Choicepoint Attack

Topics: Computer security, Authentication, Personally identifiable information Pages: 2 (401 words) Published: November 9, 2011
Q2.Given ChoicePoint’s experience, what is the likely action of similar companies whose records are compromised in this way?

This crime is an example of a failure of authentication, not network break-in. ChoicePoints’s firewalls and other safeguards were not overcome or harmed. To avoid such problems in the future, the likely action that should be taken by the similar companies is to applying more authentication methods. For example by using a unique user name and determines that the person is legitimate through the input of a correct password. The other authentication mechanisms to prove the legitimate identity are user-selected passwords, system-generated passwords, passphrases, question-and-answer passwords, tokens, and various biometric characteristics and such methods entail verification of users through matching fingerprints, facial features, irises, or voices.

Given your answer, do you think federal regulation and additional laws are required?

Since the identity theft level increased and become serious, it is important to have strong laws that will protect the database systems from unauthorized persons. The regulations must be adopted with the newest technologies and must be clearly developed to this crime. Some punishments need to be arranged for those who convicted in this serious crime.

What other steps could be taken to ensure that data vendors notify people harmed by data theft?

The data theft identified by the various organizations is not uniform. Some of the steps that can be implement by organizations such as:

• sensitive data should never be removed from a secured worksite without taking precautions such as encrypting files or shredding documents;

• newspaper articles, copies of letters reporting a theft to consumers, notification lists of state agencies, direct entry of incidents by the public, and other web sites as sources for the theft;

• install software that will scan all e-mails before they are sent for...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • SEC 572 Week 1 iLab Network Attacks 0 Essay
  • Acc 564 Assignment 2. Ais Attacks and Failures Essay
  • Essay on Woolwich Attack
  • Essay on List Phrases of a Computer Attack
  • Salami Attack Essay
  • How to Attack the Category Leader Essay
  • World War I Gas Attacks Essay
  • Offensive vs Defensive fire attack Essay

Become a StudyMode Member

Sign Up - It's Free