Data Hack at Monster.com - Case Study Example

Only on StudentShare

Extract of sample
Data Hack at Monster.com

The types of service offered include help with resumes, cover letters, company research, networking, and advice targeted to individuals whose careers are currently in a transitional state. Career-management advisors are on hand for daily chats if required. The site is well organized and easy to navigate.
The site is well established and has been in existence since it was formed in 1999. It has the largest job search engine in the world. As this hacking case proves however, the security aspect of the site has left a lot to be desired. Monster.com has addressed these issues. However, nothing in internet security is foolproof as will be seen in this report.
The hackers had stolen the login credentials by use of "phishing" (the cloning of websites) techniques, and managed to extract several personal details. The BBC claimed in their news article on the topic that the stolen data would most likely be used to send phishing and spam emails. However, this was not the true purpose as was later discovered.
The fraud in operation was typically, identity theft, as opposed to a lapse of security on the Monster.com website. This occurred via a Trojan. ...
Download paper

Summary

In August, 2007, there was a major security alert at the online job web site Monster.com after hackers stole 1.6 million online records from the internet job search site, including the personal information of several hundred thousand job seekers. The candidates' personal details, such as name, surname, email address, country, home address, work/mobile/home phone numbers and resume ID, were then uploaded to a remote server under the control of the attackers…
Author : tamara79

Tags

Data

Related Essays

Data Warehouse assignment
The data was analyzed with respect to the time dimension - week. Sales were analyzed against the customers weekly. It was identified that the sales amount graph for the six weeks of 2005 for ALL the customers generated the following trend:…
11 pages (2761 words) Essay
Data Loss Prevention
Although the number of incidents regarding personal data loss would normally be expected to decrease due to the huge amounts of both financial and social losses incurred, it is still on the rise. According to Mary Monahan, a senior analyst at Javelin Strategy & Research, a Pleasanton research organization, 312 security breaches occurred in 2006 in the United States, giving away 20 million records, while in 2007, 446 security breaches occurred resulting in the exposure of 128 million records. Just last month, a laptop containing the personal information regarding the 51,000 present and former…
8 pages (2008 words) Essay
Data Management
Soumen et al (2009) agree that data quantity surrounding us is humongous and the amount of information bombarding us is increasing. Making sense of this increasing data volume requires data mining skills and techniques that have evolved with increase in computing power. An allied discipline is Competitive intelligence which is a discipline used for improving market standing, improving strategic thinking - seeing through morass of disinformation and market disruptions and interpreting events without getting emotionally swayed with "pregnant" data. It is about analyzing an opportunity or threat…
8 pages (2008 words) Essay
Data Warehousing
It focuses on how well the data is stored for better analysis and reporting of information by the analysts. There are tools that are used to move the data into the storage area and the intelligence tools ensure there is efficiency in delivery of services to the customers. The high changing technology is important for an organization since it integrates data for easier analysis and data reporting. It also assists organizations to get more information about the business, assists companies to meet the business requirements, demands of the customer and eventually helps a company to be at a…
10 pages (2510 words) Essay
Data and Network Security
As far as the location of the company's office is concerned, 'enterprise Training solutions' offices are located in 4 adjacent rooms situated on the ground floor of a 4 storied building. In addition, the company also maintains a single office room in the first floor of the building. Under the existing situation, anyone is allowed access up to the reception area through a shared entrance. This point signifies the fact that there are no notable security measures at least for the ground floor. The fact that a large share of 'Enterprise training solutions' offices are located on the ground floor…
7 pages (1757 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!