Preview

First Draft For Cyber Security Paper

Powerful Essays
Open Document
Open Document
3225 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
First Draft For Cyber Security Paper
Addressing Cybersecurity
The Government’s Role in Protecting Against Cyber Threats

Derryck Coleman

Draft

Table of Contents
Introduction 1
Cybersecurity Laws 3
Federal Laws 3
Health Insurance Portability and Accountability Act of 1996 3
Gramm-Leach-Bliley Act 4
2002 Homeland Security Act 5
State Laws 6
SEC Disclosure Rules 7
Cyber Incidents 9
Conclussion 11
Consumers 11
Entities 12
Government 13
Work Cited 15

Introduction
Data collection has become an everyday activity of entities both big and small. Financial institutions require sensitive information, including Social Security Numbers, to access credit histories. Healthcare providers require personal information to perform diagnostics on patients. And just about all companies require both financial and personal information to process payments and conduct marketing activities.
With a growing reliance on technology, it is important for companies to protect against cyber risks. Since 2011, there have been 144 cyber data breaches at 99 different publicly traded companies or their subsidiaries. These breaches come with great costs. According to Ponemon Institute’s 2014 Cost of Cyber Crime Study: United State, the average cost of cyber-crime has risen from $6.5 million in 2010 to $12.7 million in 2014. The study also found a positive correlation between the time it takes to contain a cyber-attack and the cost associated with containing the cyber-attack, meaning it is best for companies to be prepared in case of a breach.
The type and length of time data is held varies greatly from one company to the next and is largely unregulated in the United States. One example of this is the Telecommunications industry. A document entitled Retention Periods of Major Cellular Service Providers revealed that three of the six top Telecom companies held subscriber information indefinitely. It also showed that these companies held call details from 4 months to 2 years, text message details from 60 days to 7



Cited: Acohido, B. (2009, January 23). Hackers breach Heartland Payment credit card system. Retrieved from USA Today: http://usatoday30.usatoday.com/money/perfi/credit/2009-01-20-heartland-credit-card-security-breach_N.htm Anderson, H Audit Analytics. (2014, October 31). Cybersecurity Database. Sutton, MA, USA. Paul, I. (2012, June 6). Update: LinkedIn Confirms Account Passwords Hacked. Retrieved from PC World: http://www.pcworld.com/article/257045/6_5m_linkedin_passwords_posted_online_after_apparent_hack.html Ponemon Institute LLC Sony suffers second data breach with theft of 25m more user details. (2011, May 3). Retrieved from The Guardian: http://usatoday30.usatoday.com/money/perfi/credit/2009-01-20-heartland-credit-card-security-breach_N.htm Target Corp US Department of Justice. (2010, August). Retention Periods of Major Cellular Service Providers. US Government Printing Office. (2002, November 25). Homeland Security Act of 2002. US Government Printing Office. (2009, August 24). 45 CFR Subpart D. US Securities and Exchange Commission. (2011, October 13). CF Disclosure Guidance: Topic No. 2. Retrieved from http://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm Verizon Enterprise Solutions Walsh, E. (2014, August 7). US Homeland Security contractor reports computer breach. Retrieved from Reuters: http://www.reuters.com/article/2014/08/07/us-usa-security-contractor-idUSKBN0G62N420140807

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Data breaches and cyber-attack frequency has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and a company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of a Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident.” (Ponemon Institute, 2013)…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Jarvis, K., & Milletary, J. (2014, January 24). Inside a targeted point-of-sale data breach. Retrieved from http://krebsonsecurity.com/wp-content/uploads/2014/01/Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Bertrand, N. (2014, October 20). Here's What Happened To Your Target Data That Was Hacked. Retrieved July 14, 2015.…

    • 256 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Hobson, D. (2008, August 8). The real cost of a security breach. SC Magazine. Retrieved July 13, 2014, from http://www.scmagazine.com/the-real-cost-of-a-security-breach/article/113717/…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Ensuring proper level of security is important for a business because it is crucial to the operations. The business must protect the valuable asset, confidential information pertaining to trade secrets, financial data, product development, business strategy, and customer’s information. Inadequate security could result in legal liability and demise of business. Strong security and control can result in an increase of employee productivity and lower operational costs. Some tools available to prevent breaches are firewalls, intrusion detection, and antivirus software.…

    • 369 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Pointing to “backward U.S. technology,” Ziobro and Sidel reveal a long-standing issue between the financial industry and retailers that has slowed progression on chip cards. Because these cards are widely used in Europe and Canada, the U.S. has become the preferred target for criminal hackers, according to the authors. As a result, “the breaches keep coming,” and a computer-based attack experienced by Neiman Marcus over the holidays as well is used as further evidence of the widespread problem at hand.…

    • 439 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    According to SC Magazine “Researchers with SpiderLabs, the advanced security team with information security company Trustwave, discovered a treasure trove of nearly two million pilfered credentials from a variety of companies, including Facebook, Google, Yahoo, Twitter, LinkedIn and payroll service provider ADP.” I was able to verify this portion of the article when the information was provided from a known credible news source (CNN). The security breach made national news and was also provided on our local News4 as well.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    annotated biography

    • 551 Words
    • 2 Pages

    University of Phoenix Library Jenni Bergal, B. W. (2001, Aug 07). IDENTIY CRISIS > TODAY 'S SAVVY CRIMINALS STEAL DATA TO OPEN AND MAX OUT CREDIT CARDS. South Florida Sun - Sentinel Retrieved from http://search.proquest.com/docview/388009277?accountid=458…

    • 551 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    TJX Companies, based in Framingham, MA, was a major participant in the discount fashion and retail industry. The TJX brand had presence in the United States as well as in Canada and Europe. In mid-2005, investigators were made aware of serious security breaches experienced in TJX’s credit card system. These breaches were first found at a Marshall’s located in St Paul, MN in which the hackers implemented a “war driving” tactic to steal customer credit card information. This incident resulted in over 46 million debt and credit card numbers being compromised and is considered to be the largest security breach in US history. The security breach at TJX resulted in major members of the credit card association to establish the Payment Credit Industry Data Security Standard (PCI DSS) in order to better regulate security needs for merchants’ company credit card systems.…

    • 1054 Words
    • 4 Pages
    Better Essays
  • Best Essays

    Kim, J. (2012, January 19). Many security breaches go unreported. Fierce Compliance IT. Retrieved from http://www.fiercecomplianceit.com/story/many-security-breaches-go-unreported/2012-01-19…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Better Essays

    Background: Flayton Electronics, a second generation family business, has just been notified that there may have been a data breech associated with credit cards used at their stores. The initial reports indicates at least 1500 accounts may have been compromised although this number appears to be growing quickly as more banks and clearing houses are notified of the possible breech. Flayton is a small, regional electronics business with 32 stores in six (6) states. The case study is happening within 24 hours of first notification of the possible breech.…

    • 2381 Words
    • 9 Pages
    Better Essays