Preview

First Draft For Cyber Security Paper

Powerful Essays
Open Document
Open Document
3225 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
First Draft For Cyber Security Paper
Addressing Cybersecurity
The Government’s Role in Protecting Against Cyber Threats

Derryck Coleman

Draft

Table of Contents
Introduction 1
Cybersecurity Laws 3
Federal Laws 3
Health Insurance Portability and Accountability Act of 1996 3
Gramm-Leach-Bliley Act 4
2002 Homeland Security Act 5
State Laws 6
SEC Disclosure Rules 7
Cyber Incidents 9
Conclussion 11
Consumers 11
Entities 12
Government 13
Work Cited 15

Introduction
Data collection has become an everyday activity of entities both big and small. Financial institutions require sensitive information, including Social Security Numbers, to access credit histories. Healthcare providers require personal information to perform diagnostics on patients. And just about all companies require both financial and personal information to process payments and conduct marketing activities.
With a growing reliance on technology, it is important for companies to protect against cyber risks. Since 2011, there have been 144 cyber data breaches at 99 different publicly traded companies or their subsidiaries. These breaches come with great costs. According to Ponemon Institute’s 2014 Cost of Cyber Crime Study: United State, the average cost of cyber-crime has risen from $6.5 million in 2010 to $12.7 million in 2014. The study also found a positive correlation between the time it takes to contain a cyber-attack and the cost associated with containing the cyber-attack, meaning it is best for companies to be prepared in case of a breach.
The type and length of time data is held varies greatly from one company to the next and is largely unregulated in the United States. One example of this is the Telecommunications industry. A document entitled Retention Periods of Major Cellular Service Providers revealed that three of the six top Telecom companies held subscriber information indefinitely. It also showed that these companies held call details from 4 months to 2 years, text message details from 60 days to 7



Cited: Acohido, B. (2009, January 23). Hackers breach Heartland Payment credit card system. Retrieved from USA Today: http://usatoday30.usatoday.com/money/perfi/credit/2009-01-20-heartland-credit-card-security-breach_N.htm Anderson, H Audit Analytics. (2014, October 31). Cybersecurity Database. Sutton, MA, USA. Paul, I. (2012, June 6). Update: LinkedIn Confirms Account Passwords Hacked. Retrieved from PC World: http://www.pcworld.com/article/257045/6_5m_linkedin_passwords_posted_online_after_apparent_hack.html Ponemon Institute LLC Sony suffers second data breach with theft of 25m more user details. (2011, May 3). Retrieved from The Guardian: http://usatoday30.usatoday.com/money/perfi/credit/2009-01-20-heartland-credit-card-security-breach_N.htm Target Corp US Department of Justice. (2010, August). Retention Periods of Major Cellular Service Providers. US Government Printing Office. (2002, November 25). Homeland Security Act of 2002. US Government Printing Office. (2009, August 24). 45 CFR Subpart D. US Securities and Exchange Commission. (2011, October 13). CF Disclosure Guidance: Topic No. 2. Retrieved from http://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm Verizon Enterprise Solutions Walsh, E. (2014, August 7). US Homeland Security contractor reports computer breach. Retrieved from Reuters: http://www.reuters.com/article/2014/08/07/us-usa-security-contractor-idUSKBN0G62N420140807

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Verizon business researched and reported in 2009 a case study involving data breaches in secured network. Within their findings, they summarize the threats, which industry, and which records are the most popular. The report fist showed that a percentage of the hacking from outside sources came from the European Union, and the most popular info being stolen was financial and retail goods.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Data breaches and cyber-attacks frequently has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident. (Ponemon Institute, 2013)…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    According to SC Magazine “Researchers with SpiderLabs, the advanced security team with information security company Trustwave, discovered a treasure trove of nearly two million pilfered credentials from a variety of companies, including Facebook, Google, Yahoo, Twitter, LinkedIn and payroll service provider ADP.” I was able to verify this portion of the article when the information was provided from a known credible news source (CNN). The security breach made national news and was also provided on our local News4 as well.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Hobson, D. (2008, August 8). The real cost of a security breach. SC Magazine. Retrieved July 13, 2014, from http://www.scmagazine.com/the-real-cost-of-a-security-breach/article/113717/…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    References: Department of Veterans Affairs. (2007). VA Handbook 6500. Washington, DC: US Government Printing Office. Retrieved February 20, 2013, from http://www.va.gov/vapubs/viewPublication.asp?Pub_ID=56…

    • 1273 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Organizations must ensure the security and control of systems and transactions with clients and vendors. What security breaches may cause harm to an organization or its clients? Why is it important to ensure a proper level of security? What tools are available to prevent breaches?…

    • 369 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cybersecurity Case Study

    • 1111 Words
    • 5 Pages

    Getting an adequate cybersecurity budget can be one of the most challenging tasks that many CISOs face. The board wants to keep shareholders happy, which means that they prefer spending on IT to be devoted to business growth and revenue generation. The frequency of breaches makes desensitization more likely, leading to a decreased feeling of urgency to ensure the strength of cybersecurity. Furthermore, many executives have been lulled into a false or misguided sense of security; companies have survived major breaches, and the impact on companies' stock prices has not been as extreme as the declines that followed on the heels of early breaches. It does not help that the return…

    • 1111 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Not only am I pursuing a Cybersecurity degree from the University of Maryland University College, but I am planning on making a lifetime career in this particular field, which means I am taking every opportunity possible to learn as much as I can about this career field, and frankly do so with serious passion and dedication. Cybersecurity is one of the few blossoming fields within the U.S. and abroad now in days with all of the new technological advances being made every single day as well as the newly constructed, successful Cybersecurity companies. Every company that wants to protect their classified information hires a Cybersecurity team to keep that information safe and out of the hands of people that could do wrong with that information; even the U.S. government has a massive Cybersecurity program as part of our National Defense to…

    • 824 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Know when data is being collected. Be aware of any activities that can possibly collect information about you for a database, such as registering to use a Web site, participating in a survey, submitting your resume to an online data bank, requesting a product rebate, participating in online discussion groups, clicking pop-up ads, and so on.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    They give your information to cooperate companies that can make a profit. Most have this information or the citizens that live in a country like Canada and the United States. Corporates companies break the law and the government specially the prime minster turn a blind eye. Companies can big huge profit and breaching your privacy therefore increase the economy of the country. For example the UnitedHealth made huge profits of taking data from people without permission UnitedHealth made billions. UnitedHealth got different types of information from its customer such as how much they consume the medicine, what time and the effects of the medicine. When going through the internet you get ads that you are instead sometimes exactly what you want. The reason why is corporate companies are allowed to steal information then use it to its advantage. 2016 governments have been breaching data and have not apologies openly to people in their countries. Different countries such as china riot over their privacy and are speaking up about their privacy being breach but in the western world people are silent and are accepting the government of taking their information. Places where democracy where people are allowed freedom of speech is not allowed to talk about their privacy being breached. Democracy the Greek Latin word translate to Democracy traces back to the Greek words demos, meaning "people," and kratia, meaning "power."…

    • 502 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Never allow any type of attack, successful or otherwise to go undocumented or wasted. “If you experience an attack, learn from it,” For example, let us analyze an information security breach case of a financial corporation that caught an employee trying to steal very private company trading algorithms. Accountability and authenticity must immediately be exercised to ensure…

    • 639 Words
    • 3 Pages
    Good Essays