Choicepoint Attack

Good Essays
Q2. Given ChoicePoint’s experience, what is the likely action of similar companies whose records are compromised in this way?

This crime is an example of a failure of authentication, not network break-in. ChoicePoints’s firewalls and other safeguards were not overcome or harmed. To avoid such problems in the future, the likely action that should be taken by the similar companies is to applying more authentication methods. For example by using a unique user name and determines that the person is legitimate through the input of a correct password. The other authentication mechanisms to prove the legitimate identity are user-selected passwords, system-generated passwords, passphrases, question-and-answer passwords, tokens, and various biometric characteristics and such methods entail verification of users through matching fingerprints, facial features, irises, or voices.

Given your answer, do you think federal regulation and additional laws are required?

Since the identity theft level increased and become serious, it is important to have strong laws that will protect the database systems from unauthorized persons. The regulations must be adopted with the newest technologies and must be clearly developed to this crime. Some punishments need to be arranged for those who convicted in this serious crime.

What other steps could be taken to ensure that data vendors notify people harmed by data theft?

The data theft identified by the various organizations is not uniform. Some of the steps that can be implement by organizations such as:

• sensitive data should never be removed from a secured worksite without taking precautions such as encrypting files or shredding documents;

• newspaper articles, copies of letters reporting a theft to consumers, notification lists of state agencies, direct entry of incidents by the public, and other web sites as sources for the theft;

• install software that will scan all e-mails before they are sent for

You May Also Find These Documents Helpful

  • Powerful Essays

    Choicepoint

    • 3729 Words
    • 15 Pages

    Alpharetta, Georgia, ChoicePoint was formerly a struggling insurance services unit of Equifax. Derek Smith successfully trimmed its labor-intensive operations and replaced them with technologically based ones, which resulted in both higher growth and higher margins. This allowed the company to spin off from Equifax and become publicly traded in 1997. The company’s initial focus was data services for the insurance industry. As its business matured and expanded, ChoicePoint also entered into non-insurance…

    • 3729 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Choicepoint

    • 2624 Words
    • 11 Pages

    ChoicePoint Executive Summary The data broker industry has contributed positively to many aspects in our communities. From one end it helped in assessing different types of businesses in managing and evaluating risks, detecting possible frauds, lowering the risk of costly hiring mistakes, provide information services to law enforcements helping locating missing children and identifying suspects, and many others. These contributions managed to benefit different stakeholders in a lot of fields…

    • 2624 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    ChoicePoint Data Breach Brandon Harvey CSIA 301-7381 August 8, 2012 Professor Abraham Bloom Abstract The ChoicePoint data breach occurred in 2005. This insider data breach brought to light how a company can still be vulnerable to having data stolen from its databases even without any type of hacking of their system. By not properly vetting request for new accounts and request for information led to the theft of over a hundred thousand records of people’s personal information. ChoicePoint Data…

    • 865 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    ‘Sony data breach ‘case from an ethical point of view. (Laudon &Laudon, 2010, p.128) Background: The ChoicePoint Data breach: On September 27 of 2004, ChoicePoint,a company that aggregates and stores personal information, suspected that some of its small business customers were involved in suspicious activities and informed the police. (Paine, Phillips, 2008)On February of 2005, ChoicePoint only notified those residents of California whose data had been leaked to the illegal customers, since a…

    • 2180 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    The Attack

    • 911 Words
    • 4 Pages

    The Attack by Yasmina Khadra follows the story of Dr. Amin Jaafari, a successful Palestinian surgeon who resides in Israel. He lives with his beloved wife, Sihem, live alone in a beautiful house. Amin and Sihem live happily until an unimaginable event occurs, Sihem is killed in a suicide attack. The police discover that Sihem was not a victim, but the bomber. Amin desperately attempts to understand how his kind, loving wife could possibly carry out such an attack. He sets out on an incredible…

    • 911 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Tiger Attack It was the dinner time. Everybody was on the table. Adina's mother cooks food very well and tasty. She cooks rice, vegetable, chicken curry and maks salad. The food was very tasty and delicious. Prince had eaten the food. Now it was time to return own palace. Prince said, thanks for the dinner. Adina's mother and father said good bye to prince. Prince also raises own hand and he said good bye to them. Prince's army chained the thief and they return to palace.…

    • 1476 Words
    • 6 Pages
    Good Essays
  • Good Essays

    The Attack on Pearl Harbor 20 Naval Vessels and over 200 planes were destroyed when the japanese attacked Pearl Harbor on the date December 7,1941at 8 A.M. . Japanese planes flooded the skies over Pearl Harbor the Japanese flew all night and planned the attack for months then it finally happened.The japanese were ready to spread across the south pacific.The attack on Pearl Harbor destroyed 20 American Naval vessels and caused America to declare war on Japan And Japan attacked the Pacific fleet.…

    • 411 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Heart Attack

    • 712 Words
    • 3 Pages

    Heart Attack General Purpose : To inform Specific Purpose : To inform my audience about the three main god,their weapon and the creatures. Central Idea : Heart attacks is the most fearful killer of million peoples around theworld. Main point :- Main point I : The prevention and control of the heart attack involves. Main Point II : People who at risk of the heart attacks. Main Point III : Symptoms of the heart attacks. Introduction Relevance • If you think that in young age you…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Panic Attacks

    • 572 Words
    • 3 Pages

    A Panic Attack is sudden surge of overwhelming anxiety and fear. Your heart rate increases and it becomes hard, if not impossible, to breath. For some people, it may even feel as though they are dying or going crazy. Panic attacks begin abruptly and can last for hours in some cases. Panic attacks aren’t necessarily dangerous and they shouldn’t cause much harm to the person. The causes and triggers of panic attacks aren’t completely clear but they generally run in families. If it runs within the…

    • 572 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Osi Attack

    • 6295 Words
    • 26 Pages

    Attacks on layer two of the OSI model Seven layers of OSI In 1977 a model called Open Systems Interconnection (OSI) was proposed, with the aim to establish an interoperability standard for different vendor products. This model defines several layers related to data transfer, from the lowest (physical) to the highest (application) layer. They have a strong dependence upon one another and headers are usually added when traversing from a lower layer to a higher one. The seven layers are: Layer 1 -…

    • 6295 Words
    • 26 Pages
    Powerful Essays