Preview

Choicepoint Data Breach

Good Essays
Open Document
Open Document
865 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Choicepoint Data Breach
ChoicePoint Data Breach
Brandon Harvey
CSIA 301-7381
August 8, 2012
Professor Abraham Bloom
Abstract
The ChoicePoint data breach occurred in 2005. This insider data breach brought to light how a company can still be vulnerable to having data stolen from its databases even without any type of hacking of their system. By not properly vetting request for new accounts and request for information led to the theft of over a hundred thousand records of people’s personal information.

ChoicePoint Data Breach ChoicePoint, A data broker, suffered a data breach in 2005. This breach led to the disclosure of thousands of people’s personal information. We will discuss the type of breach this would fall under, how it occurred, the losses of confidentiality, integrity, and availability (C.I.A.), and the types of improvements ChoicePoint could or did undertake to help prevent this from happening again. The ChoicePoint data breach was a type of insider attack that occurred between 2003 and 2005 (Otto, Anton, & Baumer, 2007). According to the textbook, the definition of an insider attack is someone with legitimate access intentionally breaches information (Pfleeger & Pfleeger, 2007). This can typically be from an employee or a contractor. But with the ChoicePoint data breach is was actually from “customers”. The ChoicePoint data breach led to over 145,000 records of personal information being stolen (Polstra, 2005). This was not by any type of hack into ChoicePoint’s systems but by an individual or a group of people who used previously stolen information to create fake businesses that would have a need to preform background checks on people. They used the fake businesses to apply for accounts with ChoicePoint. When ChoicePoint reviewed the application for membership they ran a check on the businesses and did not find any criminal activity on the owners of these fake companies since they were from stolen information and not the criminals themselves. Since no



References: Otto, P. N., Anton, A. I., & Baumer, D. L. (2007, September/October). The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information. IEEE Security and Privacy , 15-23. Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM. Pfleeger, C. P., & Pfleeger, S. L. (2007). Security in Computing. Indianapolis: Prentice Hall. Polstra, R. M. (2005). A case study on how to manage the theft of information. Proceedings of the 2nd annual conference on Information security curriculum development (pp. 135-138). New York: ACM.

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    BIS 320 Week 4 DQs

    • 385 Words
    • 2 Pages

    DQ3: Read case study 12 in Ch. 12 of MIS Essentials. Considering the viewpoints of customers, law enforcement, personnel, investors, and management, did ChoicePoint make the best decision? Discuss your rationale for each viewpoint. Given ChoicePoint’s experience, what is the likely action of similar companies whose records are compromised in this way?…

    • 385 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved April 29, 2015, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Cp Case Study

    • 976 Words
    • 4 Pages

    | * Data soon became available after authentication breach * Revealed hole in ChoicePoint security system * Trust of security standards instantly lost…

    • 976 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    HIPAA (1996) Compliance

    • 657 Words
    • 3 Pages

    Follow-up with employees involved in the breach. Recommend changes to ensure data security and privacy compliance under HIPAA (1996) Respond to the situations that meets HIPAA (1996) privacy, security, and HITECH (2009) breach notice requirements.  Physical safeguards  Technical safeguards  Technical policies  Network, or transmission, security Explain the ethical issues that relate to this situation …

    • 657 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Whitman, M. E. (2011). Readings and Cases in Information Security: Law and Ethics. New York, NY: Cengage Learning.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Target Data Breach

    • 734 Words
    • 3 Pages

    There are many types of breaches that can occur when it comes to secure systems and networks. The target breach of 2013/14 was due to human error. It is said that the company had easily stolen credentials. If there was the necessary secure measures taken, this breach could have been stopped. Target did not have an adequate firewall which is why the hackers were able to corrupt the system and steal personal information and credit card information. This whole breach was caused by mistake and the failure to segregate ("Common Types of Breaches | WGA Cyber Risk Hub," n.d.) .…

    • 734 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber Warfare/Motivations

    • 1841 Words
    • 8 Pages

    Layton, Timothy P. (2007). Information Security: Design, Implementation, Measurement, and Compliance. Boca Raton, FL: Auerbach publications.…

    • 1841 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Power, Richard, 1999 CSI/FBI Computer Crime and Security Survey, Computer Security Journal, Volume XV, Number 2, 1999, pp. 32.…

    • 2543 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    References: Walker, Russell. “Maxxed Out: TJX Companies and the Largest-Ever Consumer Data Breach.” Kellogg Case Publishing, 2013.…

    • 1054 Words
    • 4 Pages
    Better Essays
  • Good Essays

    References: Clarke III, I., Flaherty, T. B., Hollis, S. M., & Tomallo, M. (2009). Consumer privacy issues…

    • 987 Words
    • 4 Pages
    Good Essays