Personally Identifiable Information Incident Research Paper

Cyber security, due primarily to globalization has become a profound issue. With the advent of the internet, new threats to privacy and security have arisen. For one, threats have caused data breaches and loss of service for many internet providers. Recently, American banks have become targets of cyber attacks from unknown sources. In many instances, it is difficult to detect the whereabouts of a cyber attack. The anonymity of an attack makes this threat particularly appealing to third world and developed nations. Due primarily to its ability to go undetected PII attacks have become very commonplace. PII, otherwise known as personally identifiable information, have a direct appeal to those who would like to do harm to developed countries. PII attacks are particularly profound as information including name, Social Security numbers and date of birth, stored in the vendor's database can be access by unauthorized user (Denning, 2008). PII attacks are not unusual by any means. However, the concepts used to alleviate and rectify breaches have evolved over time. In many respects, preventive techniques must be adopted in a proactive fashion in order to circumvent the overall threat of PII attacks. As such the proactive nature of prevention constitutes constant innovation. Current procedures to help alleviate PII breaches are very simple and rely heavily on execution rather than strategy. For one, in order to reduce the threat of attack, the following three concepts should be adopted.

1. reducing the volume of collected and retained information to the minimum necessary;

2. limiting access of data to only those individuals who must have such access

3. Using encryption, strong authentication procedures, and other security controls to make...

...

During a data breach, having the correct people within the organization is often the catalyst for effective crisis aversion. Computer security experts specialize in helping companies to mitigate threats before, during, and after an attack. Therefore, have the proper personnel is integral in alleviating cyber, PII attacks. Incident response is not just limited to hacking, but it also combines intellectual property theft and data leakage, human resources complaints, and ongoing litigation and legal holds, among other frequent corporate occurrences. The varying and ever evolving nature of cyber threats makes it ever more important to hire, attract and retain competent individuals.
To prevent future occurrences, the following concepts should be utilized:

First the organization must first establish rules of proper conduct regarding personal information. Companies should first establish rules of conduct for persons involved in the design, development, operation, or maintenance of any system of records. This is critical as internal breach is often the manner in which PII attacks occur. Internal threats are often more profound than external threats. For one, individuals are aware of system operations and any apparent flaws. Further, many individuals could possible collude, causing damage well after it is caught.

Second, the organization should establish proper safeguards. Agencies are also required to establish appropriate administrative, technical, and physical safeguards to insure the security and confidentiality of records. This will also protect against any anticipated…

Sources Used in Documents:

References:

1) Denning, D.E. (2008). The ethics of cyber conflict. The Handbook of Information and Computer Ethics. 391 -- 429.

2) Gorman, Siobhan. (4 June 2010) WSJ: U.S. Backs Talks on Cyber Warfare. Online.wsj.com. Retrieved 2 November 2013.

3) Tom Gjelten (23 September 2010). "Seeing The Internet As An 'Information Weapon'." National Public Radio. Retrieved 23 September 2013


Cite this Document:

"Personally Identifiable Information Incident" (2013, November 03) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/personally-identifiable-information-incident-126213

"Personally Identifiable Information Incident" 03 November 2013. Web.19 April. 2024. <
https://www.paperdue.com/essay/personally-identifiable-information-incident-126213>

"Personally Identifiable Information Incident", 03 November 2013, Accessed.19 April. 2024,
https://www.paperdue.com/essay/personally-identifiable-information-incident-126213

Related Documents

Sony Reels From Multiple Hacker Attacks In the past, many organizations - from Sony to NASA to the New York Times - have fallen victim to hacking incidents. In addition to costing organizations money, data breaches have also taken a significant toll on the trust customers have on affected businesses. It is therefore important to note that as entities continue to accumulate more PII of clients, the relevance of having in

threat has reached an advanced stage where workstations are now sending out Personally Identifiable Information (PII) to numerous known hackers' IP addresses. Therefore, the response team must respond in a steadfast fashion. This incident response plan will provide the most organized and well-defined approach for handling this threat and tracking the sources of the attack. This plan describes and identifies steps that will be taken to determine the cause,

Managers at businesses and organizations all over the United States collect and store information. It can be with tangible documents via filing cabinets, or digitally via networked servers. They may even rent "cloud" space to safeguard and keep vast volumes of personal information. Despite the growing occurrence of data breaches affecting private, public, and nonprofit organizations, the majority of organizations and businesses admit knowing too little concerning the consequences and

Ethical and Legal Issues in Ecommerce A Concise Definition of ecommerce Motivation for E-Commerce Ethical and Legal Issues in E-Commerce Enforcement of Legal Directives and Contracts Collecting and Securing Consumer Information Lack of Uniform Laws Copyright and Patent Laws Violation Taxation Other Issues: In Brief Privacy and Security 'Extinction' of Some Small Businesses Electronic Deception Language Issues Declaration During the last one decade, the internet has experienced unprecedented growth. Thanks to this increase in online activity, consumers and businesses from all over the world are

However, nothing can be done until the malware actually occurs. With all the different viruses, worms and Trojans, how can security managers possibly predict what malware will occur next? In contrast, a behavioral rule defines legitimate activity in a system. Any activity not matching the profile will cause the security product to be triggered. As rules are not specific to a particular type of attack, they can block malicious

This is important because the cost of hospital acquired infections run high. The cost to care for a patient with a hospital acquired infection is almost three times the amount to care for a patient without a hospital acquired infection (Hassan et al., 2010). Since hospital acquired infections can be attributed to the hospital, Medicare and Medicaid will no longer cover payment of these infections beginning in 2008. Medicare and