Organizational Cyber Data Breach Analysis of Facebook, Equifax, and Uber Cases

Organizational Cyber Data Breach Analysis of Facebook, Equifax, and Uber Cases

Young B. Choi
Copyright: © 2021 |Pages: 7
DOI: 10.4018/IJCRE.2021010106
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Data breaches are events that have concluded in the compromise of personally identifiable information (PII) for millions of people globally. The consequences of such events can only result in certain serious outcomes, including identity theft. Such perilous outcomes highlight the importance of organizational entities accurately safeguarding and preserving the PII gathered from stakeholders or consumers. The user data breaches of Facebook, Equifax, and Uber concluded in the compromise of PII data for millions of consumers and employees, which are the most critical aspects that comprise any organizational infrastructure. This paper will examine the events leading to and transpiring after the data breaches of Facebook, Equifax, and Uber. In addition, the collective impact on every organization and its various incident management procedures will be addressed.
Article Preview
Top

Various Cyberattacks

According to Chatterjee et al. (2019), “A data breach is a confirmed incident of unlawful access/disclosure of sensitive, confidential or otherwise protected data, including personal health or personally identifiable information, trade secrets, or intellectual property” (p. 183). The Uber data breach occurred when two hackers attained login credentials to access sensitive information that was stored unencrypted on Uber’s Amazon Web Services account (Robbins & Sechooler, 2018). Uber employed a program called bug bounty, which affords the technology industry opportunities to identify and mitigate any vulnerabilities in Uber’s information system infrastructure. Successful hackers can be paid up to $10,000 for their services (Rasalam & Elson, 2019). However, according to Rasalam & Elson (2019), “one of the hackers demanded a $100,000 payment after gaining access to the system and retrieving over 57 million records”, in addition to “threatening to publicly disclose the stolen information if the payment was not received” (p. 8).

Complete Article List

Search this Journal:
Reset
Volume 5: 1 Issue (2024)
Volume 4: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 3: 2 Issues (2021)
Volume 2: 2 Issues (2020)
Volume 1: 2 Issues (2019)
View Complete Journal Contents Listing