Preview

First Draft For Cyber Security Paper

Powerful Essays
Open Document
Open Document
3225 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
First Draft For Cyber Security Paper
Addressing Cybersecurity
The Government’s Role in Protecting Against Cyber Threats

Derryck Coleman

Draft

Table of Contents
Introduction 1
Cybersecurity Laws 3
Federal Laws 3
Health Insurance Portability and Accountability Act of 1996 3
Gramm-Leach-Bliley Act 4
2002 Homeland Security Act 5
State Laws 6
SEC Disclosure Rules 7
Cyber Incidents 9
Conclussion 11
Consumers 11
Entities 12
Government 13
Work Cited 15

Introduction
Data collection has become an everyday activity of entities both big and small. Financial institutions require sensitive information, including Social Security Numbers, to access credit histories. Healthcare providers require personal information to perform diagnostics on patients. And just about all companies require both financial and personal information to process payments and conduct marketing activities.
With a growing reliance on technology, it is important for companies to protect against cyber risks. Since 2011, there have been 144 cyber data breaches at 99 different publicly traded companies or their subsidiaries. These breaches come with great costs. According to Ponemon Institute’s 2014 Cost of Cyber Crime Study: United State, the average cost of cyber-crime has risen from $6.5 million in 2010 to $12.7 million in 2014. The study also found a positive correlation between the time it takes to contain a cyber-attack and the cost associated with containing the cyber-attack, meaning it is best for companies to be prepared in case of a breach.
The type and length of time data is held varies greatly from one company to the next and is largely unregulated in the United States. One example of this is the Telecommunications industry. A document entitled Retention Periods of Major Cellular Service Providers revealed that three of the six top Telecom companies held subscriber information indefinitely. It also showed that these companies held call details from 4 months to 2 years, text message details from 60 days to 7



Cited: Acohido, B. (2009, January 23). Hackers breach Heartland Payment credit card system. Retrieved from USA Today: http://usatoday30.usatoday.com/money/perfi/credit/2009-01-20-heartland-credit-card-security-breach_N.htm Anderson, H Audit Analytics. (2014, October 31). Cybersecurity Database. Sutton, MA, USA. Paul, I. (2012, June 6). Update: LinkedIn Confirms Account Passwords Hacked. Retrieved from PC World: http://www.pcworld.com/article/257045/6_5m_linkedin_passwords_posted_online_after_apparent_hack.html Ponemon Institute LLC Sony suffers second data breach with theft of 25m more user details. (2011, May 3). Retrieved from The Guardian: http://usatoday30.usatoday.com/money/perfi/credit/2009-01-20-heartland-credit-card-security-breach_N.htm Target Corp US Department of Justice. (2010, August). Retention Periods of Major Cellular Service Providers. US Government Printing Office. (2002, November 25). Homeland Security Act of 2002. US Government Printing Office. (2009, August 24). 45 CFR Subpart D. US Securities and Exchange Commission. (2011, October 13). CF Disclosure Guidance: Topic No. 2. Retrieved from http://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm Verizon Enterprise Solutions Walsh, E. (2014, August 7). US Homeland Security contractor reports computer breach. Retrieved from Reuters: http://www.reuters.com/article/2014/08/07/us-usa-security-contractor-idUSKBN0G62N420140807

You May Also Find These Documents Helpful

  • Good Essays

    Never allow any type of attack, successful or otherwise to go undocumented or wasted. “If you experience an attack, learn from it,” For example, let us analyze an information security breach case of a financial corporation that caught an employee trying to steal very private company trading algorithms. Accountability and authenticity must immediately be exercised to ensure…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Data breaches and cyber-attacks frequently has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident. (Ponemon Institute, 2013)…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    According to SC Magazine “Researchers with SpiderLabs, the advanced security team with information security company Trustwave, discovered a treasure trove of nearly two million pilfered credentials from a variety of companies, including Facebook, Google, Yahoo, Twitter, LinkedIn and payroll service provider ADP.” I was able to verify this portion of the article when the information was provided from a known credible news source (CNN). The security breach made national news and was also provided on our local News4 as well.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Hobson, D. (2008, August 8). The real cost of a security breach. SC Magazine. Retrieved July 13, 2014, from http://www.scmagazine.com/the-real-cost-of-a-security-breach/article/113717/…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    References: Department of Veterans Affairs. (2007). VA Handbook 6500. Washington, DC: US Government Printing Office. Retrieved February 20, 2013, from http://www.va.gov/vapubs/viewPublication.asp?Pub_ID=56…

    • 1273 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Good afternoon Traci, after assessing the current status and future needs of Marylee Luther’s construction company and taking some notes from your conversation with her the other day we have compiled a performance management framework that we believe will integrate the company’s goals to its strategy while making the growth move from Michigan to Arizona and staying consistent with the organizations current revenue and employee growth projections over the next year. We will briefly outline this performance management plan as it pertains to the categories of alignment of the performance management framework to the organizational business strategy, organizational performance philosophy, the job analysis process you will complete to identify the skills needed by employees, methods used for measuring the employee 's skills, process for addressing skill gaps, and an approach for delivering effective performance feedback. The framework that has been chosen for the organization will ease the growing pains of adding 20% more personnel (130 people) over the next year.…

    • 1223 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    1.1 Effective communication is very important as to be sure that no misunderstandings take place. You need to be clear in your communication whether it be spoken or written. We may need to double check what we are about to say to ensure the other person can understand effectively. When communication breaks down it can lead to an unhappy environment and bad feelings. We need to ensure that we behave in a particular way so the other person can follow suit. For example, if you are polite, the other person will be too. Effective communication helps to develop professional relationships.…

    • 1423 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Gootenberg, P. (2009). Talking about the Flow: Drugs, Borders, and the Discourse of Drug Control. University of Minnesota Press. Retrieved from the jstor database.…

    • 1081 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Cybersecurity Case Study

    • 1111 Words
    • 5 Pages

    Getting an adequate cybersecurity budget can be one of the most challenging tasks that many CISOs face. The board wants to keep shareholders happy, which means that they prefer spending on IT to be devoted to business growth and revenue generation. The frequency of breaches makes desensitization more likely, leading to a decreased feeling of urgency to ensure the strength of cybersecurity. Furthermore, many executives have been lulled into a false or misguided sense of security; companies have survived major breaches, and the impact on companies' stock prices has not been as extreme as the declines that followed on the heels of early breaches. It does not help that the return…

    • 1111 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Not only am I pursuing a Cybersecurity degree from the University of Maryland University College, but I am planning on making a lifetime career in this particular field, which means I am taking every opportunity possible to learn as much as I can about this career field, and frankly do so with serious passion and dedication. Cybersecurity is one of the few blossoming fields within the U.S. and abroad now in days with all of the new technological advances being made every single day as well as the newly constructed, successful Cybersecurity companies. Every company that wants to protect their classified information hires a Cybersecurity team to keep that information safe and out of the hands of people that could do wrong with that information; even the U.S. government has a massive Cybersecurity program as part of our National Defense to…

    • 824 Words
    • 4 Pages
    Good Essays
  • Good Essays

    They give your information to cooperate companies that can make a profit. Most have this information or the citizens that live in a country like Canada and the United States. Corporates companies break the law and the government specially the prime minster turn a blind eye. Companies can big huge profit and breaching your privacy therefore increase the economy of the country. For example the UnitedHealth made huge profits of taking data from people without permission UnitedHealth made billions. UnitedHealth got different types of information from its customer such as how much they consume the medicine, what time and the effects of the medicine. When going through the internet you get ads that you are instead sometimes exactly what you want. The reason why is corporate companies are allowed to steal information then use it to its advantage. 2016 governments have been breaching data and have not apologies openly to people in their countries. Different countries such as china riot over their privacy and are speaking up about their privacy being breach but in the western world people are silent and are accepting the government of taking their information. Places where democracy where people are allowed freedom of speech is not allowed to talk about their privacy being breached. Democracy the Greek Latin word translate to Democracy traces back to the Greek words demos, meaning "people," and kratia, meaning "power."…

    • 502 Words
    • 3 Pages
    Good Essays