Fall victim to data breach performed

Assignment Help Basic Computer Science
Reference no: EM133197702

Discussion 1.

T-Moblie acknowledged earlier this year that they did fall victim to a data breach performed by Lapsus$. Though, the stolen credentials that they used to get into T-Mobile's network did come to be nothing and nothing that the bad actors could use to extort anything. However, with that being said the VPN credentials that were attained were bought from a Russian black website, and in addition to gaining customer information, Lapsus$ also was able to download over 30,000 slack messages from internal employees. I definitely think this was a data breach to extort, and with that many messages from internal employees worldwide there is bound to be some information in there. Lapsus$ has been in the news recently a lot for their extorting methods and I think they just showed T-Moblie, one of the biggest phone companies in the world what they can do.

When there is a security breach regardless of the attack vectors, regulatory agencies such as e Federal Trade Commission (FTC) impose severe penalties on affected organizations that fail to properly protect consumer data. In some cases, reputation and credibility are also impacted. With your understanding of some of these consequences of a single breach, could the breach have been avoided and why?

London, England recently arrested a 16-year-old and 17-year-old with ties to this Lapsus$ group. With that being said, there are literal kids that can do these types of hacks and are usually a bit savvier than older people. Breaches are never expected without intel and there is no telling what these organizations that are made to be silent can do. T-Mobile specifically could have not known someone's VPN conditionals were being sold on the black market from a Russian website. I think most companies still to this day do not acknowledge breaches, but T-Mobile acknowledged it and dealt with it, and ensured no one's sensitive information was breached. Sometimes, that is all you can do when you are dealing with these types of explosive issues.

Discussion 2.

In July 2021 SuperCare Health fell victim to a network breach in which unauthorized user(s) maintained access to SuperCare systems for a period of five days (23-27 July 2021). SuperCare reported the incident to the US Department of Health and Human Services as impacting 318,379 former and current patients. The compromised data was personally identifiable information in limited cases including social security numbers of individuals. It is likely that the data was obtained for identity theft operations or to run larger scam marketing on paitents of SuperCare.

When there is a security breach regardless of the attack vectors, regulatory agencies such as e Federal Trade Commission (FTC) impose severe penalties on affected organizations that fail to properly protect consumer data. In some cases, reputation and credibility are also impacted. With your understanding of some of these consequences of a single breach, could the breach have been avoided and why?

I would say that it could not have been avoided all together as nefarious computer users evolve as rapidly as the technology. That being said SuperCare is being sued in the US District Court for Central California for negligence. The plaintiff alleges SuperCare could have done more to prevent the incident.

Reference no: EM133197702

Questions Cloud

Blockchain App Maintenance-Updating the business network : New York Institute of Technology Manhattan Campus-Find the command in Chapter 8 of the course textbook to Download a new version of the smart contract code.
Determine which cloud service model : Southern New Hampshire University-Why company in scenario would want to run cloud environment. Determine which cloud service model you would use for that cloud.
Why should our company be ethical : You are an IT leader who has been asked, "Why should our company be ethical, rather than just compliant?" What reasons would you give?
Prototyping is essential part of iterative design process : Southern New Hampshire University-Prototyping is essential part of iterative design process. What does your chosen prototype offer that other methods do not?
Fall victim to data breach performed : T-Moblie acknowledged earlier this year that they did fall victim to a data breach performed by Lapsus$.
Computer science fundamentals of computer troubleshooting : CMIT 202-University of Maryland Baltimore-The two top companies that manufacture processors are Intel and AMD.
Output of the Fantastic Pastry Shop Process : IT 402-Saudi Electronic University-Explain the main Input, Process Activities, and Output of the Fantastic Pastry Shop Process.
Diverse population can be incredibly difficult : Strayer University-Building a user interface that meets the needs of a diverse population can be incredibly difficult.
Analyze how politicians use language to influence voters : North Georgia Technical College-How to use text mining to analyze how politicians use language to influence voters.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd