98 Document for analysis hackers hijack email address To Kar

9.8 Document for analysis: hackers hijack e-mail address
To: Kara Khalial <kkhalial@coastal.net>
From: Justin Small jsmall@princetonpayment.org
Subject: Customer Security Incident at Princeton Payment Systems
Cc:
Companies and individual across the country are experiencing more and more
security breaches. This is to let you know that you are receiving this e-mail because
of a recent unfortunate security breach at Princeton Payment Systems. Rest
assured, however that as a customer of Princeton, your privacy was never at risk.
We promise to guard your privacy around the clock.
Hackers last week were able to maliciously exploit a new function that were trying
to use to make the customer log-in process faster for you and our other customers.
The hackers were ingenious and malicious, going to extreme lengths to gain access
to some customer addresses at Princeton. You should now beware of scams that
many result from your address being used in phishing scams. To learn more go to
http://www.fdic.gov/consumers/consumer/alerts/phishing.html.
Provide even more information about this incident, the U.S postal service will bring
you a letter with more information. Taking your privacy very seriously, email
addresses are heavily protected here at Princeton. Within hours of the hacker breakin, the log-in mechanism was disabled and a new procedure was established. The
user is now required to enter their e-mail address and their password before they
can log in successfully. E-mail addresses were the only information the hackers got.
Other information such as account information and other personal information were
never risked. We appreciate you being a Princeton customer. Sincerely,

TASK: List seven weaknesses found in the email.

Solution

1.) First of all the subject of the e-mail is to be very serious. Here, it is good but it can be improved like----

Hackers breached our systems.

2.) Just go point to point, don\'t make the content too long.

3.) Only give the information about the incident required as per the views of user.

4.) Expain in brief what you are doing to overcome the situation.

5.) Explain why it happened.

6.) Write about the helpline desk if having queries.

9.8 Document for analysis: hackers hijack e-mail address To: Kara Khalial <kkhalial@coastal.net> From: Justin Small jsmall@princetonpayment.org Su

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site