Access over 35 million academic & study documents

Short Article.edited 3

Content type
User Generated
Subject
Article Writing
Type
Homework
Rating
Showing Page:
1/8
Running head: SHORT ESSAY 1
Short Essay
Student’s Name
Institutional Affiliation

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/8
SHORT ESSAY 2
Short Essay
Part 1
Notably, in the process of searching the best and most appropriate news article to use, I
used Mozilla Firefox as the web browser. In addition, I used Google to search the relevant
newspaper with editorial board for credibility purposes. Besides, given that my topic is internet
hacking, I used key words as internet, news, and hacking. Apparently, there were various news
organizations that appeared in the Google window, such as Huffington Post, Wall Street Journal,
and New York Times. Moreover, I came about articles, such as security news this week,
wrecking the internet, and Hackers cripple US internet from news organizations like Wired, The
Sunday Morning Herald, and Aljazeera respectively. Thus, I chose New York Times for my
article basing on the criteria that the newspaper is the most widely used in the American market
as well as globally. Further, New York Times provides the readers with various options where
they can access different news around the globe.
Summary
Noteworthy, the article Yahoo says 1 billion users accounts were hacked by Goel and
Perlroth (2016) gives an account of several hackings that has occurred in Yahoo organization
from the past four years. Essentially, Yahoo experienced internet hacking in the year 2012, 2013,
and 2014, resulting in disclosure of its sensitive user information, such as dates of births,
telephone number, names, and encrypted passwords. Apparently, the hacker forged the
credentials to login some Yahoo users' accounts without using the passwords. Subsequently,
Yahoo chief information security personnel asserts that the 2014 hacker was state sponsored, and
attacked the organization through the use of the organization proprietary source code. The code
permitted the hacker to create forged texts which a website can easily store on the user’s account.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/8

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 8 pages?
Access Now
Unformatted Attachment Preview
Running head: SHORT ESSAY 1 Short Essay Student’s Name Institutional Affiliation SHORT ESSAY 2 Short Essay Part 1 Notably, in the process of searching the best and most appropriate news article to use, I used Mozilla Firefox as the web browser. In addition, I used Google to search the relevant newspaper with editorial board for credibility purposes. Besides, given that my topic is internet hacking, I used key words as internet, news, and hacking. Apparently, there were various news organizations that appeared in the Google window, such as Huffington Post, Wall Street Journal, and New York Times. Moreover, I came about articles, such as security news this week, wrecking the internet, and Hackers cripple US internet from news organizations like Wired, The Sunday Morning Herald, and Aljazeera respectively. Thus, I chose New York Times for my article basing on the criteria that the newspaper is the most widely used in the American market as well as globally. Further, New York Times provides the readers with various options where they can access different news around the globe. Summary Noteworthy, the article Yahoo says 1 billion users accounts were hacked by Goel and Perlroth (2016) gives an account of several hackings that has occurred in Yahoo organization from the past four years. Essentially, Yahoo experienced internet hacking in the year 2012, 2013, and 2014, resulting in disclosure of its sensitive user information, such as dates of births, telephone number, names, ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Nice! Really impressed with the quality.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents