Free Essay

Is3230

In:

Submitted By cosmoperson
Words 3818
Pages 16
Case 0:05-cv-00668-RHK-JSM

Document 61

Filed 02/07/2006

Page 1 of 14

UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA

Stacy Lawton Guin, Plaintiff, v. Brazos Higher Education Service Corporation, Inc., Defendant. Civ. No. 05-668 (RHK/JSM) MEMORANDUM OPINION AND ORDER

John H. Goolsby and Thomas J. Lyons Jr., Consumer Justice Center, Little Canada, Minnesota; Thomas J. Lyons, Lyons Law Firm, P.A., Little Canada, Minnesota, for Plaintiff. Courtney M. Rogers Reid and Matthew E. Johnson, Halleland Lewis Nilan & Johnson P.A., Minneapolis, Minnesota, for Defendant.

INTRODUCTION Plaintiff Stacy Guin alleges that Defendant Brazos Higher Education Service Corporation, Inc. (“Brazos”) negligently allowed an employee to keep unencrypted nonpublic customer data on a laptop computer that was stolen from the employee’s home during a burglary on September 24, 2004. This matter comes before the Court on Brazos’s Motion for Summary Judgment pursuant to Federal Rule of Civil Procedure 56. For the reasons set forth below, the Court will grant the Motion.

BACKGROUND

Case 0:05-cv-00668-RHK-JSM

Document 61

Filed 02/07/2006

Page 2 of 14

Brazos, a non-profit corporation with headquarters located in Waco, Texas, originates and services student loans. (Villarrial Aff. ¶ 2.) Brazos has approximately 365 employees, including John Wright, who has worked as a financial analyst for the company since November 2003. (Villarrial Aff. ¶ 2; Wright Aff. ¶ 1.) Wright works from an office in his home in Silver Spring, Maryland. (Wright Aff. ¶ 3.) As a financial analyst for Brazos, Wright analyses loan portfolios for a number of transactions, including purchasing portfolios from other lending organizations and selling bonds financed by student loan interest payments. (Wright Aff. ¶ 6.) Prior to performing each new financial analysis, Wright receives an electronic database from Brazos’s Finance Department in Texas. (Wright Aff. ¶ 7.) The type of information needed by Wright to perform his analysis depends on the type of transaction anticipated by Brazos. (Wright Aff. ¶¶ 8-11.) When Wright is performing asset-liability management for Brazos, he requires loan-level details, including customer personal information, to complete his work. (Wright Aff. ¶¶ 11.) On September 24, 2004, Wright’s home was burglarized and a number of items were stolen, including the laptop computer issued to Wright by Brazos. (Wright Aff. ¶ 18.) Wright reported the theft to the local police department, but the police were unable to apprehend the burglar or recover the laptop. (Wright Aff. ¶ 19.) After the police concluded their investigation, Brazos hired a private firm, Global Options, Inc., to further investigate the details the burglary. (Villarrial Aff. ¶ 26.) Global Options was unable to regain possession of the computer. (Villarrial Aff. ¶ 26, Ex. 21.)

2

Case 0:05-cv-00668-RHK-JSM

Document 61

Filed 02/07/2006

Page 3 of 14

With the laptop missing, Brazos sought to determine what customer data might have been stored on the hard drive and whether the data was accessible to a third party. Based on internal records, Brazos determined that Wright had received databases containing borrowers’ personal information on seven occasions prior to September 24, 2004. (O’Donnell Dep. Tr. at 31-35.) Upon receiving the databases, Wright typically saved the information to his hard drive, depending on the size of the database and the likelihood that he would need to review the information again in the future. (Wright Aff. ¶¶ 14-15.) However, Wright did not keep records of which databases were permanently saved on his hard drive and which databases were eventually deleted, so Brazos was not able to determine with any certainty which individual customers had personal information on Wright’s laptop when it was stolen. (Wright Aff. ¶ 16.) Without the ability to ascertain which specific borrowers might be at risk, Brazos considered whether it should give notice of the theft to all of its customers. In addition to contemplating guidelines recommended by the Federal Trade Commission (“FTC”)1, Brazos learned that it was required by California law to give notice to its customers residing in that State. (Villarrial Aff. ¶¶ 20, 24, Ex. 16.) Brazos ultimately decided to send a notification letter (the “Letter”) to all of its approximately 550,000 customers. (Villarrial Aff. Ex. 17.) The Letter advised borrowers that “some personal information

The Federal Trade Commission guidelines recommend that when “deciding if notification [to customers of an identity theft threat] is warranted, [a company should] consider the nature of the compromise, the type of information taken, the likelihood of misuse, and the potential damage arising from misuse.” (Villarrial Aff. Ex. 16.) 3

1

Case 0:05-cv-00668-RHK-JSM

Document 61

Filed 02/07/2006

Page 4 of 14

associated with your student loan, including your name, address, social security number and loan balance, may have been inappropriately accessed by the third party.” (Villarrial Aff. Ex. 17.) The Letter also urged borrowers to place “a free 90-day security alert” on their credit bureau files and review consumer assistance materials published by the FTC. (Villarrial Aff. Ex. 17.) In addition, Brazos established a call center to answer further questions from customers and track any reports of identity theft. (Villarrial Aff. ¶ 26.) Plaintiff Stacy Guin, who acquired a student loan through Brazos in August 2002, received the Letter. (Villarrial Aff. Ex. 2; Guin Dep. Tr. at 9-10.) Shortly thereafter, Guin contacted the Brazos call center to ask followup questions. (Guin. Dep. Tr. 12-15.) Guin also ordered and reviewed copies of his credit reports from the three credit agencies listed in the Letter. (Guin. Dep. Tr. at 24-26.) Guin did not find any indication that a third party had accessed his personal information and, to this date, has not experienced any instance of identity theft or any other type of fraud involving his personal information. (Guin Dep. Tr. at 24-26, 31.) To Brazos’s knowledge, none of its borrowers has experienced any type of fraud as a result of the theft of Wright’s laptop. (Villarrial Aff. ¶ 26.) On March 2, 2005, Guin commenced this action asserting three claims: (1) breach of contract, (2) breach of fiduciary duty, and (3) negligence. (Compl. ¶¶ 22-33.) On September 12, 2005, Guin voluntarily dismissed his breach of contract and breach of fiduciary duty claims. Guin brings the remaining negligence claim under Fed. R. Civ. P. 23, on behalf of “all other Brazos customers whose confidential information was inappropriately accessed by a third party . . . .” (Compl. ¶ 15.) 4

Case 0:05-cv-00668-RHK-JSM

Document 61

Filed 02/07/2006

Page 5 of 14

STANDARD OF REVIEW Summary judgment is appropriate where there is no genuine issue of material fact, and the moving party is entitled to judgment as a matter of law. Fed. R. Civ. P. 56(c). For purposes of summary judgment, a fact is “material” if its resolution will determine the outcome of the case, and an issue is “genuine” if the evidence is such that a reasonable jury could return a verdict for the non-moving party. See Anderson v. Liberty Lobby Inc., 477 U.S. 242, 248 (1986); Matsushita Elec. Indus. Co. v. Zenith Radio Corp, 475 U.S. 574, 586-87 (1986). Upon a motion for summary judgment, the moving party carries the burden of showing there is no genuine issue of material fact, and all evidence and reasonable inferences must be viewed in a light most favorable to the non-moving party. Celotex Corp. v. Catrett, 477 U.S. 317, 322 (1986). ANALYSIS In his negligence claim, Guin alleges that “[Brazos] owe[d] him a duty to secure [his] private personal information and not put it in peril of loss, theft, or tampering,” and “[Brazos’s] delegation or release of [Guin’s] personal information to others over whom it lacked adequate control, supervision or authority was a result of [Brazos’s] negligence . . . .” (Compl. ¶¶ 31-32.) As a result of such conduct, Guin allegedly “suffered out-of-pocket loss, emotional distress, fear and anxiety, consequential and incidental damages.” (Compl. ¶ 33.) Minnesota courts have defined negligence as the failure to exercise due or reasonable care. Seim v. Garavalia, 306 N.W.2d 806, 810 (Minn. 1981). In order to 5

Case 0:05-cv-00668-RHK-JSM

Document 61

Filed 02/07/2006

Page 6 of 14

prevail on a claim for negligence, a plaintiff must prove four elements: (1) the existence of a duty of care, (2) a breach of that duty, (3) an injury, and (4) the breach of the duty was the proximate cause of the injury. Elder v. Allstate Ins. Co., 341 F. Supp. 2d 1095, 1099 (D. Minn. 2004), citing Lubbers v. Anderson, 539 N.W.2d 398, 401 (Minn. 1995). In support of its instant Motion, Brazos advances three arguments: (1) Brazos did not breach any duty owed to Guin, (2) Guin did not sustain an injury, and (3) Guin cannot establish proximate cause. (Mem. in Supp. at 8-19.) The Court will address each in turn. 1. Breach of Duty In order to prove a claim for negligence, Guin must show that Brazos breached a legal duty owed to him under the circumstances alleged in this case. A legal duty is defined as an obligation under the law to conform to a particular standard of conduct towards another. See Minneapolis Employees Ret. Fund v. Allison-Williams Co., 519 N.W.2d 176, 182 (Minn. 1994). The standard for ordinary negligence is “the traditional standard of the reasonable man of ordinary prudence.” Seim, 306 N.W.2d at 810. In some negligence cases, however, a duty of care may be established by statute. Anderson v. State, 693 N.W.2d 181, 189-90 (Minn. 2005). In such cases, violation of a statutory-based duty may constitute negligence per se. Id. at 190. Guin argues that the Gramm-Leach-Bliley Act (the “GLB Act”), 15 U.S.C. § 6801, establishes a statutory-based duty for Brazos “to protect the security and confidentiality of customers’ nonpublic personal information.” (Mem. in Opp’n at 8.) For the purposes of this Motion only, Brazos concedes that the GLB Act applies to these circumstances and 6

Case 0:05-cv-00668-RHK-JSM

Document 61

Filed 02/07/2006

Page 7 of 14

establishes a duty of care. (Mem. in Supp. at 15 n.2.) The GLB Act was created “to protect against unauthorized access to or use of such records which could result in substantial harm or inconvenience to any customer [of a financial institution].” 15 U.S.C. § 6801(b)(3). Under the GLB Act, a financial institution must comply with several objectives, including: Develop, implement, and maintain a comprehensive written information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate to your size and complexity, the nature and scope of your activities, and the sensitivity of any customer information at issue; Identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information that could result in the unauthorized disclosure, misuse, alteration, destruction or other compromise of such information, and assess the sufficiency of any safeguards in place to control these risks; and Design and implement information safeguards to control the risks you identify through risk assessment, and regularly test or otherwise monitor the effectiveness of the safeguards’ key controls, systems, and procedures. 16 C.F.R. § 314.4(a)-(c). Guin argues that Brazos breached the duty imposed by the GLB Act by (1) “providing Wright with [personal information] that he did not need for the task at hand,” (2) “permitting Wright to continue keeping [personal information] in an unattended, insecure personal residence,” and (3) “allowing Wright to keep [personal information] on his laptop unencrypted.” (Mem. in Opp’n at 10.) Brazos counters that Guin does not have sufficient evidence to prove that it breached a duty by failing to comply with the GLB Act. (Mem. in Supp. at 16.)

7

Case 0:05-cv-00668-RHK-JSM

Document 61

Filed 02/07/2006

Page 8 of 14

The Court concludes that Guin has not presented sufficient evidence from which a fact finder could determine that Brazos failed to comply with the GLB Act. In September 2004, when Wright’s home was burglarized and the laptop was stolen, Brazos had written security policies, current risk assessment reports, and proper safeguards for its customers’ personal information as required by the GLB Act. (Villarrial Aff. Exs. 1, 3-8, 11, 12.) Brazos authorized Wright to have access to customers’ personal information because Wright needed the information to analyze loan portfolios as part of Brazos’s asset-liability management function for other lenders. (Wright Aff. ¶¶ 6, 11.) Thus, his access to the personal information was within “the nature and scope of [Brazos’s] activities.” See 16 C.F.R. § 314.4(a). Furthermore, the GLB Act does not prohibit someone from working with sensitive data on a laptop computer in a home office. Despite Guin’s persistent argument that any nonpublic personal information stored on a laptop computer should be encrypted, the GLB Act does not contain any such requirement.2 Accordingly, Guin has not presented any evidence showing that Brazos violated the GLB Act requirements. In addition, Guin argues that Brazos failed to comply with the self-imposed reasonable duty of care listed in Brazos’s privacy policy — that Brazos will “restrict access to nonpublic personal information to authorized persons who need to know such

While it appears that the FTC routinely cautions businesses to “[p]rovide for secure data transmission” when collecting customer information by encrypting such information “in transit,” there is nothing in the GLB Act about this standard, and the FTC does not provide regulations regarding whether data should be encrypted when stored on the hard drive of a computer. (Mem. in Supp. at 17-18; Johnson Aff. Ex. 8.) 8

2

Case 0:05-cv-00668-RHK-JSM

Document 61

Filed 02/07/2006

Page 9 of 14

information.” (Mem. in Opp’n at 11.) Brazos concedes that under this policy, it owed Guin a duty of reasonable care, but argues that it acted with reasonable care in handling Guin’s personal information. (Mem. in Supp. at 14.) The Court agrees. Brazos had policies in place to protect the personal information, trained Wright concerning those policies, and transmitted and used data in accordance with those policies. (Villarrial Aff. Exs. 1, 9-12.) Wright lived in a relatively “safe” neighborhood and took necessary precautions to secure his house from intruders. (Wright Aff. ¶¶ 21-22.) His inability to foresee and deter the specific burglary in September 2004 was not a breach of Brazos’s duty of reasonable care. Because Guin has failed to raise a genuine issue of material fact regarding whether Brazos breached its duty of care, summary judgment is appropriate. Although Guin’s failure to show that Brazos breached its duty of care provides sufficient grounds for granting Brazos’s Motion for Summary Judgment, the Court will address Brazos’s other two arguments. 2. Injury In order to prove a claim for negligence, Guin must show that he sustained an injury. See Manion v. Nagin, 394 F.3d 1062, 1067 (8th Cir. 2005) (applying Minnesota law). A plaintiff must suffer some actual loss or damage in order to bring an action for negligence. Carlson v. Rand, 146 N.W.2d 190, 193 (Minn. 1966). “The threat of future harm, not yet realized, will not satisfy the damage requirement.” Reliance Ins. Co. v. Anderson, 322 N.W.2d 604, 607 (Minn. 1982).

9

Case 0:05-cv-00668-RHK-JSM

Document 61

Filed 02/07/2006

Page 10 of 14

Guin argues that he has been injured by identity theft. (Mem. in Opp’n at 13-14.) Under both federal and Minnesota law, identity theft occurs whenever a person “transfers, possesses, or uses” another person’s identity “with the intent to commit, aid, or abet any unlawful activity.” 18 U.S.C. § 1028(a)(7); Minn. Stat. § 609.527(2). Guin argues that the circumstances of this case fulfill the definition of identity theft because “the burglars [in Wright’s home in September 2004] had a criminal intention when they broke in and gained possession of [Guin’s] identity information.” (Mem. in Opp’n at 14.) In response, Brazos contends that “any finding that a third party accessed [Guin’s] personal information [is] sheer speculation.” (Mem. in Supp. at 9.) Brazos points out that the evidentiary record is completely devoid of any disputed facts indicating that Guin’s personal information was actually on Wright’s laptop at the time it was stolen, or that Guin’s personal information is now in the possession of the burglar. (Mem. in Supp. at 8.) Therefore, Brazos argues that Guin cannot show that he has been a victim of identity theft. The facts of this case are closely analogous to Stollenwerk v. Tri-West Healthcare Alliance, No. Civ. 03-0185, 2005 WL 2465906 (D. Ariz. Sept. 6, 2005). In Stollenwerk, the defendant’s corporate office was burglarized and a number of items stolen, including computer hard drives containing the personal information of defendant’s customers. 2005 WL 2465906 at *1. After the burglary, several customers brought suit against the company asserting claims for consumer fraud, invasion of privacy and negligence. Id. at *2. In support of their negligence claim, two plaintiffs relied on the opinion of an expert who described their injury as “an increased risk of experiencing identity fraud for the next seven 10

Case 0:05-cv-00668-RHK-JSM

Document 61

Filed 02/07/2006

Page 11 of 14

years.” Id. at *5 n.2. The district court expressly rejected the expert testimony because “the affidavit of plaintiffs’ expert conclusorily posits that plaintiff’s risk of identity fraud is significantly increased without quantifying the risk.” Stollenwerk, 2005 WL 2465906 at *5. In granting summary judgment for the defendant on the negligence claim, the district court determined that the two plaintiffs had failed to establish an injury for the purpose of proving negligence: “absent evidence that the data was targeted or actually accessed [by the burglars], there is no basis for a reasonable jury to determine that sensitive personal information was significantly exposed.” Id. at *5. Like Stollenwerk, in this case Guin has failed to present evidence that his personal data was targeted or accessed by the individuals who burglarized Wright’s home in September 2004.3 The record shows that Brazos is uncertain whether Guin’s personal information was even on the hard drive of Wright’s laptop computer at the time it was stolen in September 2004. (Wright Aff. ¶ 16.) To this date, Guin has experienced no instance of identity theft or any other type of fraud involving his personal information. (Guin Dep. Tr. at 24-26, 31.) In fact, to Brazos’s knowledge, none of its borrowers has been the subject of any type of fraud as a result of the theft of Wright’s laptop computer. (Villarrial Aff. ¶ 26.) Furthermore, Guin has provided no evidence that his identity has been “transferred, possessed, or used” by a third party with “with the intent to commit, aid,

Also like Stollenwerk, this Court rejects the expert affidavit advanced by Guin to support his negligence claim because the expert’s opinion is conclusory and is based on generalizations that are not supported by the specific facts of this case. (See Hendricks Aff. at 22-26.) 11

3

Case 0:05-cv-00668-RHK-JSM

Document 61

Filed 02/07/2006

Page 12 of 14

or abet any unlawful activity.” See 18 U.S.C. § 1028(a)(7); Minn. Stat. § 609.527(2). No genuine issue of material fact exists concerning whether Guin has suffered an injury. Accordingly, he cannot sustain a claim for negligence. 3. Causation To prevail on his negligence claim, Guin must also show that Brazos’s alleged breach of duty was the proximate cause of his alleged injury. See Lubbers, 539 N.W.2d at 401-02. Proximate cause is defined as “consequences which follow in unbroken sequence, without an intervening efficient cause, from the original negligent act.” Hilligoss v. Cross Cos., 228 N.W.2d 585, 586 (Minn. 1975). As a general rule, the criminal act of a third party is “an intervening efficient cause sufficient to break the chain of causation,” provided that the criminal act was not foreseeable and there was no special relationship between the parties. Funchness v. Cecil Newman Corp., 632 N.W.2d 666, 674 (Minn. 2001). “The question of foreseeability of an intervening act is normally one for the trial court and should be submitted to a jury only where there might be a reasonable difference of opinion.” Hilligoss, 228 N.W.2d at 586. Guin contends that the September 2004 theft of Brazos’s laptop from Wright’s home was reasonably foreseeable because “allowing confidential information to remain unencrypted on unsecured laptop computers increase[s] the risk of theft.” (Mem. in Opp’n at 24.) Guin argues that “the test of foreseeability is whether the defendant was aware of facts indicating [that] the plaintiff was being exposed to [an] unreasonable risk of harm.” (Mem. in Opp’n at 23.) Guin points to similar laptop thefts in the financial industry and the 12

Case 0:05-cv-00668-RHK-JSM

Document 61

Filed 02/07/2006

Page 13 of 14

increasing problem of widespread identity theft. (Mem. in Opp’n at 24.) Based on this, Guin argues that the theft of Wright’s laptop was reasonably foreseeable to Brazos because “a reasonable jury could conclude that the risk of information compromise is common knowledge in the financial industry.” (Mem. in Opp’n at 25.) The Court concludes that the September 2004 theft of Wright’s laptop from his home was not reasonably foreseeable to Brazos. In Hilligoss, the Minnesota Supreme Court observed that a high crime rate and the commission of similar crimes in a particular area can establish foreseeability of a subsequent criminal attack. 228 N.W.2d at 548. In this case, however, Wright lived in a relatively “safe” neighborhood and took necessary precautions to secure his house from intruders. (Wright Aff. ¶¶ 21-22.) Wright was unaware of any previous burglaries on his block or in his immediate neighborhood. (Wright Aff. ¶ 22.) There is no indication that Wright or Brazos could have possibly foreseen the burglary which took place on September 24, 2004. A reasonable jury could not infer that the burglary caused Guin any alleged injury; such a conclusion would be the result of speculation and conjecture, not a reasonable inference. See Stollenwerk, 2005 WL 2465906 at *7. Guin cannot establish proximate cause in this case and therefore, his negligence claim fails.

13

Case 0:05-cv-00668-RHK-JSM

Document 61

Filed 02/07/2006

Page 14 of 14

CONCLUSION Based on the foregoing, and all of the files, records and proceedings herein, it is ORDERED that Defendant’s Motion for Summary Judgment (Doc. No. 20) is GRANTED, and the Complaint (Doc. No. 1) is DISMISSED WITH PREJUDICE. LET JUDGMENT BE ENTERED ACCORDINGLY.

Dated: February 7, 2006

s/Richard H. Kyle RICHARD H. KYLE United States District Judge

14

Similar Documents

Premium Essay

Is3230

...Week 4 Lab Part 1: Design a Multi-factor Authentication Process Assessment Worksheet Design a Multi-factor Authentication Process Lab Assessment Questions & Answers 1. In an Internet Banking Financial Institution is Single Factor Authentication acceptable? Why or why not? Yes it can be acceptable because you can buff up security elsewhere. 2. Explain the difference between Positive Verification and Negative Verification? Negative verification is the opposite of positive verification. The customer must contact the bank to verify that the information is correct. 3. What vulnerabilities are introduced by implementing a Remote Access Server? Could Allow Remote Code Execution, two heap overflow, cross-site scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the site in the context of the target user. 4. What is a recommended best practice when implementing a Remote Access Policy server user authentication service? Using multi-factor authentication. 5. Name at least 3 remote access protections or security controls that must be in place to provide secure remote access. Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control. 6. When dealing with RADIUS and TACACS+ for authentication methods, what protocols are used...

Words: 1143 - Pages: 5

Premium Essay

Is3230

...The staff at 9-Iron Country Club, commonly referred to as 9, is located in the suburbs of St. Georgie. It offers the amenities of a 9-hole golf course a swimming pool, the Clubhouse, and other recreational facilities to more than 1,200 member, it employees 75 staff members who cater to private functions such as wedding, meeting and banquets. The facilities management operations and the Catering Task are normally executed through the network of the 9. We are open eight months out of the year. So there are issues during the off season that need to be covered. Then you have staff that would like to access from home to the network. In order to meet the requirements the above then 9 needs to have a mesha network set up a wireless points thur out the Club and recreational areas so that the customer can always have access to the network. Each customer /member should have their own access/password /pin to the clubs wireless network. I think that the Club should create a Sharepoint website to share information with the Staff and very important customers for example when there are wedding, and major events that can affect the schedule of the club. I also believe that the club should have VPN access and Remote Access. So that the staff can finish their work and view the work schedules from home and state in contact with the venders doing the off season and continue to for new event during the off season. The VPN and Remote would be available twenty-four...

Words: 517 - Pages: 3

Free Essay

Is3230

...A Remote Access Solution requires meeting the demands for mobility from sales or remote staff who frequently out of the office. The most important decisions in the design phase of Remote Access VPN solutions include outlining the key objectives of the design, understanding how the VPN management processes are implemented, planning the required security policies, and knowing how to create a robust and scalable environment (Informit). According to 9-Iron country club’s needs, they are able to remotely access resources as they normally do if they were in the office. The Remote Access VPN Solution should meet the resiliency and availability standards of other areas of your network (Informit). To manage and design a good connectivity to provide local and global redundancy, any organization must consider some service levels such as: * Flexible deployment * Client transparency * Service transparency The management of VPN solution is delicate not only to protect 9-Iron resources from unauthorized access, but also to enable a transparent and manageable solution for all categories of potential users (Informit). VPN Service will be deploy for 9-Iron; however, the solution deployed for each category must be evaluated according to the ability to deploy, change, and enforce policy. Configuration, Change, and Operations, are three relevant management features that can make a robust Remote Access Solution. After the management, place to the security part; the 9-Iron...

Words: 359 - Pages: 2

Premium Essay

Is3230

...Name: Date: Instructor: L. Chretien Subject: Aligning Account Types and Privileges How Grade: One hundred points total. See each section for specific points. Learning Objectives and Outcomes * Explore the concepts of access privileges to categorize the given access privileges based on the account types and the security requirements. Assignment Requirements * Review the nine following account types: 1. Network Administrator 2. System Owner 3. System Administrator 4. Application Administrator 5. Standard User Account 6. Security Manager/CSO/CISO 7. Not allowed by network accounts 8. Remote/Traveling 9. Member of Board of Directors * Review the 30 privileges, roles, rights, and actions identified in the table below; * Match the given account types with their corresponding privileges, roles, rights, and actions; and * Remember that a specific account type may have more than one privilege, role, right, or action. Part 1: Short Answer (10 points) Identify and briefly summarize two benefits of assigning privileges, roles, rights, and actions to types of accounts vice assigning them to specific individuals. Part 2: Matching (90 points) The left side of the table lists 30 privileges, roles, rights and actions. Identify account types that could fulfill them. # | Privileges, Roles, Rights, and Actions | Account Type From List Identified Above | 1. | Must authenticate when accessing...

Words: 415 - Pages: 2

Premium Essay

Is3230

...What are the three main categories of objects to be protected by Access Controls? | | Information – any type of data asset Technology – Applications, Systems, and networksPhysical Location – buildings and rooms | What are the three elements of an Access Control System? | | Policies – RulesProcedures – nontechnical methods used to enforce policies Tools – Technical methods used to enforce policies | What are the three types of subjects when it comes to access control for specific resources? | | Authorized – presented credentials and have been approved for access Unauthorized – Don’t process the proper credentials or do not have the appropriate privileges for accessUnknown – Don’t possess any credentials at all: Don’t know if they should be given access or not | What are the three steps to the access control process? | | Identification – process of Identifying itself Authentication – verification of the subjects identity Authorization – allow or deny access to an object. | What are the principal components of Access Controls? | | Policies – who gets access to whatSubjects – User, Network, process, or applications requesting access to resources Objects – The resource to which the subject desires access | What are the basic...

Words: 2070 - Pages: 9

Premium Essay

Is3230

...Lab 3 Assessment Worksheet Data Gathering and Foot-printing a Target Website 1. Which reconnaissance tool comes with Microsoft Windows that can provide and can be initiated from the DOS command prompt? What useful information does this query provide? There are several reconnaissance tools that can come with Microsoft Windows that can provide and can be initiated from the DOS command prompt there are as followed Whois, ping, IP block whois, nslookup, Sam Spade, traceroute, finger, SMTP, dig, DNS zone transfer, VRFY, and Web browser. These queries provide a list of which a list of ip addresses or name resolutions and which ports are opens. 2. What is the difference between ARIN, RIPE, IANA? What regions of the world do these domain name registry organizations cover? The difference between ARIN, RIPE AND IANA is that of the area that they cover such as ARIN covers North America, several portions of the Caribbean and the part of Africa that is south of the equator. LACNIC covers Latin America and portions of the Caribbean and APNIC covers Asia and Pacific Region 3. What other functions can be completed using the Sam Spade Utility? Functions such as whois, traceroute, finiger, ping, and nslookup can be completed using the Sam Spade Utility. 4. What is the purpose of the traceroute command? What useful information does traceroute provide? How can this information be used to attack the targeted website? The purpose of the traceroute command is to trace packets from...

Words: 599 - Pages: 3

Premium Essay

Is3230

...Healthcare organizations are migrating from hard copy to electronic records to meet today’s demands. This increase in information storage, patient records and imaging data requires large amounts of bandwidth. Flexible network solutions between data centers, hospitals, clinics and doctors’ offices to access centralized medical records. Move electronic medical records from local to centralized storage. Backup and restore medical data between data centers for disaster recovery. -All mobile devices and USB drives should be encrypted if they will be used remotely. Healthcare organizations are now routinely installing full-disk encryption on their employee laptops. USB thumb drives are a convenient way to transport documents between offices or move data between work and home. But healthcare organization should take steps to minimize the security risks created by those portable drives. The health organization has to keep in mind the threats of USB drives. If the USB lost or stolen or lost which holding protected health information or other sensitive data. The other threat is USB malware USB drives often get passed around and are handed out for free at conferences and other events. That means many people use thumb drives without knowing where they’ve been before, making USB drives an effective way to spread computer viruses. Also Insider threat gives malicious insiders a convenient method for sneaking sensitive information off of a healthcare organization’s premises. -In health...

Words: 362 - Pages: 2

Premium Essay

Access Control: Is3230

...Access Control Project Access Control: IS3230 By Andrew Reed November 20, 2012 TABLE OF CONTENTS 1 INTRODUCTION 1.1 Project Title 1.2 Project Schedule Summary 1.3 Project Deliverables 1.4 Project Guides 1.5 Project Team Members 1.6 Purpose 1.7 Goals and Objectives 2 Risks and Vulnerabilities 2.1 Overall 2.2 Billings, Montana 2.3 Warsaw, Poland 3 Proposed Budget 4 IDI Proposed Solution 4.1 Billings, Montana 4.2 Warsaw, Poland 5 Drawings 6 Conclusion 1 INTRODUCTION 1.1 Title of the project Access Control Proposal Project 1.2 Project schedule summary The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms. 1.3 Project deliverables • Solutions to the issues that the specifies location of IDI is facing • Plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability • Assessment of strengths and weaknesses in current IDI systems • Address remote user and Web site user’s secure access requirements • Proposed budget for the project—Hardware only • Prepare detailed network and configuration diagrams outlining the proposed change • Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location. 1.4 Project Guides Course Project Access Control Proposal Guide Juniper Networks Campus...

Words: 1198 - Pages: 5

Premium Essay

Is3230 Assy#4

...This report was generated Using Two vulnerability scans Netwitness and Zenmap investigators. A list of the information will be listed below to be reviewed and analyzed with Company management department for further investigations, modifications and implementations if needed.  Services: The scan shows the use of the following services: Services Use Msrpc A tool for running processes on a remote computer. netbios-ssn It provides services related to the session layer of the OSI model allowing the applications on a separate computer to communicate microsoft-ds This port replaces the notorious Windows NetBIOS trio (ports 137-139), for all versions of Windows after NT, as the preferred port for carrying Windows file sharing and numerous other services. ms-wbt-server Virtual data connection that can be used by programs to exchange data directly, instead of going through a file or other temporary storage location. wsdapi Used to develop client applications that find and access devices, and to develop device hosts and associated services that run on Windows Vista and Windows Server 2008.  Unnecessary services and removing them: Ideally, a Web server should be on a dedicated, single-purpose host. When configuring the OS, disable everything except that which is expressly permitted—that is, disable all services and applications, re-enable only those required by the Web server, and then remove the unneeded services and applications. If possible, install the...

Words: 429 - Pages: 2

Free Essay

Is3230 Unit 8

...While investigating the problem vs the needs of the club, I’ve come up with a simple and effective solution that will benefit all parties involved. The problem is giving employees the necessary access to work related data from home or a mobile location over a secure and encrypted network connection. Of course this could present many security and confidentiality problems to the customer but with the right deployment and use of software, the customer can rest easy knowing that the information being sent over the connection is secure. The solution to this problem is very simple; SSL VPN with an RSA soft token code and a personalized pin that only the user would know. SSL VPN allows users to access confidential files and emails stored on a secure server through a remote connection from home or a mobile hotspot. The use of an RSA soft token increases the level of security for the user by generating a random, 6 digit code every 30 seconds. Combined with the user’s personal 4-8 digit pin, users can breathe easy knowing their information is secure. A specific program that I would recommend is Neoteris Access 1000. The Neoteris Access 1000 is a versatile, feature-rich remote-access device that is an ideal fit for an organization with 50 to 250 concurrent remote users. Unlike the more limited Rainbow NetSwift iGate and SafeWeb SEA Tsunami, the Access 1000 can incorporate a mix of technology resources, including Windows Terminal Services, Web-based enterprise applications (CRM, ERP, and...

Words: 482 - Pages: 2

Premium Essay

Is3230 Final Project Outline

...ITT Technical institute – isc program | Project: Access Control Proposal Outline | IS3230 - Access Control | | Issues at the Data Center * Different versions of unix on servers * Outdated patching * Logisuite 4.2.2 is outdated by 10 years, the license has expired, and would be extremely cost-and-time prohibitive to upgrade to the latest version * Routsim is not integrated into Logisuite or Oracle financials to take advantage of the databases for –real-time currency valuation and profit or loss projections * Managers buy whatever PCs they like and nothing is standardized * Different types of Office Software * Telecoms has not been updated in 15 years and is not integrated with customer service database to improve call management efficiency * The Service Provider for the telecom system is out of business and parts are not available for maintenance * Executives are connecting non approved devices to the network * WAN is outdated and is insufficient for the organization * The PBX is limited that only provides voice mail and call forwarding Solutions * Follow the lead of Standardization from the Brazil Site * Upgrade all the Unix servers to 11x and install appropriate patches * Look into other shipping programs such as Infor ERP and see if it would be more cost effective. ERP allows for growth because it supports large businesses as well. However, if that is not an option, then upgrade Logicsuite but to a version...

Words: 794 - Pages: 4

Premium Essay

Is3230 Project Details

...Project Details: Integrated Distributors Incorporated (IDI), a publically traded company, has its home office located in Billings, Montana. IDI has more than 4000 employees in the following locations: ▪ Billings, Montana, 600 employees ▪ Sao Paulo, Brazil, 580 employees ▪ Warsaw, Poland, 975 employees ▪ Sydney, Australia, 340 employees ▪ Tanzania, Africa, 675 employees ▪ Japan, China, and Hong Kong, 700 employees IDI has accounts with major market retailers, Federal governments, and large State governments. IDI operates a fleet of trucks in each country and has network interface agreements with subcontractors for freight forwarding, storage, and delivery. IDI is responsible for the movement of goods, from multiple manufacturers and distributors to its clients, in a timely and efficient manner using cost-effective methods. Alternatively, IDI may transfer this responsibility to one of its JVs or SAs, if it is more cost-effective and the income differential is within acceptable limits. IDI is also under pressure for several of its competitors in the logistics industry. The competitive market is driving IDI to improve its routes, delivery methods, fleet vehicles, and other facets of its business to increase profits (a strategic goal) and to reduce costs. The company realizes that the information technology infrastructure has been neglected for some time and that many operating locations are running...

Words: 1595 - Pages: 7

Premium Essay

Is3230 Unit 2 Assignment 1

...Selecting Security Countermeasures IS3220 As a technology associate in the information system department at Corporation Tech I have reviewed the new network design and identified possible security threats and appropriated countermeasures. Entering the internet without proper security can be harmful in many ways. The first thing that should be added is a firewall. Firewalls can prevent unwanted traffic from infiltrating the network. This is essential now that the company is deciding to add a web server and internet access. The other priority is to protect business and customer data and to prevent their unauthorized use whether the data is printed or stored locally, or transmitted over a public network to a remote server or service provider. Maintain a Vulnerability Management Program: Vulnerability management is the process of systematically and continuously finding weaknesses in the Corp Techs IT infrastructure system. This includes security procedures, system design, implementation, or internal controls that could be exploited to violate system security policy. Implement Strong access Control Measures: Access control allows Corp Tech to permit or deny the use of physical or technical means to access Corp Techs data. Access will be granted on a business need to know basis. Antivirus software is also needed to make sure the computers and servers aren’t infected with malicious programs that could cause major losses. The WIFI needs to have a password to keep unauthorized users...

Words: 307 - Pages: 2

Free Essay

Is3230 Lab 5 Assessment

...Lab 5 Assessment | 1. They are a. Password b. Token c. Shared secret 2. Authorization is a set of rights defined for a subject and an object; this concept is aligned with Identification and Authentication because these are the 3 steps to the access control process 3. Remote Access servers, Authentication servers, and Logical IDS 4. Network should be both connected and secured physically and remotely in order to avoid unauthorized access to the system. The three are the computer has authorized access. Computer settings must be in compliance with the security standards, and the user having authorization access. 5. NAC Systems implement network security policy at the network access point relatively than the client (endpoint) operating system. Reliant on the system architecture and configuration, NAC systems can deliver physical port security or logical port/access security. NAC systems necessitate authentication for both the endpoint and user before the network access point forwards traffic for that client 6. PKI refers to a framework of programs, data standards, communication protocols, policies, and cryptographic mechanisms. The PKI infrastructure delivers for the generation, production, spreading, control, accounting and obliteration of public key certificates. PKI offers a selection of facilities containing issuance of digital certificates to individual users and servers, end-user enrollment software, assimilation with certificate...

Words: 468 - Pages: 2

Free Essay

Is3230 Unit 9 Lab 9

...1. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasures can you employ to maximize the confidentiality of e-mail transmissions through the Internet? Encrypt email, email policy, security software, content checking tool, anti-spam tool, and secure firewall configurations. 2. Explain the role of a Certificate Authority and its obligations in authenticating the person or organization and issuing digital certificates. Certificate Authority or Certification Authority (CA) is an entity, which is core to many PKI (Public Key Infrastructure) schemes, whose purpose is to issue digital certificates to use by other parties. It exemplifies a trusted third party. 3. What would a successful Subversion Attack of a CA result in? An attacker can create a certificate for any domain. This certificate will appear to be signed by a trusted CA. Thus, you will see that the site's cert is trusted and you will never get any notification to the contrary. Normally, a trusted CA will issue and sign a certificate and then if the browser trusts the signing CA, you will see a padlock in the GUI and you will often times see a message that lets you know that the certificate of the web site is trusted. If the CA is not trusted, you are shown a message that the certificate is not signed by a trusted party and you are given the option to leave or continue. This is PKI in a nutshell. The entire system relies on trust of...

Words: 804 - Pages: 4