Discuss about the Hacks of OPM Databases.
In this report, we are going to discuss about a one year old news of information security breaches. Information security breaches put vulnerable impact on business organizations, its reputation and their customers whose data is saved into database of organization. For last many years, various information breaches have seen by users of IT and till now they are bearing loss of those breaches. The main reason for these information security breach is improper management of information into database, lack of security and authorized access of data. To mitigate these breaches both users and developers need to be responsible. Now in this report, we will discuss about information security breach in detail with its countermeasures. (Gallagher, 2015)
The news of information security breach that we will thoroughly discuss here in this report is about “Hacks of OPM Databases”. We have selected this news because it is one of ten most popular news of information security breaches and a wide range of customers of this company have compromised with this problem. It will be good to understand about actual breach and how it happened and who was affected due to this. This selected news is related information security breach because in this incident, sensitive data of current and former employees has stolen by hackers. It means confidential information of customers of company has stolen by hackers. (U.S. Office of Personnel Management, 2016)
This is an important segment of this report that describes both technical and non-technical reasons of this information security breach. According to analysis, it is found that personal information of at least 22.1 million people have been stolen and this information includes addresses, mental health and criminal records. It means personal and official information of employees and other members of organization has lost. In this incident of information security leakage, U.S government databases are hacked by hackers. These databases of U.S government holding files of security clearance and personal records that exposed sensitive information near about 22.1 million people. According to resources of this news, not only personal records are hacked of current and former employees by hackers but also widespread information of their friends and relatives have also stolen. It means large number of victims were influenced by this. According to officials of this attack, this security breach is done by China’s domestic civilian spying program. This is a non-technical reason about this attack and we will discuss about this in detail later in this report. Here are some technical reasons of this attack:
Besides these, technical issues, there are also some non-technical issues found for this attack. As we have already mentioned above that investors have investigating that attackers were belong to China’s domestic civilian spying program on American citizens. According to FBI Director James B. Comey, it is treasure trove of information for everyone who are working with, worked with and tried to work with United States government. Here China is suspected for stealing large amounts of data on Americans and it was part of strategic plan for increasing intelligence collection. This reason is non-technical, because it is concerned with government levels of USA and China. Investigators of this attack are trying to find out exact reason for this information security breach. Foreign spy service is also used by U.S government to identify solid reason for this attack. (USA TODAY, 2016)
According to evaluation of this security breach of OPM, this was severely bad attack for government of United States of America. Due to exposure of data which can be used in other cyber espionage operation includes spear phishing attacks and blackmailing. Besides this, following social impacts were also encountered by OPM. (Corbin, 2016)
Any kind of security breach whether it is small or large put bad impact on all people who are victim of that attack. OPM databases attack was not less harmful, it has impacted a wide range of people, their families and friends. Here we have some social impacts of this information security breach that must be considered by other countries and must try to understand all technical and non-technical issues of this breach. (InformationWeek, 2016)
These are some essential impacts of OPM information security breach. These impacts are social and as well as economic. After this attack, citizens of America are worried about their personal information that is stored into OPM databases. (Nakashima, 2016)
From above discussion, it is cleared that this information security breach was very much vulnerable for Americans and they still have impact of this attack.( Krebsonsecurity.com, 2016) Here are some essential remedies for controlling this attack and must be implemented successfully by US government. These remedies are listed as below:
These remedies will provide successful results if these will be implemented appropriately by technical experts. Not only OPM databases, but other companies’ databases should be aware about these security and privacy issues.
Conclusion
After this whole discussion about OPM information security breach, we can say that this discussed attack was so much vulnerable and there were various technical and non-technical reasons exist for this attack. In this report, we have discussed remedies for mitigated these security issues. Lack of these security tools and techniques directly lead to harmful attacks. Hackers always try to find out weak points of an information system from where they can access unauthorized information. These weak points are left due to lack of awareness and knowledge about how to protect system and database. If users will have information about this, then most of the systems can be remedies.
References
U.S. Office of Personnel Management. (2016). OPM Announces Steps to Protect Federal Workers and Others From Cyber Threats. (2016). Retrieved 22 September 2016, from https://www.opm.gov/news/releases/2015/07/opm-announces-steps-to-protect-federal-workers-and-others-from-cyber-threats/
Corbin, K. (2016). How OPM data breach could have been prevented. CIO. Retrieved 22 September 2016, from https://www.cio.com/article/2947453/data-breach/how-opm-data-breach-could-have-been-prevented.html
FCW. (2016). Exclusive: The OPM breach details you haven’t seen — FCW. (2015). Retrieved 22 September 2016, from https://fcw.com/articles/2015/08/21/opm-breach-timeline.aspx
Nakashima, E. (2016). Hacks of OPM databases compromised 22.1 million people, federal authorities say. Washington Post. Retrieved 22 September 2016, from https://www.washingtonpost.com/news/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-21-5-million-people-federal-authorities-say/
Deac, A. (2015). The Top 10 Worst Cyber Security Breaches from 2013-2015 | TruShield. Trushieldinc.com. Retrieved 22 September 2016, from https://trushieldinc.com/the-top-10-worst-cyber-security-breaches-from-2013-2015/
Nextgov. (2015). Timeline: What We Know About the OPM Breach (UPDATED). Retrieved 22 September 2016, from https://www.nextgov.com/cybersecurity/2015/06/timeline-what-we-know-about-opm-breach/115603/
Gallagher, S. (2015). “EPIC” fail—how OPM hackers tapped the mother lode of espionage data. Ars Technica. Retrieved 22 September 2016, from https://arstechnica.com/security/2015/06/epic-fail-how-opm-hackers-tapped-the-mother-lode-of-espionage-data/
Lawfare.(2016). Why the OPM Hack Is Far Worse Than You Imagine. Retrieved 22 September 2016, from https://www.lawfareblog.com/why-opm-hack-far-worse-you-imagine
USA TODAY. (2016). OPM hack Q&A: What we know and what we don’t. Retrieved 22 September 2016, from https://www.usatoday.com/story/news/politics/2015/06/27/opm-hack-questions-and-answers/29333211/
InformationWeek. (2016).OPM Breach Leads To New Systems, Procedures – InformationWeek. Retrieved 22 September 2016, from https://www.informationweek.com/strategic-cio/security-and-risk-strategy/opm-breach-leads-to-new-systems-procedures/a/d-id/1324077
U.S. Office of Personnel Management.(2016). OPM Announces Steps to Protect Federal Workers and Others From Cyber Threats. Retrieved 22 September 2016, from https://www.opm.gov/news/releases/2015/07/opm-announces-steps-to-protect-federal-workers-and-others-from-cyber-threats/
Krebsonsecurity.com. (2016). Catching Up on the OPM Breach — Krebs on Security. Retrieved 22 September 2016, from https://krebsonsecurity.com/2015/06/catching-up-on-the-opm-breach/
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.