Preview

Private Sector Response

Good Essays
Open Document
Open Document
551 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Private Sector Response
Government Response vs. Private Sector Response
Even though the government is expected to ensure that the critical systems, which hold classified information, are secure and to respond to any damage, the private sector’s assistance is still needed. Working together with threat monitoring and detection, incident response, and active defense strategies will provide a more secure system. Therefore, the collaboration with the private sector will enhance significantly to protect valuable data and communications systems and to secure networks. In case of the information breach, the government will work with the private sectors to immediately contain the damage and prevent it from spreading, for example, by recovering records and shutting down the
…show more content…
Collected information and results will be provided to the government for further investigation. The private sector is in charge of ensuring the security of the networks and areas around the systems where the data breach occurred to manage the situation and prevent any loss of evidences and additional data. While the government investigates and deals with the situation, the private sectors will start cleaning, recovering, and securing the system. They will need to consider all alternatives to replace the compromised resources and machines, correct weaknesses found in the affected systems, and rebuild it to meet the acceptable security level. They should be effectively prepared for future threats and work on eliminating as many vulnerabilities as possible. Formal policies and security tools will also be implemented to protect systems and networks and mitigate the damage of the breach. Lastly, the public and private sectors will be required to complete cybersecurity awareness training for all employee to prevent any phishing

You May Also Find These Documents Helpful

  • Powerful Essays

    MGT2 Task3

    • 5037 Words
    • 21 Pages

    Negative publicity of the company and loss of credibility in the eyes of existing and potential customers impacting overall business…

    • 5037 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Grammarly Report generated on Tue, 09 Dec 2014 03:29 Grammarly DOCUMENT Page 1 of 4 SCORE LAW 531 Wk 6 IRAC Brief 6.2 98 of 100 Final Draft ISSUES FOUND IN THIS TEXT 1 PLAGIARISM 0% Contextual spelling 0 No errors Grammar 0…

    • 808 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The breach was not an outside job, but instead I choose it because of the relevance of the topics we have discussed thus far. The Army National Guard announced that a contracted employee transferred personally identifiable information to a data center that was not accredited by the DoD. This left the PII of all current and former Army National Guard members potentially at risk. The information included names, full Social Security Numbers, dates of birth and home addresses. The Army National Guard released the information quickly to warn current and former guard members that their data was potentially at risk and established a call center and a website that members could go to for personal worrying about their information. There they could check…

    • 141 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Internet and network security are a primary concern for many businesses. In today 's world, the number of hacks and leaks of data is continuing to rise, which is what makes security the primary concern. What may or may not be apparent is that many breaches of data tend to be caused by internal users ' errors that may not even have been meant to be malicious. Liaskos and Sandy quote a study by Roman which revealed…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Data breaches and cyber-attacks frequently has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident. (Ponemon Institute, 2013)…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    HIPAA (1996) Compliance

    • 657 Words
    • 3 Pages

    Follow-up with employees involved in the breach. Recommend changes to ensure data security and privacy compliance under HIPAA (1996) Respond to the situations that meets HIPAA (1996) privacy, security, and HITECH (2009) breach notice requirements.  Physical safeguards  Technical safeguards  Technical policies  Network, or transmission, security Explain the ethical issues that relate to this situation …

    • 657 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Security Breach Plan Paper

    • 1576 Words
    • 7 Pages

    If a breach occurs a reminder memo should be sent out companywide to refresh the employees of the policies and procedure that should be followed. The annual trainings are to be required computer modules that employees must do on their own time by a set date each year, once the employee completes this module a notification will be sent to his/her manager that it has been completed. If there are changes that occur, a memo should be delivered to all employees outlining the change as well as providing them with an outlet to ask any questions they may have regarding the changes. Any employee that is known to have compromised PHI or any company confidential information will be reprimanded and depending on the severity of the breach can be fired and even…

    • 1576 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The author also explains that involving the people would be critical since presuming their submissiveness risks creating resentment and lack of cooperation over time. It is important to make the people to understand the appropriateness of security measures to increase their willingness to collaborate to achieve security goals. Further, the author advocates for opening up of homeland security work to avoid working in secrecy and involve the private sector and the general public. The author sees the move to insulate information from the public as undermining the defense of critical…

    • 872 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The National Infrastructure Protection Plan’s risk management framework is a process structured to protect the Nation’s CIKR, DHS, and SSA’s assets, systems, networks, and functions by minimizing potential risks that may compromise integrity of these very important sectors. According to free dictionary.com (2013), a risk is any possibility of incurring misfortune or loss; hazard. The framework of this risk management process consists of following a number of steps, in a strategic order, to best assure optimal security and protection. Though eliminating all risks isn’t possible, these steps are geared to constantly improve on addressing existing and developing risks that may affect all that embodies our nation’s critical infrastructure. To accomplish this task, NIPP has first set goals and objectives to be able to understand why they need to protect this information, who to protect against, and how we will protect the infrastructure. NIPP enables DHS, SSA’s, and other partners to decide upon the best course of action to help minimize vulnerabilities within the infrastructure. They plan to organize to protect from physical, cyber, and human element aspects.…

    • 951 Words
    • 4 Pages
    Good Essays
  • Good Essays

    One must first focus on the problem as soon as it has occurred. Secondly how severe was this companies security impacted such as the security of the incident data breach. A full investigation on the severity of this incident and the measures of all the damages has to be made.…

    • 1033 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Law Enforcement Paper

    • 1265 Words
    • 6 Pages

    The FBI’s efforts in combating terrorism included collecting, analyzing, and sharing information and critical intelligence with other federal agencies and departments. Some of these departments are the Central Intelligence Agency (CIA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) as well as other agencies across the country (Schmalleger, 2009). Some changes were made by the FBI as a result of September, 11, 2001. For example, the FBI has made modernization of its information technology (IT) systems a top-level priority. This is a multi-phased program code-named Trilogy. With Trilogy, the FBI can do three important things: First, the FBI has deployed a secure high-speed network that enables people in the FBI offices around the country to share data, including audio, video, and image files. Second, the FBI has given its agents and intelligence analysts more than 30,000 new computers that run several modern software applications. Third, the FBI has developed an IT infrastructure that enables secure communication with FBI intelligence partners (Grabosky,…

    • 1265 Words
    • 6 Pages
    Better Essays