quora

Data Hack at Monster.com - Case Study Example

Comments (0) Cite this document
Summary
In August, 2007, there was a major security alert at the online job web site Monster.com after hackers stole 1.6 million online records from the internet job search site, including the personal information of several hundred thousand job seekers. The candidates' personal details, such as name, surname, email address, country, home address, work/mobile/home phone numbers and resume ID, were then uploaded to a remote server under the control of the attackers…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Data Hack at Monster.com
Read TextPreview

Extract of sample
"Data Hack at Monster.com"

Download file to see previous pages The types of service offered include help with resumes, cover letters, company research, networking, and advice targeted to individuals whose careers are currently in a transitional state. Career-management advisors are on hand for daily chats if required. The site is well organized and easy to navigate.
The site is well established and has been in existence since it was formed in 1999. It has the largest job search engine in the world. As this hacking case proves however, the security aspect of the site has left a lot to be desired. Monster.com has addressed these issues. However, nothing in internet security is foolproof as will be seen in this report.
The hackers had stolen the login credentials by use of "phishing" (the cloning of websites) techniques, and managed to extract several personal details. The BBC claimed in their news article on the topic that the stolen data would most likely be used to send phishing and spam emails. However, this was not the true purpose as was later discovered.
The fraud in operation was typically, identity theft, as opposed to a lapse of security on the Monster.com website. This occurred via a Trojan. This is a common technique used to obtain personal information, including login and email details.
Problem Statement
There are numerous lessons to be learned from this incident. Monster.com has over 75 million visitors to its site. It offers a wide breadth of services. It also has approximately 5,200 employees and operations in 36 countries. Therefore it has a huge responsibility for the welfare of both its employees and the personal data of every person who registers on the site.

The data was used for phishing and spam attacks, and a "phishing blackmail scam" (Stokdyk, 2007, Para 1). The victims were persuaded, by a very realistic phishing campaign that the emails and the site they were associated with were genuine. They were fooled into downloading a job research tool, named the "Monster Job Seeker Tool." This was in fact a program that encrypted files in the victims' computer. The next stage was to demand a ransom note for money to provide the decryption.

In this instance, no amount of security or encryption on the site could have prevented the hackers gaining access to the personal data. They had access to all the information required throughout. Identity theft refers to the stealing of personal information with a view to using it in an illegal manner. This might be to use someone's credit card details or to apply for bank loans using false papers. There are several ways in which a stolen identity can be used for illicit purposes. The identity theft can be paper, or non-paper based. New ways and means of stealing personal data are being concocted on a daily basis.

Identity theft is rife in other areas of the business world, including the financial sector, and has caused numerous problems: "Growing numbers of identity theft ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Data Hack at Monster.com Case Study Example | Topics and Well Written Essays - 2750 words”, n.d.)
Retrieved from https://studentshare.org/technology/1500896-data-hack-at-monstercom
(Data Hack at Monster.Com Case Study Example | Topics and Well Written Essays - 2750 Words)
https://studentshare.org/technology/1500896-data-hack-at-monstercom.
“Data Hack at Monster.Com Case Study Example | Topics and Well Written Essays - 2750 Words”, n.d. https://studentshare.org/technology/1500896-data-hack-at-monstercom.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Topic Services Marketing, Case Monster.com
The main problem of monster.com was that the company was unable to create an effective distribution channel for itself. The efforts of the company to position itself by making the customer to notice the website and the product were a major area of concern.
4 Pages(1000 words)Essay
The Big Data Challenges
In this scenario, this separation forced the Volvo Car Corporation to develop its own individual information technology infrastructure in order to manage its business areas. Simultaneously, the organization was looking for to enhance its business intelligence (BI) operational effectiveness and functionalities.
4 Pages(1000 words)Case Study
The Disappearing Data Center
Orders processing speed is not as expected and lead to frequent complaints from the clients. The upper side is that implementing a new strategy to solve the issues will hand more opportunities to the company from her satisfied clients. Availability of
4 Pages(1000 words)Case Study
Data Warehousing & Data Mining
The process is similar to the extraction of valuable metal hence the term “mining” (Jackson, 2003). Data mining is the process of analyzing extensive data with the aim of establishing correlation between different variables. Consequently, data warehousing is the process of storing data in relational databases that facilitate such queries and analysis.
3 Pages(750 words)Assignment
Data Model for Fitness Centre
For example, if somebody wants to perform aerobics, the provision of equipments is not enough. There is the requirement of proper environment, which includes the music, the space etc. So the fitness centre provides that too. Since the fitness centre is not for one and all.
3 Pages(750 words)Case Study
Secondary data exercise
The moment sales slips down, the warning bells start ringing and everyone starts coming with his/her own reason for the downslide. Companies which are strong in their fundamentals and which have the benefit of intelligent leadership could easily weather the challenges whereas others which lacked these qualities, ultimately succumbed to them.
7 Pages(1750 words)Case Study
Revisions to Data Analysis
Over 100 responses were recorded but only the first 100 surveys were used because survey monkey charges to view any responses to surveys past the first 100. To balance the demographics, the total populations included both male and females
4 Pages(1000 words)Case Study
Health Care Data Trends
The most critical risks in the article are as follows; Many insurance organizations are strategically poised to engage the Healthcare system more
3 Pages(750 words)Case Study
The Big Data Challenges
Therefore, this case study will provide a sharp insight of Volvo Corporation by focusing on the following areas: The company integrates cloud infrastructure into its network by establishing a
2 Pages(500 words)Case Study
Tech Data
Understanding the running of the company is important in an effort to appreciate the moves that it has and still makes in the highly competitive technology market of the 21st century. The best manner through which to get a better view of the company is by carrying out an audit report.
10 Pages(2500 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Case Study on topic Data Hack at Monster.com for FREE!
logo footer
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us