Preview

Choicepoint Attack

Good Essays
Open Document
Open Document
401 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Choicepoint Attack
Q2. Given ChoicePoint’s experience, what is the likely action of similar companies whose records are compromised in this way?

This crime is an example of a failure of authentication, not network break-in. ChoicePoints’s firewalls and other safeguards were not overcome or harmed. To avoid such problems in the future, the likely action that should be taken by the similar companies is to applying more authentication methods. For example by using a unique user name and determines that the person is legitimate through the input of a correct password. The other authentication mechanisms to prove the legitimate identity are user-selected passwords, system-generated passwords, passphrases, question-and-answer passwords, tokens, and various biometric characteristics and such methods entail verification of users through matching fingerprints, facial features, irises, or voices.

Given your answer, do you think federal regulation and additional laws are required?

Since the identity theft level increased and become serious, it is important to have strong laws that will protect the database systems from unauthorized persons. The regulations must be adopted with the newest technologies and must be clearly developed to this crime. Some punishments need to be arranged for those who convicted in this serious crime.

What other steps could be taken to ensure that data vendors notify people harmed by data theft?

The data theft identified by the various organizations is not uniform. Some of the steps that can be implement by organizations such as:

• sensitive data should never be removed from a secured worksite without taking precautions such as encrypting files or shredding documents;

• newspaper articles, copies of letters reporting a theft to consumers, notification lists of state agencies, direct entry of incidents by the public, and other web sites as sources for the theft;

• install software that will scan all e-mails before they are sent for

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Internet and network security are a primary concern for many businesses. In today 's world, the number of hacks and leaks of data is continuing to rise, which is what makes security the primary concern. What may or may not be apparent is that many breaches of data tend to be caused by internal users ' errors that may not even have been meant to be malicious. Liaskos and Sandy quote a study by Roman which revealed…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    In addition, organizations constantly face legal, ethical, and regulatory requirements from governments, business partners, and others they work with. These will add additional factors when weighing the costs and benefits of different solutions to information security risks. In fact, these requirements may even make some risks more important, often because a company will not want to get in trouble with a government even though they might normally live with the risk they are being forced to resolve through regulations. Understanding the various laws that will affect data is of prime importance to any security…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Cp Case Study

    • 976 Words
    • 4 Pages

    | * Data soon became available after authentication breach * Revealed hole in ChoicePoint security system * Trust of security standards instantly lost…

    • 976 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    This company needs to look at for the future, for data loss prevention to be effective, the company must decide on the right strategy, employ the right people, target the right data and purchase the right technology. With these accommodations this should reduce the likelihood and cost of future data, breaches and or violating compliance, rules and laws and or regulations. This will also allow the company to have control over how and what data is being exported and what employees or students are online and how this data is used throughout this company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    After a thorough investigation by federal law enforcement it had been determined that hackers were able to infiltrate the network and place malware on several pieces of the companies Point of Sale (POS) systems. The attackers were meticulous and thought through their attack, attempting to…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    HIPAA (1996) Compliance

    • 657 Words
    • 3 Pages

    HIPAA (1996) compliance HCS/545 10/29/12 By Sunao Slayton, Bonnie Zapletal Julienne Auguste, Toccara Grant Introduction     Responded to the situations in a way that meets HIPAA (1996) privacy, security, and HITECH (2009ond to the) breach notice requirements. Ethical issues that relate to this situation.…

    • 657 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Security is a business issue because companies have very valuable information assets to protect. Business must protect not only their own information assets but also those of customers, employees, and business partners. Failure to do so may open the firm to costly litigation for data exposure or theft. Systems often hold confidential information about customers information( social security, date of birth, credit card information, taxes), corporate operations, new product development plans, marketing strategies. These information assets have tremendous value for the companies and can be devastating if they are lost, destroyed, disturbed or placed in wrong hands.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Diploma Level 3 Hsc 38

    • 299 Words
    • 2 Pages

    Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental lost or destruction of, or damage to personal data.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A large American multinational corporation wants to establish a telephone and email hotline for employees to report wrongdoing within the company. The company has offices in the European Union and wants to ensure that it avoids violations of E.U. data protection laws. What steps can the company take to increase the likelihood that its hotline reporting system remains in compliance?…

    • 630 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Leaving my family was the hardest thing I could do. I knew it was for a good cause, but after the deaths and such I had to make a decision. Finally I decided not to reenlist due to the people dying all around me, the horrible conditions, and last of all the small huts. Though I thought it would be a fun journey, I had to realize what was actually going on. Hours and hours of deciding on to reenlist or not, I believe I made the right choice.…

    • 961 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    Data Breach

    • 3998 Words
    • 16 Pages

    A “global cyber fraud operation” sounds like something straight out of a James Bond movie. But when cyber crooks recently infiltrated Heartland Payment Systems’ processing system and accessed potentially tens of millions of credit card numbers, company executives learned that type of criminal activity is very real.…

    • 3998 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    [2] R. Mogull, “Top Five Steps to Prevent Data Loss and Information Leaks. Gartner Research (July 2006),” http://www.gartner.com, 2010.…

    • 1821 Words
    • 8 Pages
    Powerful Essays