a second data theft happened on 2014 of about 500 million Yahoo account holders. The stolen information was attempted to sell by a Russian actor named “Peace” in Dark Web for 3 Bitcoins.

Yahoo was late to reveal these information’s to their users until 2016 as they themselves were unaware of the fact that the breach has occurred. Yahoo urged it’s users to monitor their accounts for suspicious activities and also to change passwords and security questions.

The leaked information’s were about users e-mail accounts , telephone numbers, street addresses, unencrypted security questions and unencrypted security question and answers. Luckily there was no financial information leaked.

On March 17, 2017, the US department of Justice indicated involvement of two Russian Intelligence agents and two state sponsored hackers Alexsey Belan and Karim Baratov. The targets of the theft were Russian Journalists, U.S. and Russian government officials, military personnel and Private sector employees of financial, transportation and other companies.

According to the cybercrime analyst Vitali Kremez revealed that yahoo’s data encryption was not advanced enough to stop the advanced hacking techniques. The hackers were doing the hacking process slowly and methodically to avoid Yahoo’s attention towards the hacking. The slow data breach process gave the hackers to gain maximum advantage of the information in a financial, political and personal beneficial manner.

Verizon was about to buy Yahoo for $4.83 billion when the first attack news was released on 2016. As Yahoo announced about the attacks one after another in 2016, it impacted Verizon’s acquisition decision and they have reduced the final offer by $350 million. Verizon also insisted Yahoo to promise that this kind of data breach will not happen in future and to implement more security.

PROBLEM STATEMENT:

Simple Username, password and Security questions were the only protective barriers that hackers had to breach to access Yahoo user information’s. These security measures were not enough to stop the advanced hacking methods used by the hackers.

Yahoo was advised to use the two – factor authentication method (TFA) where the Yahoo account and a mobile application will be linked to a common secure account. In TFA when a user enters username and password, an authentication code is being sent to the registered mobile number for the user to enter and verify so that the user can be granted access to their accounts. This is a far more secure and encrypted protection method of a user account than mere password and security questions.


Related Solutions

Please explain 1-5 for me the answers. If you friend (Brittnay) came up to you and...
Please explain 1-5 for me the answers. If you friend (Brittnay) came up to you and started talking about brad the chess club captain. A few minutes into the conversation, she starts to hyperventilate at the thought of talking to brad and gets dizzy and confused. But in typical, Brittnay fashion she doesn't stop. To help her out of her stupor, you have several options. You have several options that may or may not help, so please explain how each...
please provide me an answers for the questions below using the above case study. and also...
please provide me an answers for the questions below using the above case study. and also please provide me the references used for the information. thank you Case study: Asthma The nursing instructor is discussing asthma and its various treatments with the students. The instructor tasks the students with preparing a patient teaching brochure about the use of the leukotriene receptor antagonists (LTRA) montelukast (Singulair®) in the treatment of asthma. 1. What information will the students include in the brochure...
Please submit your Excel file and highlight your answers in color. Brief Case Has Gold Lost...
Please submit your Excel file and highlight your answers in color. Brief Case Has Gold Lost its Luster? In 2011, when the Gallup organization polled investors, 34% rated gold the best long-term investment. However, in April of 2013 Gallup surveyed a random sample of U.S. adults. Respondents were asked to select the best long-term investment from a list of possibilities. Only 241 of the 1005 respondents chose gold as the best long-term investment. A. With 95% confidence, compute the margin...
can you please give me short answers only 4 or 5 sentence and please could you...
can you please give me short answers only 4 or 5 sentence and please could you tpye the answers i do not want handwriting,,, You are creating a model for a manufacturing company with four major plants and ten warehouses. They want to reduce costs by determining the optimal number and location of the plants and warehouses. During the initial set of meetings, one of the team members is very concerned about modeling the “samples” that the firm sends out....
Can someone please answer this and please type the answers for these. 1. Assume that TexCo...
Can someone please answer this and please type the answers for these. 1. Assume that TexCo is a widget manufacturer. It costs TexCo $62 (parts and labor) to manufacture each unit, and it incurs fixed overhead of $2.5 million per year. If TexCo prices the widgets using a 40% markup on cost, how many widgets must it sell annually in order to break even? Show your work? 2. Based on your answer to #1, if TexCo actually sells 150,000 units...
Why did the gold standard collapse? Is there a case for returning to some type of...
Why did the gold standard collapse? Is there a case for returning to some type of gold standard? What is it?
PLEASE TYPE YOUR ANSWERS Case Study Jan Hartman has interviewed for a nurse manager position on...
PLEASE TYPE YOUR ANSWERS Case Study Jan Hartman has interviewed for a nurse manager position on an oncology unit at a teaching hospital in Kansas City, Missouri. She enjoys empowering her employees and is looking for an organization that has a decentralized organizational structure. During her interview, Nurse Hartman notices that the clinical nurses take problems to the charge nurse, the nurse manager frequently contacts the director of nursing, and the physicians go directly to the charge nurse for information....
Could you give me the answers for these from the case studies in Introduction to sport...
Could you give me the answers for these from the case studies in Introduction to sport law 2nd edition: Case 2.1 1. According to the court’s decision, what was the general rule pertaining to the liability of the baseball club for the acts of one of its players? 2. What risk management implications does this case have regarding event management? How can this case be utilized to further you understand of your future career in athletics? Case 2.3 1. What...
Please type responses as it is difficult for me to see written responses. Thank you 1)...
Please type responses as it is difficult for me to see written responses. Thank you 1) How does understanding the correlation between variables help us understand regression? 2) Provide two ways on how you might use regression while teaching a classroom of children. 3) What is one easy way to remember the differences between parametric and nonparametric tests? (Note: I'm not asking you to list the differences but HOW you can remember the differences. Feel free to be creative here...
TYPE ANSWERS 1. Be able to identify and calculate different types of taxes, the tax system...
TYPE ANSWERS 1. Be able to identify and calculate different types of taxes, the tax system in the United States, and important tax terminology Be able to prepare a comprehensive budget, and know how to classify different sources of income and expenses Understand contract terminology and terminology associated with checking and banking Know what a bank reconciliation is, its purpose, and the basic idea of how it is done
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT