Preview

IS3350 Unit 2 Assignment 1

Good Essays
Open Document
Open Document
673 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3350 Unit 2 Assignment 1
Background:
On 3 May 2006, a Department of Veterans Affairs (VA) laptop was stolen from a VA data analyst’s home in Montgomery County, Maryland. In addition to the laptop, a personal external hard drive was stolen. The external hard drive contained the personal data (names, social security numbers, dates of birth, disability ratings) for 26.5 million veterans and their spouses. It should be noted that the massive data theft was only one of many that had been discovered over the course of 1.5 years.
Upon discovery of the theft, the VA employee immediately notified the local police and his supervisors. His supervisors did not notify the Veterans Affairs Secretary until 16 May 2006. On 17 May 2006, the Veterans Affairs Secretary notified the FBI, who began to work with the Montgomery County police to investigate the theft.
Results and Conclusions:
Issue 1: The VA employees had authorization to access and use the VA databases for performance of official duties. He was not, however, authorized to take it home as he had no official need to have the data at home. The private data was not properly safeguarded. He failed to password protect (at the very minimum) and encrypt it (Opfer, 2006). For this, he receives the highest honors in the idiot category.
Issue 2: The response of managers and senior executives regarding the notification of stolen data was inappropriate and not timely. They failed to determine the magnitude of the data loss. There was a failure to notify appropriate law enforcement entities of the potential impact on VA programs and operations (Opfer, 2006).
Issue 3: There was a lack of urgency in notifying the Secretary of Veterans Affairs by his immediate staff. They did not notify the Secretary until 16 May 2006 – a full 13 days after the theft of data. This was not clearly identified as a high priority incident and there was a failure to follow up on the incident until after they received a call from the Inspector General (Opfer, 2006).
Issue 4:

You May Also Find These Documents Helpful

  • Good Essays

    There are several key issues posed by this case. First, the varied dates noting the amounts of fraud. Could it be possible that the theft was larger than noted? If the State’s Comptroller’s office…

    • 635 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    We are looking for the item Brake Set, Luffing Mechanism, GUL. Please kindly quote for the following item.…

    • 67 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Is4796 Unit 1 Assignment

    • 370 Words
    • 2 Pages

    My company; RLR Securities Inc., has been in the security service since 2002 we started out with only four (4) people, now we have grown to twenty-two (22) people, RLR Securities Inc. was formed as a small corporation who’s focus was mainly on database performance tuning and security services for database applications. By 2006 we started providing complete security services, including assessments, penetration testing, policy creation, and regulatory compliance assistance.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In a similar case Kerry F. Khan was a program manager for the U.S. Army Corps of Engineers that was charged with conspiracy, bribery, unlawful kickbacks, conspiracy to launder monetary instruments and criminal forfeiture. According to the U.S. Attorney Ronald C. Machen (2013), “Kerry Khan was the ringleader of the largest bribery and bid-rigging scheme in the history of federal contracting,” said U.S. Attorney Machen. “His corrupt network of public officials and private contractors looted the U.S. Treasury for years” (para. 8). For the act committed by Khan he was sentenced to 19 years in prison.…

    • 96 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    I- CM inquired if client obtained his psychotropic medications from the VA. CM continued to assess client’s mental health and medication compliance. CM informed client that his assessment appointment with Laurie Garza, from LAMP VASH, was changed from 3/25 to 3/24. CM inquired if client attended all of his medical appointments at the VA. CM informed client that his six months in the program was approaching. CM informed client that an extension may be granted for him, only if client proves that he has a plan and is definitely working towards his housing goals.…

    • 1100 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Is3350 Unit 1 Assignment

    • 653 Words
    • 3 Pages

    1. Once I have completed my current courses I will apply for TPP mathematics level C or enrol in an Accounting degree.…

    • 653 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    On 6-9-17 while Sgt. M. Sandstrom was escorting D. Copeland #1072522 to SHU records indicate that…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Snc's Case Study

    • 143 Words
    • 1 Page

    SNC’s order crossed the threshold of acceptable only because SNC mentioned the title of each of the five paragraphs in the five-paragraph order. SNC issued the order with neither confidence nor logic. SNC fabricated information pertaining to the leadership of fictitious higher units. SNC did not have a well-established plan thus resulting in Candidate Moore taking charge and leading the fire team. SNC overcame these initial deficiencies and failures, asserted himself, and took charge of SNC’s team by addressing the problems. SNC quickly formed a plan and executed it well by providing clear instructions…

    • 143 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Cp Case Study

    • 976 Words
    • 4 Pages

    | * Many individuals lost their SSN to the criminals * More info can be accessed as a result which makes the customer or ChoicePoint more vulnerable to other crimes…

    • 976 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    The breach was not an outside job, but instead I choose it because of the relevance of the topics we have discussed thus far. The Army National Guard announced that a contracted employee transferred personally identifiable information to a data center that was not accredited by the DoD. This left the PII of all current and former Army National Guard members potentially at risk. The information included names, full Social Security Numbers, dates of birth and home addresses. The Army National Guard released the information quickly to warn current and former guard members that their data was potentially at risk and established a call center and a website that members could go to for personal worrying about their information. There they could check…

    • 141 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Is3350 Unit 2 Assignment

    • 1380 Words
    • 6 Pages

    Introductions: All three of my subjects are females that I have known for at least 5 years. Two of the subjects (1 and 2) are mother and daughter. The mother and daughter were asked in a group setting with 11 questions I had a lot of questions because I wasn’t sure of what my younger subject would be able to answer. Everybody was asked the same questions. Since I knew my subjects I just called and seen whether they would be willing to answer some questions. They all agree so I did the mother and daughter on September 15 on a Tuesday, and my third subject was September 16 on a Wednesday. I drove to their house and I spent about 3 hours with subject 1 and 2, and I spent 2 hours with subject 3. Subject 1 and 2 was questioned in subject 1 bedroom…

    • 1380 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Omega Inc. Bia

    • 2982 Words
    • 12 Pages

    Two weeks ago, Omega experienced a significant loss of proprietary data (estimated value $550,000.00) that was stored electronically in an Oracle database in their main office in Reston. The data was unrecoverable and backups were not being routinely maintained, so no restoration was possible. Although he has no hard evidence, Omega’s CTO believes that the loss resulted from deliberate deletion of files by a systems administrator from the Kansas City office that had been “let go” several weeks prior to the loss. Needless to say, the CTO has been tasked to “get things under control.”…

    • 2982 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Private Sector Response

    • 551 Words
    • 3 Pages

    Collected information and results will be provided to the government for further investigation. The private sector is in charge of ensuring the security of the networks and areas around the systems where the data breach occurred to manage the situation and prevent any loss of evidences and additional data. While the government investigates and deals with the situation, the private sectors will start cleaning, recovering, and securing the system. They will need to consider all alternatives to replace the compromised resources and machines, correct weaknesses found in the affected systems, and rebuild it to meet the acceptable security level. They should be effectively prepared for future threats and work on eliminating as many vulnerabilities as possible. Formal policies and security tools will also be implemented to protect systems and networks and mitigate the damage of the breach. Lastly, the public and private sectors will be required to complete cybersecurity awareness training for all employee to prevent any phishing…

    • 551 Words
    • 3 Pages
    Good Essays
  • Good Essays

    For instance, the FBI personnel specialists who were in charge of background investigations on employees lacked the required analytical training that was crucial when assessing common issues that come up during background investigations. The employees who were using the ACS system had insufficient training and knowledge on how to use the system’s security controls, which were intended to control access to sensitive cases. Employees at the FBI had not received the appropriate training on how to handle sensitive information. In addition, FBI employees did not have the proper training on the reporting and documentation of security violations (Stich,…

    • 1552 Words
    • 7 Pages
    Good Essays