Cyber Security Case Study

1274 Words3 Pages

Cybersecurity and Risk Management

Like almost every social media company, Twitter is exposed to many types of cyber risks, and the company has to handle risk management strictly and effectively which varies from figuring out the probability of risks (includes threat, vulnerability, cost of impact), protecting any vulnerabilities from being exploited or taken advantaged of by hackers, threats that come from users or coders/developers, or protecting the users’ information in the system.
The first and most common threat to Twitter is when users’ accounts are hacked, and personal information are taken, hacked accounts could be used for frauds or other illegal, inappropriate acts. This could affect both the company and the users. Regarding this issue, Twitter has been updating password protection programs in the past few years by adding different layers of …show more content…

Selection of this is based on risk, security budget, AUP, and security procedures. Technology defense mechanisms need to be tested/maintained regularly, appropriate for the types of network and operating system, and able to provide strong authentication and access control.
In the third and fourth steps, Twitter uses different sets of tools to prevent and face security challenges. For threats regarding passwords (password retention), OAuth (open standard for authorization) tokens and encryptions are used to make sure the passwords are not exposed. Furthermore, when protecting passwords, Twitter developers use bcrypt-ruby when possible, which is a secure hash algorithm designed by TheOpenBSD to hash passwords (RubyGems).
Another way to prevent any incoming unsanitized data is both working on the user side and within the company. Twitter has its own Whitelist of inputs that are acceptable when posted on their APIs and will disregard any data/input that is not on the

Open Document