SlideShare a Scribd company logo
1 of 8
Download to read offline
Running Head: EBAY’S SECURITY DATA BREACH 1
eBay’s Security Data Breach
instructor
class
date
name
EBAY’S SECURITY DATA BREACH 2
eBay is considered to be a multinational e-commerce business with its headquarters
located in the United States. eBay was founded in the year 1998 by a man named Pierre
Omidyar. This online auctioning business has built easier methods of reaching consumers across
the nation as opposed to being settled in just one small town or community. Essentially, eBay has
become one of the most notable e-commerce sites across the web through its methods of trading
and conducting sales on their platform (Kelly, G., 2014). eBay is also a multibillion-dollar
industry in which has manifested the online presence. Just in the year 2016, there were over 170
million active users with nearly 250 million searches being conducted on a daily basis (eBay
Breach, n.d.).
In 2014, eBay stated that they had accrued a security breach throughout the databased
that could have compromised nearly 150 million customers. With such magnitude, the incidents
in which the consumers affected were qualified as being the 2nd
largest data breach since the
history of the internet (Kelly, G., 2014). The data breach of eBay posted a multitude of risks
regarding the common identify features of consumers, the theft of passwords to accounts in the
database system, and other sorts of passwords had been compromised. Regarding the breach,
eBay responded to their consumers urging them to change the passwords to all accounts
regarding their system and to rather, begin utilizing the credit card monitoring services that were
being provided to ensure no further breaches and compromising of their account would take
place (Kelly, G., 2014). This paper goes to discuss the situation of the breach regarding an
extensive analysis of how eBay handled the breach regarding their security measures that had
already been established.
EBAY’S SECURITY DATA BREACH 3
Hackers over the internet have one goal in mind, to achieve access to the systems
functioning or via removing and altering existing information. Hackers become successful at
penetrating the IT system that the company has utilized and set in place and most breaches go
without notice until it is too late. However, the security breach that penetrated the system of
eBay was one that was startling and was declared as dreadful (eBay Breach, n.d.). eBay is an
online auction forum where individuals and companies alike can post their products and services
for sale through either a bidding system or a buy now system. The affiliation articulated that in a
burst of its database between late February and early March, programming engineers picked up
two or three its specialists' login assertions (eBay Breach, n.d.).
This gave the product engineers access to the names, addresses, phone numbers, email
zones and passwords of its 128m exceptional clients. The affiliation said it had as of late wound
up monitoring the interruption two weeks sooner. Therefore, it is before long referencing that its
dynamic clients reset their passwords – which means to reconsider what is without a doubt a
standout amongst the best information breaks ever of the web (eBay Breach, n.d.). Following this
certification, eBay's general clients would be maintained in speaking to the affiliation some
searching for solicitation. For what reason did it take eBay no under two months to find that the
propelled strike had occurred? Also, having found the impedance, for what reason did an
additional two weeks sneak past before its clients were instructed? What is pushing is the way
eBay appears to have tried to play down this occasion (eBay Breach, n.d.). It underlined that the
engineers essentially picked up an "unpretentious number" of master login affirmations – yet the
theft of only a solitary piece of specialist login subtleties can bargain an affiliation (eBay Breach,
n.d.)
EBAY’S SECURITY DATA BREACH 4
It mentioned that the social event's PayPal online part association had not been broken.
Regardless, the robbery of an extensive number of customers' precious information will have
made open passages for cutting edge burglary from banks and particular affiliations beginning
late (eBay Breach, n.d.). Whatever the central purposes of the eBay case, this occasion raises
logically wide issues about the slightness of the electronic economy. Everything considered, at
whatever point settled in, well-financed web names are feeble against this sort of strike on their
databases, this should incite some hard reasoning over the general business organize (eBay
Breach, n.d.). Two issues merit featuring. In any case, while different affiliations consider the
hazard of automated assault, too few are setting up alluring structures to perceive such
movement.
Regarding the security breach of eBay, it was quite shocking given that the company is so
large. According to eBay, the security breach had occurred during the months of February and
March when hackers decided to hack the system managing to obtain critical and vital
information from small business across the world (Kelly, G., 2014). After they achieve small
information, it gave them access to the entire database of eBays platform. Following such access,
those who had hacked the system were presented with information of consumers and customers
credit card information, addresses, phone numbers, email addresses, and so forth. The personal
identifying information that could also put them in further danger as opposed to just identity or
financial stressors (Kelly, G., 2014).
It has been noted that due to the poor management of eBay, these were the main factors
of enabling hackers to enter into the system. To be exact, regarding the processes and the amount
in which was handled was an actually resulted in a public outcry (eBay Breach, n.d.). eBay stated
EBAY’S SECURITY DATA BREACH 5
in their disclosure that dealing with the security breach wasn’t announced until after two months
of the hackers getting in. eBay had made a mistake in believing that data of consumers and
businesses weren’t compromised and that is why eBay didn’t notify the users of the platform. As
necessities are, the affiliation would maybe uncover to them when it at first fathomed these
aggressors had data concerning client information (Finkle, 2016). Right, when information had
been broken on the 21st of May 2014 clients had encouraged to reset their passwords physically.
Undeniably, this ought to have been the hidden development in order to guarantee the security of
the clients' information including their charge card data.
This response to the consumers and business’s alike was a result of poor management and
poor communication on the company’s part. eBay didn’t contact the users of the platform in
enough time that further implications of security measures could be taken (eBay Breach, n.d.). In
addition, consumers were trying to achieve contact with eBay because of them not resulting in
notices to them once they became aware of the attack. eBay should have responded immediately
whether they believed or not that the information on the platform was going to be jeopardized or
not (eBay Breach, n.d.). It was the right of the those utilizing the platform to know this
information at the moment eBay found out themselves. But instead, they didn’t want to put their
company at the front of the light and deter possibly sales so that they could be faced with a loss
of profits.
Due to the fact that eBay concealed the information of the security breach from the
public, further implications and information were put at stake. Management directly reflected the
diminishing consumer activity as being nothing abnormal while solely developing attributes to
the respect of the consumers (eBay Breach, n.d.). In fact, eBay had even recorded the decrease in
EBAY’S SECURITY DATA BREACH 6
customers that were otherwise actively involved with the site. eBay confirmed that there has
been a loss of nearly $2 million dollars during the time of the security breach.
To conclude, eBay had clearly committed themselves to many mistakes resulting in the
breach and after the breach (Peterson, A., 2014). They should have yielded further consumers
from becoming victims of their information being stolen. Even before the security breach by the
hackers, eBay had been known to have security issues throughout the system and platform. They
had once before had global security issues concerning the inside hacking but that it didn’t result
in consumers information being stolen as it did this time (Peterson, A., 2014). The employees
were gaining access to email accounts that contained the important and sensitive data in which
still, caused many problems and challenges to arise.
The communication faults and transparency of eBay has continuously been an issue in
which has also resulted in further implications against their reputation. For example, with the
lack of time framing to announce the security breach was one concern while not establishing
further security measures was another (Peterson, A., 2014). eBay did wrong by their consumers
to not inform them of the security breach until months after it had occurred just because of their
beliefs.
As client grievances ended up clear eBay without a doubt had neglected to illuminate
them concerning the circumstance analyzing its client association (Kelly, G., 2014). With eBays
poor execution concerning their reaction to improve this, they ought to have measures set up
about with speedier reaction time to the general open concerning its Information security
program. JD Sherry who is the VP of Technology game-plans, Trend Micro said that eBay had
EBAY’S SECURITY DATA BREACH 7
neglect to get from other information breaks. In 2013 Adobe had in like way been in a security
break (Kelly, G., 2014).
Programmers over the web have one objective as a top priority, to accomplish access to
the frameworks working or by means of evacuating and adjusting existing data. Programmers
become fruitful at entering the IT framework that the organization has used and set up and most
breaks abandon see until it is too late (Kelly, G., 2014). Be that as it may, the security breach that
entered the arrangement of eBay was one that was alarming and was proclaimed as horrendous.
eBay is an online sale gathering where people and organizations alike can post their items and
administrations available to be purchased through either an offering framework or a purchase
now framework (Kelly, G., 2014). The association explained that in a burst of its database
between late February and early March, programming engineers grabbed a few its masters' login
attestations.
EBAY’S SECURITY DATA BREACH 8
References
Kelly, G. (2014, September 02). eBay Suffers Massive Security Breach, All Users Must Change
Their Passwords. Retrieved April 29, 2019, from
https://www.forbes.com/sites/gordonkelly/2014/05/21/ebay-suffers-massive-security-
breach-all-users-must-their-change-passwords/#70dff4427492
Peterson, A. (2014, May 21). eBay asks 145 million users to change passwords after a data
breach. Retrieved April 29, 2019, from https://www.washingtonpost.com/news/the-
switch/wp/2014/05/21/ebay-asks-145-million-users-to-change-passwords-after-data-
breach/?noredirect=on&utm_term=.e0033badd2bb
eBay Breach: 145 Million Users Notified. (n.d.). Retrieved April 29, 2019, from
https://www.bankinfosecurity.com/ebay-a-6858

More Related Content

Similar to Ebay cyber attack

Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
Ebay swot summary
Ebay swot summary Ebay swot summary
Ebay swot summary buddymouse10
 
Adobe Security Breach
Adobe Security BreachAdobe Security Breach
Adobe Security BreachGaurav Dubey
 
Ebay swot summary
Ebay swot summary Ebay swot summary
Ebay swot summary buddymouse10
 
social_engineering.pptx
social_engineering.pptxsocial_engineering.pptx
social_engineering.pptxalexadejumo
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docxaryan532920
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022ndcmanagement
 
Security SolutionThe weekly assignment for the course is a compreh.docx
Security SolutionThe weekly assignment for the course is a compreh.docxSecurity SolutionThe weekly assignment for the course is a compreh.docx
Security SolutionThe weekly assignment for the course is a compreh.docxkaylee7wsfdubill
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 
Interested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docxInterested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docxvrickens
 
Examination paper information technology and management & data base managemen...
Examination paper information technology and management & data base managemen...Examination paper information technology and management & data base managemen...
Examination paper information technology and management & data base managemen...NMIMS ASSIGNMENTS HELP
 
Examination paper information technology and management data base management...
Examination paper information technology and management  data base management...Examination paper information technology and management  data base management...
Examination paper information technology and management data base management...NMIMS ASSIGNMENTS HELP
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentationSreejith Nair
 

Similar to Ebay cyber attack (14)

Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Ebay swot summary
Ebay swot summary Ebay swot summary
Ebay swot summary
 
Adobe Security Breach
Adobe Security BreachAdobe Security Breach
Adobe Security Breach
 
Ebay swot summary
Ebay swot summary Ebay swot summary
Ebay swot summary
 
social_engineering.pptx
social_engineering.pptxsocial_engineering.pptx
social_engineering.pptx
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
Ebay
EbayEbay
Ebay
 
Security SolutionThe weekly assignment for the course is a compreh.docx
Security SolutionThe weekly assignment for the course is a compreh.docxSecurity SolutionThe weekly assignment for the course is a compreh.docx
Security SolutionThe weekly assignment for the course is a compreh.docx
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Interested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docxInterested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docx
 
Examination paper information technology and management & data base managemen...
Examination paper information technology and management & data base managemen...Examination paper information technology and management & data base managemen...
Examination paper information technology and management & data base managemen...
 
Examination paper information technology and management data base management...
Examination paper information technology and management  data base management...Examination paper information technology and management  data base management...
Examination paper information technology and management data base management...
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 

More from DamaineFranklinMScBE

Digital Forensics Assignment One UEL and Unicaf
Digital Forensics Assignment One UEL and UnicafDigital Forensics Assignment One UEL and Unicaf
Digital Forensics Assignment One UEL and UnicafDamaineFranklinMScBE
 
LEGAL AND REGULATORY STRUCTURE PREVAILING IN THE UK RELATED TO DATA PRIVACY A...
LEGAL AND REGULATORY STRUCTURE PREVAILING IN THE UK RELATED TO DATA PRIVACY A...LEGAL AND REGULATORY STRUCTURE PREVAILING IN THE UK RELATED TO DATA PRIVACY A...
LEGAL AND REGULATORY STRUCTURE PREVAILING IN THE UK RELATED TO DATA PRIVACY A...DamaineFranklinMScBE
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksDamaineFranklinMScBE
 
Classical Cryptography and Digital Encryption
Classical Cryptography and Digital EncryptionClassical Cryptography and Digital Encryption
Classical Cryptography and Digital EncryptionDamaineFranklinMScBE
 
Identity, Authentication, and Access Control
Identity, Authentication, and Access ControlIdentity, Authentication, and Access Control
Identity, Authentication, and Access ControlDamaineFranklinMScBE
 
Is online education an effective replacement for traditional classroom teaching?
Is online education an effective replacement for traditional classroom teaching?Is online education an effective replacement for traditional classroom teaching?
Is online education an effective replacement for traditional classroom teaching?DamaineFranklinMScBE
 
What is The Role of Students in Online Courses?
What is The Role of Students in Online Courses?What is The Role of Students in Online Courses?
What is The Role of Students in Online Courses?DamaineFranklinMScBE
 

More from DamaineFranklinMScBE (12)

Digital Forensics Assignment One UEL and Unicaf
Digital Forensics Assignment One UEL and UnicafDigital Forensics Assignment One UEL and Unicaf
Digital Forensics Assignment One UEL and Unicaf
 
LEGAL AND REGULATORY STRUCTURE PREVAILING IN THE UK RELATED TO DATA PRIVACY A...
LEGAL AND REGULATORY STRUCTURE PREVAILING IN THE UK RELATED TO DATA PRIVACY A...LEGAL AND REGULATORY STRUCTURE PREVAILING IN THE UK RELATED TO DATA PRIVACY A...
LEGAL AND REGULATORY STRUCTURE PREVAILING IN THE UK RELATED TO DATA PRIVACY A...
 
Security Management
Security ManagementSecurity Management
Security Management
 
Security Management
Security ManagementSecurity Management
Security Management
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
 
Classical Cryptography and Digital Encryption
Classical Cryptography and Digital EncryptionClassical Cryptography and Digital Encryption
Classical Cryptography and Digital Encryption
 
Identity, Authentication, and Access Control
Identity, Authentication, and Access ControlIdentity, Authentication, and Access Control
Identity, Authentication, and Access Control
 
Is online education an effective replacement for traditional classroom teaching?
Is online education an effective replacement for traditional classroom teaching?Is online education an effective replacement for traditional classroom teaching?
Is online education an effective replacement for traditional classroom teaching?
 
What is The Role of Students in Online Courses?
What is The Role of Students in Online Courses?What is The Role of Students in Online Courses?
What is The Role of Students in Online Courses?
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
IT & Internet Law
IT & Internet LawIT & Internet Law
IT & Internet Law
 
IT and Internet Law
IT and Internet LawIT and Internet Law
IT and Internet Law
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Ebay cyber attack

  • 1. Running Head: EBAY’S SECURITY DATA BREACH 1 eBay’s Security Data Breach instructor class date name
  • 2. EBAY’S SECURITY DATA BREACH 2 eBay is considered to be a multinational e-commerce business with its headquarters located in the United States. eBay was founded in the year 1998 by a man named Pierre Omidyar. This online auctioning business has built easier methods of reaching consumers across the nation as opposed to being settled in just one small town or community. Essentially, eBay has become one of the most notable e-commerce sites across the web through its methods of trading and conducting sales on their platform (Kelly, G., 2014). eBay is also a multibillion-dollar industry in which has manifested the online presence. Just in the year 2016, there were over 170 million active users with nearly 250 million searches being conducted on a daily basis (eBay Breach, n.d.). In 2014, eBay stated that they had accrued a security breach throughout the databased that could have compromised nearly 150 million customers. With such magnitude, the incidents in which the consumers affected were qualified as being the 2nd largest data breach since the history of the internet (Kelly, G., 2014). The data breach of eBay posted a multitude of risks regarding the common identify features of consumers, the theft of passwords to accounts in the database system, and other sorts of passwords had been compromised. Regarding the breach, eBay responded to their consumers urging them to change the passwords to all accounts regarding their system and to rather, begin utilizing the credit card monitoring services that were being provided to ensure no further breaches and compromising of their account would take place (Kelly, G., 2014). This paper goes to discuss the situation of the breach regarding an extensive analysis of how eBay handled the breach regarding their security measures that had already been established.
  • 3. EBAY’S SECURITY DATA BREACH 3 Hackers over the internet have one goal in mind, to achieve access to the systems functioning or via removing and altering existing information. Hackers become successful at penetrating the IT system that the company has utilized and set in place and most breaches go without notice until it is too late. However, the security breach that penetrated the system of eBay was one that was startling and was declared as dreadful (eBay Breach, n.d.). eBay is an online auction forum where individuals and companies alike can post their products and services for sale through either a bidding system or a buy now system. The affiliation articulated that in a burst of its database between late February and early March, programming engineers picked up two or three its specialists' login assertions (eBay Breach, n.d.). This gave the product engineers access to the names, addresses, phone numbers, email zones and passwords of its 128m exceptional clients. The affiliation said it had as of late wound up monitoring the interruption two weeks sooner. Therefore, it is before long referencing that its dynamic clients reset their passwords – which means to reconsider what is without a doubt a standout amongst the best information breaks ever of the web (eBay Breach, n.d.). Following this certification, eBay's general clients would be maintained in speaking to the affiliation some searching for solicitation. For what reason did it take eBay no under two months to find that the propelled strike had occurred? Also, having found the impedance, for what reason did an additional two weeks sneak past before its clients were instructed? What is pushing is the way eBay appears to have tried to play down this occasion (eBay Breach, n.d.). It underlined that the engineers essentially picked up an "unpretentious number" of master login affirmations – yet the theft of only a solitary piece of specialist login subtleties can bargain an affiliation (eBay Breach, n.d.)
  • 4. EBAY’S SECURITY DATA BREACH 4 It mentioned that the social event's PayPal online part association had not been broken. Regardless, the robbery of an extensive number of customers' precious information will have made open passages for cutting edge burglary from banks and particular affiliations beginning late (eBay Breach, n.d.). Whatever the central purposes of the eBay case, this occasion raises logically wide issues about the slightness of the electronic economy. Everything considered, at whatever point settled in, well-financed web names are feeble against this sort of strike on their databases, this should incite some hard reasoning over the general business organize (eBay Breach, n.d.). Two issues merit featuring. In any case, while different affiliations consider the hazard of automated assault, too few are setting up alluring structures to perceive such movement. Regarding the security breach of eBay, it was quite shocking given that the company is so large. According to eBay, the security breach had occurred during the months of February and March when hackers decided to hack the system managing to obtain critical and vital information from small business across the world (Kelly, G., 2014). After they achieve small information, it gave them access to the entire database of eBays platform. Following such access, those who had hacked the system were presented with information of consumers and customers credit card information, addresses, phone numbers, email addresses, and so forth. The personal identifying information that could also put them in further danger as opposed to just identity or financial stressors (Kelly, G., 2014). It has been noted that due to the poor management of eBay, these were the main factors of enabling hackers to enter into the system. To be exact, regarding the processes and the amount in which was handled was an actually resulted in a public outcry (eBay Breach, n.d.). eBay stated
  • 5. EBAY’S SECURITY DATA BREACH 5 in their disclosure that dealing with the security breach wasn’t announced until after two months of the hackers getting in. eBay had made a mistake in believing that data of consumers and businesses weren’t compromised and that is why eBay didn’t notify the users of the platform. As necessities are, the affiliation would maybe uncover to them when it at first fathomed these aggressors had data concerning client information (Finkle, 2016). Right, when information had been broken on the 21st of May 2014 clients had encouraged to reset their passwords physically. Undeniably, this ought to have been the hidden development in order to guarantee the security of the clients' information including their charge card data. This response to the consumers and business’s alike was a result of poor management and poor communication on the company’s part. eBay didn’t contact the users of the platform in enough time that further implications of security measures could be taken (eBay Breach, n.d.). In addition, consumers were trying to achieve contact with eBay because of them not resulting in notices to them once they became aware of the attack. eBay should have responded immediately whether they believed or not that the information on the platform was going to be jeopardized or not (eBay Breach, n.d.). It was the right of the those utilizing the platform to know this information at the moment eBay found out themselves. But instead, they didn’t want to put their company at the front of the light and deter possibly sales so that they could be faced with a loss of profits. Due to the fact that eBay concealed the information of the security breach from the public, further implications and information were put at stake. Management directly reflected the diminishing consumer activity as being nothing abnormal while solely developing attributes to the respect of the consumers (eBay Breach, n.d.). In fact, eBay had even recorded the decrease in
  • 6. EBAY’S SECURITY DATA BREACH 6 customers that were otherwise actively involved with the site. eBay confirmed that there has been a loss of nearly $2 million dollars during the time of the security breach. To conclude, eBay had clearly committed themselves to many mistakes resulting in the breach and after the breach (Peterson, A., 2014). They should have yielded further consumers from becoming victims of their information being stolen. Even before the security breach by the hackers, eBay had been known to have security issues throughout the system and platform. They had once before had global security issues concerning the inside hacking but that it didn’t result in consumers information being stolen as it did this time (Peterson, A., 2014). The employees were gaining access to email accounts that contained the important and sensitive data in which still, caused many problems and challenges to arise. The communication faults and transparency of eBay has continuously been an issue in which has also resulted in further implications against their reputation. For example, with the lack of time framing to announce the security breach was one concern while not establishing further security measures was another (Peterson, A., 2014). eBay did wrong by their consumers to not inform them of the security breach until months after it had occurred just because of their beliefs. As client grievances ended up clear eBay without a doubt had neglected to illuminate them concerning the circumstance analyzing its client association (Kelly, G., 2014). With eBays poor execution concerning their reaction to improve this, they ought to have measures set up about with speedier reaction time to the general open concerning its Information security program. JD Sherry who is the VP of Technology game-plans, Trend Micro said that eBay had
  • 7. EBAY’S SECURITY DATA BREACH 7 neglect to get from other information breaks. In 2013 Adobe had in like way been in a security break (Kelly, G., 2014). Programmers over the web have one objective as a top priority, to accomplish access to the frameworks working or by means of evacuating and adjusting existing data. Programmers become fruitful at entering the IT framework that the organization has used and set up and most breaks abandon see until it is too late (Kelly, G., 2014). Be that as it may, the security breach that entered the arrangement of eBay was one that was alarming and was proclaimed as horrendous. eBay is an online sale gathering where people and organizations alike can post their items and administrations available to be purchased through either an offering framework or a purchase now framework (Kelly, G., 2014). The association explained that in a burst of its database between late February and early March, programming engineers grabbed a few its masters' login attestations.
  • 8. EBAY’S SECURITY DATA BREACH 8 References Kelly, G. (2014, September 02). eBay Suffers Massive Security Breach, All Users Must Change Their Passwords. Retrieved April 29, 2019, from https://www.forbes.com/sites/gordonkelly/2014/05/21/ebay-suffers-massive-security- breach-all-users-must-their-change-passwords/#70dff4427492 Peterson, A. (2014, May 21). eBay asks 145 million users to change passwords after a data breach. Retrieved April 29, 2019, from https://www.washingtonpost.com/news/the- switch/wp/2014/05/21/ebay-asks-145-million-users-to-change-passwords-after-data- breach/?noredirect=on&utm_term=.e0033badd2bb eBay Breach: 145 Million Users Notified. (n.d.). Retrieved April 29, 2019, from https://www.bankinfosecurity.com/ebay-a-6858