Significance Of Cyber Security For Companies: Case Examples Of Organised Crime, Hacktivists, And Espionage

Hacker threat 1: Organised Crime: Case of LinkedIn Attack

Cyber security can be referred to as collective processes, technologies, and methods to protect the availability, integrity, and confidentiality of computer networks, data, and systems against unauthorised access and cyber attack. Thus, this study aims to provide significance of cyber security by highlighting three specific hacker threat types such as organised crime, hacktivists, and espionage respectively. In order to underline the selected types of hacker threats, three related company case examples such as LinkedIn, Yahoo, and Cambridge Analytica that had witnessed cyber-attack issues will be investigated. Other than this, factors that can be considered to prevent identified threat attacks will also be highlighted in the following section briefly.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Cyber attacks are found to be unwelcome incidents of attempts to alter, expose, steal, destroy, or disable information for financial or personal gains by unauthorised access to the computer system. Organised cyber attack is found to be associated with different types of cybercrimes such as malware distribution and creation, hacking, fraud, blackmail, and others (Huang et al., 2018). In this regard, the case scenario of a LinkedIn cyber attack can be considered as organised cybercrime. The reason behind stating this statement is that LinkedIn is found to utilise old security policy even after knowing that emphasising upon old security policy provides opportunities for hackers to crack confidential data easily. Due to this reason, LinkedIn failed to protect about 117 million passwords and emails of LinkedIn members, which were stolen by the hackers (Pagliery, 2016).

It is identified that hackers accessed the network of LinkedIn illegally and accessed about 6.5 million users’ encrypted passwords as well as posted that data in the hacker’s forum of Russia. The primary motivation behind this cyber attack was associated with financial gain as the hacker tried to sell 117 million members’ passwords and email on the dark web, an illegal marketplace for an amount of $2,200 (Perez, 2016).

Improper security measures and policy implementation can be considered as one of the major vulnerabilities that had led to the occurrences of a data breach across the LinkedIn network (Pagliery, 2016). It is identified that the company was utilising an old version of security policy that provides opportunities to hackers to crack passwords or confidential information easily. On the other hand, LinkedIn protects users’ passwords through encryption; however, they failed to include pivotal security layers and stored those users’ passwords in “unsalted SHA-1 hashes”, which enhanced the chance for hackers to crack them easily (Perez, 2016).  

Hacker threat 2: Hacktivists: Case of Cambridge Analytica

Improper handling of users’ data leads to the occurrences of long-term and short-term impacts for organisations. Considering the case of LinkedIn, the short-term impact is being identified in the form of raising awareness among users regarding data and privacy security. On the other hand, the long-term impact has been observed in the form of declining organisational reputation, and market position.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

In response to the mentioned data breach, LinkedIn tried to reach out to the affected members and advise every member to change their passwords. Along with this, the company mentioned that they had increased their security measure and added “two-factor authentication” to store users’ data within a strongly encrypted environment (Perez, 2016).

The proliferation of technology improvises businesses activities in a modernised way and on the other hand, it generates a number of cyber security risks or cyber attacks that negatively influence upon organisational ongoing and future performance. Hacktivists are considered as the types of cyber threats that involve specific cybercriminal groups to carry out specific cyber-attacks for political purposes. In order to underline the aspect of hacktivists’ cyber threats, the case of Cambridge Analytica can be interlinked as the company obtained access to 50 million users in Facebook illegally during Trump’s election campaigning during the financial year 2016 (Granville, 2018).

The major motivation of the mentioned cyber attack was to understand and manipulate the perspective of American voters to generate the election outcome in the favour of President Trump. It is identified that Cambridge Analytica was being hired by President Trump in order to obtain information regarding 50 million users in Facebook illegally in order to understand their perspectives and influence those perspectives in the favour of Trump (Granville, 2018).

Aleksandr Kogan, who is found to be a Russian-American psychological professional developed an application “thisisyorkdigitallife”, which offered ostensibly personality predictions for the targeted users (Sherr, 2018). In order to log in to the application, users are required to utilise their Facebook Account information. Along with this, the application also included some specific login processes where users are required to put their location, Facebook profile data, their friend’s data, and their interest. Through this application, Dr. Kogan harvested all the required information for Cambridge Analytica and provided about 50 million users’ raw information (Granville, 2018). The entire process was being conducted through incorporating “legitimate function” illegally within the system of Facebook.

The short-term impact of the mentioned cyber attack was found to be in the form of awareness and scepticism by the private consumers as well as government agencies of the data accumulation and collection. On the other hand, misuse of Facebook’s data leads to a long-term impact in the aspects of legislation, regulation, and litigation respectively (Clark, 2018).

Hacker threat 3: Espionage-Yahoo Attack

Facebook was found to undertake proactive measures after perceiving the incident and deleted the application that was being developed by Dr. Kogan from their site. In addition to this, Facebook also recruited Stroz Friedberg, a digital forensic organisation to reassure their users that they have completely deleted the application and improved their data security measures (Granville, 2018).

Intelligence gathering, spying, or espionage is considered as the practice of collecting confidential information or secrets from a non-disclosed source for obtaining tangible benefits. In this regard, the cyber attack that was witnessed by Yahoo can be interlinked with espionage. One of the major reasons behind this statement is that Yahoo was found to utilise improper and outdated encryption techniques that were being easily cracked by hackers (Stempel and Finkle, 2017). In addition to this, even after knowing the information sensitivity, Yahoo sold itself along with their existing user confidential information to Verizon for a deal of $4.48 billion (Perlroth, 2017). This inappropriate business decision also led to the occurrence of a cyber attack on the Yahoo platform.

The motivation of the Yahoo cyber attack can be considered as to obtain both financial and political benefits. A news report published in 2017 underlines the major attacker behind the 2013 cyber attack at Yahoo was the Russian Government. The primary motivation of the Russian government was to steal Yahoo information to spy on different targets across the United States in an unauthorised way (Perlroth, 2017).

Hackers were found to gain accessibility to Yahoo user’s account with the help of the “Phishing Scheme”. Along with this, it is identified that the mentioned organisations failed to utilise the encryption techniques while storing and collecting confidential data that in turn, maximise the opportunities for espionage cyber criminals to obtain all their required confidential information easily (Straub, 2021).

Lack of focus on the cyber security and security measure, Yahoo failed to prevent their data assets and sensitive information accurately. It is identified that improving public awareness after the occurrence of a cyber attack at the Yahoo network can be considered as a short-term impact. On the other hand, as Yahoo failed to provide data security to its existing users, it negatively affected upon their brand image and declined their chances to gain attention from the targeted users in the future as well.

In the case of Yahoo’s cyber attack, the company fails to take proactive responses or measures to assure their affected users in an appropriate manner. In addition to this, even after knowing the vulnerability of their existing security practices the company did not take any kind of security measure that had led to the occurrence of simultaneous data breach issues during 2016 and 2017 (Ojedokun & Ilori, 2021).

Discussion

Considering the three case scenarios of cyber attack, it can be mentioned that every business entity that is highly relied upon a technology-based solution or digital platform needs to improve its security measures and security policy. As mentioned by Y?lmaz & Gönen (2018), cyber attacks, vandalism, and threats have the potential to create undesirable changes to business performance. In this regard, it becomes important for companies to adopt a strategic approach to prevent sensitive and confidential information from cyber attacks. Thus, it can be mentioned that developing policies for cyber security, incorporating Endpoint Detection and Response (EDR), Next-Generation Firewalls (NGFQ), and others can be effective in terms of preventing challenges regarding a cyber attack (Swanagan, 2021).

Conclusion

In relation to the above discussion, it can be mentioned that the rate of cyber criminals and their unauthorised practices has been growing. Exposure of personal or sensitive information is maximised due to the usage of digital platforms or technology-based solutions, which provides opportunities for cyber criminals to gain unauthorised access to the required sensitive data easily with the execution of sophisticated malicious code. The mentioned case scenario underlines the lack of security measures and usage of older versioned security policies that are vulnerable to cyber-attacks. Along with this, it has also been identified that some identified strategic factors could be considered to prevent cyber security challenges appropriately.

References

Clark, M., (2018). Trouble Comes in Threes: Long-term Impacts of the Facebook/Cambridge Analytica Controversy. [Online]. https://www.insideindianabusiness.com/articles/trouble-comes-in-threes-long-term-impacts-of-the-facebookcambridge-analytica-controversy

Granville, K., (2018). Facebook and Cambridge Analytica: What You Need to Know as Fallout Widens. [Online]. https://www.nytimes.com/2018/03/19/technology/facebook-cambridge-analytica-explained.html

Huang, K., Siegel, M., & Madnick, S. (2018). Systematically understanding the cyber attack business: A survey. ACM Computing Surveys (CSUR), 51(4), 1-36. https://dl.acm.org/doi/pdf/10.1145/3199674

Ojedokun, U. A., & Ilori, A. A. (2021). Tools, Techniques and Underground Networks of Yahoo-Boys in Ibadan City, Nigeria. International Journal of Criminal Justice, 3(1), 1-24. https://www.researchgate.net/profile/Usman-Ojedokun-2/publication/352363623_Tools_Techniques_and_Underground_Networks_of_Yahoo-Boys_in_Ibadan_City/links/60c5f440299bf1949f551a0f/Tools-Techniques-and-Underground-Networks-of-Yahoo-Boys-in-Ibadan-City.pdf

Pagliery, J., (2016). Hackers selling 117 million LinkedIn passwords. [Online]. https://money.cnn.com/2016/05/19/technology/linkedin-hack/

Perez, S., (2016). 117 million LinkedIn emails and passwords from a 2012 hack just got posted online. [Online]. https://techcrunch.com/2016/05/18/117-million-linkedin-emails-and-passwords-from-a-2012-hack-just-got-posted-online/

Perlroth, N., (2017). All 3 Billion Yahoo Accounts Were Affected by 2013 Attack. [Online]. https://www.nytimes.com/2017/10/03/technology/yahoo-hack-3-billion-users.html

Sherr, I., (2018). Facebook, Cambridge Analytica and data mining: What you need to know. [Online]. https://www.cnet.com/news/politics/facebook-cambridge-analytica-data-mining-and-trump-what-you-need-to-know/

Stempel, J., and Finkle, J., (2017). Yahoo says all three billion accounts hacked in 2013 data theft. [Online]. https://www.reuters.com/article/us-yahoo-cyber-idUSKCN1C82O1

Straub, J. (2021). Defining, evaluating, preparing for, and responding to a cyber Pearl Harbor. Technology in Society, 65, 101599. https://arxiv.org/pdf/2103.07662

Swanagan, M., (2021). How To Prevent The Top Cyber Attacks In 2022 [Online]. https://purplesec.us/prevent-cyber-attacks/#Prevent

Y?lmaz, E. N., & Gönen, S. (2018). Attack detection/prevention system against cyber attack in industrial control systems. Computers & Security, 77, 94-105. https://www.sciencedirect.com/science/article/pii/S0167404818303316

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP