98 Document for analysis hackers hijack email address To Kar
9.8 Document for analysis: hackers hijack e-mail address
 To: Kara Khalial <kkhalial@coastal.net>
 From: Justin Small jsmall@princetonpayment.org
 Subject: Customer Security Incident at Princeton Payment Systems
 Cc:
 Companies and individual across the country are experiencing more and more
 security breaches. This is to let you know that you are receiving this e-mail because
 of a recent unfortunate security breach at Princeton Payment Systems. Rest
 assured, however that as a customer of Princeton, your privacy was never at risk.
 We promise to guard your privacy around the clock.
 Hackers last week were able to maliciously exploit a new function that were trying
 to use to make the customer log-in process faster for you and our other customers.
 The hackers were ingenious and malicious, going to extreme lengths to gain access
 to some customer addresses at Princeton. You should now beware of scams that
 many result from your address being used in phishing scams. To learn more go to
 http://www.fdic.gov/consumers/consumer/alerts/phishing.html.
 Provide even more information about this incident, the U.S postal service will bring
 you a letter with more information. Taking your privacy very seriously, email
 addresses are heavily protected here at Princeton. Within hours of the hacker breakin, the log-in mechanism was disabled and a new procedure was established. The
 user is now required to enter their e-mail address and their password before they
 can log in successfully. E-mail addresses were the only information the hackers got.
 Other information such as account information and other personal information were
 never risked. We appreciate you being a Princeton customer. Sincerely,
TASK: List seven weaknesses found in the email.
Solution
1.) First of all the subject of the e-mail is to be very serious. Here, it is good but it can be improved like----
Hackers breached our systems.
2.) Just go point to point, don\'t make the content too long.
3.) Only give the information about the incident required as per the views of user.
4.) Expain in brief what you are doing to overcome the situation.
5.) Explain why it happened.
6.) Write about the helpline desk if having queries.

