What is your takeaway from the attack

Assignment Help Basic Computer Science
Reference no: EM132703268

Public Sector Case Study In November 2012, South Carolina state officials disclosed a massive data breach at the Department of Revenue. Few details on the breach were disclosed. But it involved exposing more than 3.6 million taxpayers' personal information records and 650,000 business tax-related records. The breach occurred in September 2012. It's clear that massive amounts of personal information were stolen. A former top official with the FBI estimated the cost to the state at more than $350 million, based upon past FBI experience, including the cost of offering free credit monitoring to affected individual taxpayers and businesses.

The root cause of the breach cited in news reports was the lack of mandatory security policies across 100 state agencies, boards, commissions, and colleges and universities.

All state agencies have some type of computer security system in place. It's fair to assume they all have some level of security policy in place. But it is clear these policies were discretionary. That meant an approach to information security across state government that was at best inconsistent. Nor did the state appear to have a comprehensive approach to sharing best practices for information security or for coordinating response to these types of data breaches.

In the case of the South Carolina Department of Revenue, the policies clearly were neither adequate nor consistent. Additionally, reports indicate the source of the hack was in Eastern Europe. The hacker or hackers gained access through a phishing e-mail. Phishing e-mails try to trick a user to open an e-mail and execute a link or program with malware. Security awareness is a strong control that educates users on how to protect themselves from such attacks, including how to recognize such attacks and why not to open suspect links. If a phishing e-mail was a source of the attack, it might be an indication that the security awareness program at this state agency was inadequate

Do you think that the attack could have been prevented? If so, how? Alternatively, if you disagree that the attack couldn't have been prevented, provide your analysis as well.

What is your takeaway from the attack? And how does it prepared you to prevent future attacks in your organization?

Reference no: EM132703268

Questions Cloud

Record transactions in the four special journals : Record transactions in the four special journals, as needed -cash receipts journal, cash payments journal, purchases journal, and sales journal
Data in the system was maintained properly : What are some best practices you might suggest to your organization if you were the CIO to ensure that the data in the system was maintained properly?
What kaisen doubtful accounts expense would be : For the year ended December 31, 2020, KAISEN's doubtful accounts expense would be? KAISEN Co. prepared an aging of its accounts receivable at December 31, 2020
Formulate a quality policy for proposed hotel : Formulate a quality policy for your proposed hotel or restaurant business
What is your takeaway from the attack : What is your takeaway from the attack? And how does it prepared you to prevent future attacks in your organization?
Explain five ways the external environmental : Explain five ways the external environmental can impact change strategies.
Implementing radical change in organizational : An FMCG (fast moving consumer goods) company by the name "Afghan product" is operating in Afghanistan with multiple SBUs and product lines.
Find what will balance in allowance for doubtful accouts : UNCLE ROGER Corp. what will be the balance in the allowance for doubtful accounts after the year-end adjustment to record bad debt expense?
Security server virtualization or application isolation : Which is better for security server virtualization or application isolation? Why?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd