Hanqing Zhou|Yijiang Li|Jason M Mays|Karabo Ntokwane|Qianru Yang

Slides:



Advertisements
Similar presentations
© 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Application Security and Testing.
Advertisements

ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
Ethical Hacking by Shivam.
Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304.
FIT3105 Security and Identity Management Lecture 1.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
Special Anatomy of an Attack Or Layered Security Failure.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
© Pearson Education Copying permitted for purchasing institution only. This material is not copyright free. Functional areas Unit 1: Investigating.
Business Continuity from an Insurance Perspective Presented by Jim Carter Manager, Risk & Insurance.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Dan Johnson. What is a hashing function? Fingerprint for a given piece of data Typically generated by a mathematical algorithm Produces a fixed length.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
To start a new business, buy an existing business, or buy a Franchise
Cyber Security Nevada Businesses Overview June, 2014.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
Russell Grant | DealerVault | Vice President | Vice President, DealerVault Russell Grant Russell Grant | DealerVault | Vice.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Pro-active Security Measures
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Security for Online Games Austin GDC, September 2009 Tim Ray, CISSP.
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Microsoft Collaboration Survey Research Results Survey of Business and Technology Decision-Makers.
DDoS Things You Need To Know About DDoS Attacks DDoS.
The Marketing Plan. Executive Summary  This is at the beginning of the marketing plan and is an overview of the entire marketing plan  It briefly addresses.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Component D: Activity D.3: Surveys Department EU Twinning Project.
Tuesday March 15, 2016 Session 19-D Technology Forum David Finkelstein, CIO RiverSpring Health.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cyber Insurance Risk Transfer Alternatives
Web Applications Security Cryptography 1
Equity Securities Fraud
Case Study - Target.
E&O Risk Management: Meeting the Challenge of Change
[Internal Use] for Check Point employees​
Be Safe, use Password Protection Michael Hodges ITS, Identity and Access Management
Recommending a Security Strategy
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
[ Issues Faced By Yahoo Users] Presented By [Merlene Jose] Call Us:
Forensics Week 11.
Cyber Security Experts
Cyber Trends and Market Update
K. HAAS, J. HUISMAN, P. KAPOOR, T. SZOCS
Application protection
Keeping your data, money & reputation safe
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Considerations for Cybersecurity and Data Security in Today’s World
Anthem Data Breach Group 2: Jing Jiang, Dongjie Wang, Haitao Huang, Binju Gaire, Parneet Toor.
Robert Giannini GiaSpace MSSP
Risk Articulation Articulation Translation to Risk Register
Protecting Yourself from Fraud including Identity Theft
Colorado “Protections For Consumer Data Privacy” Law
Data Breach of United States Office of Personnel Management
Data Breach of United States Office of Personnel Management
Anatomy of a Common Cyber Attack
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Hanqing Zhou|Yijiang Li|Jason M Mays|Karabo Ntokwane|Qianru Yang Yahoo Data Breach Team 4 Hanqing Zhou|Yijiang Li|Jason M Mays|Karabo Ntokwane|Qianru Yang

Background The Internet service company Yahoo! reported two major data breaches of user account data to hackers during 2016. Both breaches are considered the largest discovered in the history of the Internet : First announced breach Reported in September 2016, had occurred sometime in late 2014 Second announced breach Occurring earlier around August 2013, was reported in December 2016. Specific details of material taken include: names, email addresses, telephone numbers, encrypted or unencrypted security questions and answers, dates of birth, and hashed passwords

What Happened & How In July 2016, account names and passwords for about 200 million Yahoo! accounts were for sale on "TheRealDeal" The seller--"Peace_of_Mind" stated in confidential interviews with Vice and Wired. Peace has previously been connected to sales of similar private information data from other hacks including that from the 2012 LinkedIn hack. Peace stated the data likely dates back to 2012, while some of the sample accounts were still active, they lacked necessary information to fully login properly, reflecting their age. Experts believe that Peace is only a broker of the information that hackers obtain and sell through him. Yahoo! stated they were aware of the data and were evaluating it, cautioning users about the situation but did not reset account passwords at that time.

Impact on the Customers Customer data that was leaked include names, email addresses, telephone numbers, encrypted or unencrypted security questions and answers, dates of birth, and hashed passwords Such information, especially security questions and answers, could help hackers break into victims' other online accounts

Impact on the Employees CEO stepped down Legal advisor resigned Operational disruptions

Impact on the business reputation Loss of Customer trust Brand devaluation Yahoo! is currently facing an SEC investigation Verizon and Yahoo will share the costs of the FBI investigation and other potential third party investigations

Impact on the business (financial) $16 million in direct costs related to the breaches, costs and liabilities created by lawsuits from customers and partners. class-action lawsuit shareholder lawsuits Verizon acquired Yahoo deal by $350 million less Share prices went down by 5% AT&T dropped revenue share agreement

Root Cause Outdated Data-Encryption Technology Vulnerability and weakness of MD5 algorithms Cryptographically broken of Customer accounts data MD5 algorithms vs. Hashing algorithms

Other Causes Secure Team’s failure on Security Practices Low priority of an upgraded data protection tool A Long-term Recession of Yahoo’s Business Less budget of security due to bad business Importance of system performance than security

What controls were missing? Lost enforcement on security Q&A encryption Cookie-basic attack and phishing attacks Part of account used MD5 algorithm Delay in discovering and reporting Dismissive of InfoArmor's services

Our Recommendations Full conversion from MD5 and SHA-1 algorithm to bcrypt for certificates and passwords. Reissue certificates to external Yahoo websites on a routine schedule. Prioritizing security as equal to consumer products. Develop a crisis management plan to address future breaches.

Thank you!