Choicepoint Data Breach

Only available on StudyMode
  • Download(s) : 257
  • Published : February 18, 2013
Open Document
Text Preview

ChoicePoint Data Breach
Brandon Harvey
CSIA 301-7381
August 8, 2012
Professor Abraham Bloom
Abstract
The ChoicePoint data breach occurred in 2005. This insider data breach brought to light how a company can still be vulnerable to having data stolen from its databases even without any type of hacking of their system. By not properly vetting request for new accounts and request for information led to the theft of over a hundred thousand records of people’s personal information.

ChoicePoint Data Breach
ChoicePoint, A data broker, suffered a data breach in 2005. This breach led to the disclosure of thousands of people’s personal information. We will discuss the type of breach this would fall under, how it occurred, the losses of confidentiality, integrity, and availability (C.I.A.), and the types of improvements ChoicePoint could or did undertake to help prevent this from happening again.

The ChoicePoint data breach was a type of insider attack that occurred between 2003 and 2005 (Otto, Anton, & Baumer, 2007). According to the textbook, the definition of an insider attack is someone with legitimate access intentionally breaches information (Pfleeger & Pfleeger, 2007). This can typically be from an employee or a contractor. But with the ChoicePoint data breach is was actually from “customers”.

The ChoicePoint data breach led to over 145,000 records of personal information being stolen (Polstra, 2005). This was not by any type of hack into ChoicePoint’s systems but by an individual or a group of people who used previously stolen information to create fake businesses that would have a need to preform background checks on people. They used the fake businesses to apply for accounts with ChoicePoint. When ChoicePoint reviewed the application for membership they ran a check on the businesses and did not find any criminal activity on the owners of these fake companies since they were from stolen information and not the criminals...
tracking img