Fall victim to data breach performed

Assignment Help Basic Computer Science
Reference no: EM133197702

Discussion 1.

T-Moblie acknowledged earlier this year that they did fall victim to a data breach performed by Lapsus$. Though, the stolen credentials that they used to get into T-Mobile's network did come to be nothing and nothing that the bad actors could use to extort anything. However, with that being said the VPN credentials that were attained were bought from a Russian black website, and in addition to gaining customer information, Lapsus$ also was able to download over 30,000 slack messages from internal employees. I definitely think this was a data breach to extort, and with that many messages from internal employees worldwide there is bound to be some information in there. Lapsus$ has been in the news recently a lot for their extorting methods and I think they just showed T-Moblie, one of the biggest phone companies in the world what they can do.

When there is a security breach regardless of the attack vectors, regulatory agencies such as e Federal Trade Commission (FTC) impose severe penalties on affected organizations that fail to properly protect consumer data. In some cases, reputation and credibility are also impacted. With your understanding of some of these consequences of a single breach, could the breach have been avoided and why?

London, England recently arrested a 16-year-old and 17-year-old with ties to this Lapsus$ group. With that being said, there are literal kids that can do these types of hacks and are usually a bit savvier than older people. Breaches are never expected without intel and there is no telling what these organizations that are made to be silent can do. T-Mobile specifically could have not known someone's VPN conditionals were being sold on the black market from a Russian website. I think most companies still to this day do not acknowledge breaches, but T-Mobile acknowledged it and dealt with it, and ensured no one's sensitive information was breached. Sometimes, that is all you can do when you are dealing with these types of explosive issues.

Discussion 2.

In July 2021 SuperCare Health fell victim to a network breach in which unauthorized user(s) maintained access to SuperCare systems for a period of five days (23-27 July 2021). SuperCare reported the incident to the US Department of Health and Human Services as impacting 318,379 former and current patients. The compromised data was personally identifiable information in limited cases including social security numbers of individuals. It is likely that the data was obtained for identity theft operations or to run larger scam marketing on paitents of SuperCare.

When there is a security breach regardless of the attack vectors, regulatory agencies such as e Federal Trade Commission (FTC) impose severe penalties on affected organizations that fail to properly protect consumer data. In some cases, reputation and credibility are also impacted. With your understanding of some of these consequences of a single breach, could the breach have been avoided and why?

I would say that it could not have been avoided all together as nefarious computer users evolve as rapidly as the technology. That being said SuperCare is being sued in the US District Court for Central California for negligence. The plaintiff alleges SuperCare could have done more to prevent the incident.

Reference no: EM133197702

Questions Cloud

Blockchain App Maintenance-Updating the business network : New York Institute of Technology Manhattan Campus-Find the command in Chapter 8 of the course textbook to Download a new version of the smart contract code.
Determine which cloud service model : Southern New Hampshire University-Why company in scenario would want to run cloud environment. Determine which cloud service model you would use for that cloud.
Why should our company be ethical : You are an IT leader who has been asked, "Why should our company be ethical, rather than just compliant?" What reasons would you give?
Prototyping is essential part of iterative design process : Southern New Hampshire University-Prototyping is essential part of iterative design process. What does your chosen prototype offer that other methods do not?
Fall victim to data breach performed : T-Moblie acknowledged earlier this year that they did fall victim to a data breach performed by Lapsus$.
Computer science fundamentals of computer troubleshooting : CMIT 202-University of Maryland Baltimore-The two top companies that manufacture processors are Intel and AMD.
Output of the Fantastic Pastry Shop Process : IT 402-Saudi Electronic University-Explain the main Input, Process Activities, and Output of the Fantastic Pastry Shop Process.
Diverse population can be incredibly difficult : Strayer University-Building a user interface that meets the needs of a diverse population can be incredibly difficult.
Analyze how politicians use language to influence voters : North Georgia Technical College-How to use text mining to analyze how politicians use language to influence voters.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write program to enter two separate numbers

Write a program which would permit a user to enter two separate numbers and choose one of four mathematical operations (add, subtract, multiply, divide).

  Health care impacting organizational change

What are some current trends in health care impacting organizational change? What do you see happening with these trends in the future?

  Evaluate national disaster recovery effectiveness

Evaluate the National disaster recovery effectiveness based on case studies from the text or recent news stories and make recommendations

  Semester as they relate to dissertation course

Outline your dissertation topic and goals for this semester as they relate to your dissertation course.

  Including the column names, datatypes

Please submit the CODE and OUTPUT for all programming questions. You will submit this assignment electronically in the ASSESSMENT area of the Study Desk.

  What is cyberloafing

Does the gig economy appeal to you? Why or why not? What is cyberloafing? How is an employee differentiated from a contracter under US law?

  Compare and contrast semma and crisp-dm

Discuss when application of SEMMA or CRISP-DM might be most appropriate by providing a specific example related to each of the two processes.

  What are the most important parts of this dashboard

Do not repeat examples from the textbook or that have been posted by other students. Please respond to the following:

  Geographically dispersed teams collaborate effectively

How do geographically dispersed teams collaborate effectively?

  Important characteristics of literature reviews

List some important characteristics of literature reviews. Explain the difference between one tailed hypotheses and two-tailed hypotheses.

  Proportion of medical expenditure

A rising proportion of medical expenditure is now devoted to prolonging the lives of the very old and the terminally ill. The costs of this are potentially unlimited.

  Differences between static and dynamic models

Explain the differences between static and dynamic models. How does prescriptive analytics relate to descriptive and predictive analytics?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd