StudentShare solutions
Triangle menu

Data Hack at Monster.com - Case Study Example

Extract of sample
Data Hack at Monster.com

The types of service offered include help with resumes, cover letters, company research, networking, and advice targeted to individuals whose careers are currently in a transitional state. Career-management advisors are on hand for daily chats if required. The site is well organized and easy to navigate.
The site is well established and has been in existence since it was formed in 1999. It has the largest job search engine in the world. As this hacking case proves however, the security aspect of the site has left a lot to be desired. Monster.com has addressed these issues. However, nothing in internet security is foolproof as will be seen in this report.
The hackers had stolen the login credentials by use of "phishing" (the cloning of websites) techniques, and managed to extract several personal details. The BBC claimed in their news article on the topic that the stolen data would most likely be used to send phishing and spam emails. However, this was not the true purpose as was later discovered.
The fraud in operation was typically, identity theft, as opposed to a lapse of security on the Monster.com website. This occurred via a Trojan. This is a common technique used to obtain personal information, including login and email details.
Problem Statement
There are numerous lessons to be learned from this incident. Monster.com has over 75 million visitors to its site. It offers a wide breadth of services. It also has approximately 5,200 employees and operations in 36 countries. Therefore it has a huge responsibility for the welfare of both its employees and the personal data of every person who registers on the site.

The data was used for phishing and spam attacks, and a "phishing blackmail scam" (Stokdyk, 2007, Para 1). The victims were persuaded, by a very realistic phishing campaign that the emails and the site they were associated with were genuine. They were fooled into downloading a job research tool, named the "Monster Job Seeker Tool." This was in fact a program that encrypted files in the victims' computer. The next stage was to demand a ransom note for money to provide the decryption.

In this instance, no amount of security or encryption on the site could have prevented the hackers gaining access to the personal data. They had access to all the information required throughout. Identity theft refers to the stealing of personal information with a view to using it in an illegal manner. This might be to use someone's credit card details or to apply for bank loans using false papers. There are several ways in which a stolen identity can be used for illicit purposes. The identity theft can be paper, or non-paper based. New ways and means of stealing personal data are being concocted on a daily basis.

Identity theft is rife in other areas of the business world, including the financial sector, and has caused numerous problems: "Growing numbers of identity theft ...Show more
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Data Hack at Monster.com Case Study Example | Topics and Well Written Essays - 2750 words”, n.d.)
Retrieved from https://studentshare.net/technology/273492-data-hack-at-monstercom
(Data Hack at Monster.Com Case Study Example | Topics and Well Written Essays - 2750 Words)
https://studentshare.net/technology/273492-data-hack-at-monstercom.
“Data Hack at Monster.Com Case Study Example | Topics and Well Written Essays - 2750 Words”, n.d. https://studentshare.net/technology/273492-data-hack-at-monstercom.
  • Cited: 0 times

Summary

In August, 2007, there was a major security alert at the online job web site Monster.com after hackers stole 1.6 million online records from the internet job search site, including the personal information of several hundred thousand job seekers. The candidates' personal details, such as name, surname, email address, country, home address, work/mobile/home phone numbers and resume ID, were then uploaded to a remote server under the control of the attackers…
Author : tamara79
Download 1
Data Hack at Monster.com
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the case study on your topic
"Data Hack at Monster.com"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Tech Data
Understanding the running of the company is important in an effort to appreciate the moves that it has and still makes in the highly competitive technology market of the 21st century. The best manner through which to get a better view of the company is by carrying out an audit report.
10 pages (2500 words) Case Study
The Big Data Challenges
In this scenario, this separation forced the Volvo Car Corporation to develop its own individual information technology infrastructure in order to manage its business areas. Simultaneously, the organization was looking for to enhance its business intelligence (BI) operational effectiveness and functionalities.
4 pages (1000 words) Case Study
Secondary data exercise
The moment sales slips down, the warning bells start ringing and everyone starts coming with his/her own reason for the downslide. Companies which are strong in their fundamentals and which have the benefit of intelligent leadership could easily weather the challenges whereas others which lacked these qualities, ultimately succumbed to them.
7 pages (1750 words) Case Study
Data Model for Fitness Centre
For example, if somebody wants to perform aerobics, the provision of equipments is not enough. There is the requirement of proper environment, which includes the music, the space etc. So the fitness centre provides that too. Since the fitness centre is not for one and all.
3 pages (750 words) Case Study
The Big Data Challenges
Therefore, this case study will provide a sharp insight of Volvo Corporation by focusing on the following areas: The company integrates cloud infrastructure into its network by establishing a
2 pages (500 words) Case Study
Objective data
These questions follow the same pattern as the Lab Manual and will help you collect organized Subjective Data for the topics completed each week. Please follow the order of Current Symptoms with COLDSPA for each complaint, followed by Past History (Medical and
1 pages (250 words) Case Study
Data Analysis
Over 100 responses were posted on my blog but only 100 surveys were the exact number needed for the research, meaning that no inconveniences were incurred concerning the participation. To balance the demographics, the total populations
10 pages (2500 words) Case Study
Revisions to Data Analysis
Over 100 responses were recorded but only the first 100 surveys were used because survey monkey charges to view any responses to surveys past the first 100. To balance the demographics, the total populations included both male and females
4 pages (1000 words) Case Study
Health Care Data Trends
The most critical risks in the article are as follows; Many insurance organizations are strategically poised to engage the Healthcare system more
3 pages (750 words) Case Study
The Disappearing Data Center
Orders processing speed is not as expected and lead to frequent complaints from the clients. The upper side is that implementing a new strategy to solve the issues will hand more opportunities to the company from her satisfied clients. Availability of
4 pages (1000 words) Case Study
Comments (0)
Click to create a comment
Let us find you another Case Study on topic Data Hack at Monster.com for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us