Preview

Cp Case Study

Satisfactory Essays
Open Document
Open Document
976 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cp Case Study
Ty Taylor
-------------------------------------------------
MISM 2301 1. Itemize the nature of the information security breach at ChoicePoint and how this adversely affected the organization. Be sure to include both tangible and intangible losses in preparing your response. [table] Security Breach | Effect on ChoicePoint | A pass of the authentication of customers | * Data soon became available after authentication breach * Revealed hole in ChoicePoint security system * Trust of security standards instantly lost | Social security numbers accessed | * Many individuals lost their SSN to the criminals * More info can be accessed as a result which makes the customer or ChoicePoint more vulnerable to other crimes | Basic data accessed | * Private info such as telephone numbers and addresses of customers was taken | Accessed credit reports | * Personal info on credit cards were taken | Identity theft | * ChoicePoint customers had their identity’s compromised and ultimately stolen * The compromise of their identity means that they criminals could use their names and info for other purposes * ChoicePoint was effected by the Class-action lawsuit as a result * Were being investigated by the U.S Senate |

Tangible Losses | Intangible losses | * Expenses for new security * Expenses for the lawsuit * Customer losses came at a great expense as well * The reason for the security breach itself was an expensive endeavor | * Reputation went down * Loss of customers as a result of not trusting the company * Hard to bring in new customers as a result of trust as well |

2. What actions were taken by both ChoicePoint and the “authorities” to address the crisis, and what is your assessment of each action taken? [table] Action Taken | Assessment of each action | ChoicePoint | Police were contacted | * Necessary step in finding out who breached their system * Police assistance was required to see who was

You May Also Find These Documents Helpful

  • Good Essays

    BIS 320 Week 4 DQs

    • 385 Words
    • 2 Pages

    DQ3: Read case study 12 in Ch. 12 of MIS Essentials. Considering the viewpoints of customers, law enforcement, personnel, investors, and management, did ChoicePoint make the best decision? Discuss your rationale for each viewpoint. Given ChoicePoint’s experience, what is the likely action of similar companies whose records are compromised in this way?…

    • 385 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cpa Case Study

    • 96 Words
    • 1 Page

    I have a question about my credits. This is my last term at Valencia and I am going to transfer to UCF this fall. Last time, I met with my business advisor and she said I need credits for College Algebra and she recommended me to take a CLEP exam. So I am going to take a CLEP exam on February. However, I will have 61 credits after I finished spring term classes and will be 64 credits if I passed the CLEP exam. In this case, do I still have to submit a appeal form?…

    • 96 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mis515 Course Outline

    • 2205 Words
    • 9 Pages

    IS Ch 1, Lecture: Introduction to management information systems and enterprise Ch 5 & Ch technology management 10 Lecture: Technology fundamentals Reading: A conversation about information technology 1. In your experience, does this conversation ring true? 2. Why are many business managers frustrated with organizational IT? 3. Why are many IT managers frustrated with ‘the business side’? 4. What can be done to improve relations between the two sides? Activity: A group discussion of Open versus Closed systems models. Session 2 Key question: How can you use information systems to get the Mar 5 most out of organizations? IS Ch 11 Lecture: Organizational information systems & Enterprise systems Case: Business Intelligence Software at SYSCO Activity: Information structures & organizational effectiveness Session 3 How can you manage the balance between security and privacy, Mar 12 openness and access? IS Ch 6, Ch 12, & Ch 13 Lecture: IS ethics, privacy, computer crime, and security Case: ChoicePoint (A) 1. What is your appraisal of ChoicePoint’s business model? 2. How legitimate are the concerns voiced by the industry critics? 3. In Derek Smith’s position, what internal changes, if any, would you make to address the issues discussed in the case? 4. In Derek Smith’s position, what would you recommend to the U.S. Congress regarding regulation of the personal data industry? Discussion: Information security vs…

    • 2205 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Checkpoint: Tjx Companies

    • 326 Words
    • 2 Pages

    The data theft that TJX Companies experienced was caused by using the Wired Equivalent Privacy (WEP) encryption system. The WEP had become easy for hackers to navigate and had become quite out of date. TJX also failed to properly encrypt data on many of the employee computers that were using the wireless network, and did not have an effective firewall. The company had also purchased additional security programs that were not installed correctly.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Organizations must ensure the security and control of systems and transactions with clients and vendors. What security breaches may cause harm to an organization or its clients? Why is it important to ensure a proper level of security? What tools are available to prevent breaches?…

    • 369 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It/205 Tjx Companies.Doc

    • 561 Words
    • 2 Pages

    The credit card data theft at TJX Companies is considered one of the worst ever. The case is significant because of a lack of appropriate security and control.…

    • 561 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    After Telstra’s negative response, customers did not trust Telstra because they think the privacy breach will occur again in the future except Telstra use custodianship instead of ownership in their company culture (Telstra 2013). Telstra’s words are not matched by deeds. They lost many customers trust again and…

    • 1225 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Tjx Companies

    • 271 Words
    • 2 Pages

    The credit card data theft that TJX Companies experienced happened because they were using WEP wireless security, which is the weakest form of wireless encryption today, and hackers could access the credit card data easily. If TJX had taken the time to implement a stronger encryption method, thousands of dollars would have been saved by the company. Proper site surveying could also have prevented the attackers from making a breach.…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identity Theft Outline

    • 316 Words
    • 2 Pages

    e. According to official identity theft statistics, identity thieves steal information to apply for credit card loans, sign up for utilities, or steal money from existing accounts.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved December 19, 2014, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Target a large retail corporation that operates over 1,700 stores across the United States. They also operate as an online retailer at target.com. In 2012 the retailer earned more than $73 billion dollars in revenue and grew their sales by 5.1% from the previous year. Looking at the revenue and sales growth rate it is hard to fathom that more money could not be spent to ensure that consumer data is protected as much as possible. As information security specialists one of the worst things that can happen is our network gets infiltrated and customer information is stolen. On December 19, 2013 Target released a statement stating that they have had an information security breach and suggested that as much as 70 million credit card information had been stolen.…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Nu Skin

    • 26227 Words
    • 105 Pages

    POLICIES & PROCEDURES 2011 Table of Contents Chapter 1 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 1.11 1.12 2 2.1 2.2 3 3.1 3.2 3.3 3.4 3.5 4 4.1 4.2 4.3 4.4 Chapter 2 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2 2.1 2.2 2.3 2.4 3 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 Your Distributorship Becoming a Distributor Applying to Become a Distributor One Individual per Distributorship Age Requirements Minors Legal Residency Former Distributors Spouses and Co-habitants Acceptance of your Distributor Agreement Tax Payer Identification Number Business Entities Changing to a Business Entity Temporary Accounts Personal Information Collection of Personal Information 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 3.9 3.10 3.11 4 4.1 4.2 Authorization to Use Your Personal Information…

    • 26227 Words
    • 105 Pages
    Satisfactory Essays