Data Hack at Monster.com

Masters
Case Study
Technology
Pages 11 (2761 words)
Download 0
In August, 2007, there was a major security alert at the online job web site Monster.com after hackers stole 1.6 million online records from the internet job search site, including the personal information of several hundred thousand job seekers. The candidates' personal details, such as name, surname, email address, country, home address, work/mobile/home phone numbers and resume ID, were then uploaded to a remote server under the control of the attackers…

Introduction

The types of service offered include help with resumes, cover letters, company research, networking, and advice targeted to individuals whose careers are currently in a transitional state. Career-management advisors are on hand for daily chats if required. The site is well organized and easy to navigate.
The site is well established and has been in existence since it was formed in 1999. It has the largest job search engine in the world. As this hacking case proves however, the security aspect of the site has left a lot to be desired. Monster.com has addressed these issues. However, nothing in internet security is foolproof as will be seen in this report.
The hackers had stolen the login credentials by use of "phishing" (the cloning of websites) techniques, and managed to extract several personal details. The BBC claimed in their news article on the topic that the stolen data would most likely be used to send phishing and spam emails. However, this was not the true purpose as was later discovered.
The fraud in operation was typically, identity theft, as opposed to a lapse of security on the Monster.com website. This occurred via a Trojan. ...
Download paper
Not exactly what you need?

Related papers

Data Hack at Monster.com
The types of service offered include help with resumes, cover letters, company research, networking, and advice targeted to individuals whose careers are currently in a transitional state. Career-management advisors are on hand for daily chats if required. The site is well organized and easy to navigate.…
Data Warehouse assignment
The data was analyzed with respect to the time dimension - week. Sales were analyzed against the customers weekly. It was identified that the sales amount graph for the six weeks of 2005 for ALL the customers generated the following trend:…
Data Structures and Algorithms
And therefore, this might be comfortable for usages connected with textual data. Where there is image related data, the exercise might become pretty cumbersome and might not be possible to realize both the spatial and spectral data to be brought under the Huffman Code compression technique. In order to increase the efficiency of coding even while using the text compression techniques. For this…
Data Loss Prevention
Although the number of incidents regarding personal data loss would normally be expected to decrease due to the huge amounts of both financial and social losses incurred, it is still on the rise. According to Mary Monahan, a senior analyst at Javelin Strategy & Research, a Pleasanton research organization, 312 security breaches occurred in 2006 in the United States, giving away 20 million records,…
Data Management
Soumen et al (2009) agree that data quantity surrounding us is humongous and the amount of information bombarding us is increasing. Making sense of this increasing data volume requires data mining skills and techniques that have evolved with increase in computing power. An allied discipline is Competitive intelligence which is a discipline used for improving market standing, improving strategic…
Data Warehousing
It focuses on how well the data is stored for better analysis and reporting of information by the analysts. There are tools that are used to move the data into the storage area and the intelligence tools ensure there is efficiency in delivery of services to the customers. The high changing technology is important for an organization since it integrates data for easier analysis and data reporting.…
Data and Network Security
As far as the location of the company's office is concerned, 'enterprise Training solutions' offices are located in 4 adjacent rooms situated on the ground floor of a 4 storied building. In addition, the company also maintains a single office room in the first floor of the building. Under the existing situation, anyone is allowed access up to the reception area through a shared entrance. This…