Security Breach 2014 Essay

473 Words1 Page

Summarize Major 2016 IT Hacks Hackers comes from all corners of the world. These people careless with regards to other interests and security, but their personal gains. Their main purpose is unknown and unidentified, but the act and activities of these hackers are performing their exercises to breach other information technology systems in many unapproved ways. Hackers are known to be on their own or under the support of certain countries around the globe. Many of the 2016 breaches came from Russia, China, North Korean and even Iran. According to Forbes, security hackings were viewed as invasion of the ensured information and property that consequently establishes a malicious demonstration. The security business has seen on attacks from countries, …show more content…

The Yahoo Breach 2016 – Yahoo has the record for the largest security breach in history. The attacks happened multiple times, but it wasn’t mentioned and known until the recent in December 2016. The security breaches were traced back to Russia. This hack involved the stolen of millions of users’ information from Yahoo. Yahoo ensures its users utilize strong password, but the damages has been done (Paul, 2016). b. The United States of American’s Democratic National Committee (DNC) Hack – This was a Russia state-supported hack. The Russia spies hacked the DNC to intervene the United States election to ensures the Republican Party and a Trump victory. Despite Trump, Russia and Trump supporters’ denials, the facts were there. Over 20,000 emails and many other including thousands of documents from the DNC members were hacked and released. It has resulted in several scandals coverup within the DNC themselves (Paul, 2016). c. The Unknown Cyber Criminals Bank Robbers – This case was involved of the stolen of millions of dollars cross-border payments which ensures the abusing some of the major banks in the world. It was discovered with the single stolen of $81 millions from the Bangladeshi bank via its SWIFT system. This resulted in the implementation and help which SWIFT was seeking from IT security experts (Paul,

More about Security Breach 2014 Essay

Open Document