Premium Essay

Should All Security Breaches Be Made Public?

In:

Submitted By alahjee12
Words 375
Pages 2
Introduce yourself to the class and Complete the Work Ethics Discussion

Please introduce yourself to class with the following information (Your name, major, and your response regarding work ethics):

Cyber-attacks on American companies have become increasingly more common. Companies such as Facebook, Twitter and Apple, have voluntarily gone public with their security troubles. Alternatively, a number of companies have continued to deny cyber-attacks, despite reports stating otherwise; including, Exxon Mobil, Coca-Cola, Baker-Hughes, and others. The U.S. government has encouraged transparency on cyber-attacks as part of a wider effort to protect American intellectual property. Advocates of disclosing breaches claim it will set a precedent for other companies to get more active in fighting cyber-attacks. The majority of company lawyers advise not to disclose, pointing to potential shareholder lawsuits, embarrassment and fear of inciting future attacks. Health and insurance companies must disclose breaches of patient information, and publicly traded companies must when an incident effects company earnings.

What policy should companies adopt when dealing with a cyber-security breach?

Should all security breaches be made public? Is it ever ethical for companies to withhold security breaches from those whose information may have been compromised? Why or why not?

In a minimum of 150 words, respond to the questions posed above and submit via a post. Feel free to comment on your peer's posts.

Hi, my name is Alex Crenshaw and my major is computer programming. When dealing with personal information I feel like a company should go public, to the let the consumer know that there is something going wrong. And that they are doing everything they can to fix the problem. Ever consumer has the right to know if something has gown wrong with their personal

Similar Documents

Premium Essay

“Economics of It Security Management”

...of IT Security Management” 1) The article questions the loss estimate obtained from CSI/FBI security surveys since they exclude some categories of costs associated with security breaches. It suggests that cost estimate based on the loss in capital markets as a result of a breach in security may be a proxy to estimate true cost of security breaches. a. What do you think about the quality of this cost estimate? Can you think of better ways to capture true cost of security breaches? Although I can see the benefit to utilizing capital market losses as a basis for estimating the true costs of a security breach because it attempts to capture the intangible costs of a breach, there is a great deal of uncertainty in the market and market share may go up or down as much based on the public perception of company’s ability to handle the situation as the damage done by the event itself. Additionally, the marketplace is often affected, in the long term by a multitude of indirect factors that skew the data; the price of fuel, socio-economic instability or new laws/regulations in parts of the world where they have warehouses or production facilities, natural disasters etc. Furthermore capital market changes only capture the effects of those security breaches that are publicly reported. Privately held companies are not subject to many of the laws and regulations that compel larger businesses to self-report and even when companies are required by law, to report security breaches...

Words: 2740 - Pages: 11

Free Essay

Internet Security

...topics regarding, 1) Internet Frauds ;2) to analyze user’s satisfaction on internet security by using Secure Socket Layer (SSL); and 3) to make people aware of internet fraudsters. Six research questions were utilized in this study. This study examines whether secure socket layer and its certificate would protect online users from fraudsters while they browse websites. The six research questions are as follows: • Are there any security breaches occurring with the usage of SSL certified website? • Can we stop internet frauds by making people aware of it? • Is secure socket layer used in all websites? • Is Secure Socket Layer reliable? • Does Secure Socket Layer protect online users from fraudsters? • Are users satisfied with security provided by SSL authentication? TABLE OF CONTENTS ABSTRACT ii INTRODUCTION 1 Statement of Purpose and Problem 2 Principle Research Questions 3 Assumption of the study 3 Limitation of the Study 3 Definition of Terms 3 REVIEW OF LITERATURE 5 Internet 5 How SSL Works? 8 What is a “certificate” in SSL certificate? 8 What is an SSL certificate? 9 METHODOLOGY 11 Selection of subjects 11 Instrumentation 11 Method 13 ANALYSIS 15 REFERENCE i INTRODUCTION The term internet refers to prevalent network of networks connected on the Earth and the security provided to the networks in order to maintain confidentiality of the data is called Internet security. Network can be defined as a group of computers connected together and the communication...

Words: 3516 - Pages: 15

Premium Essay

Hcs 335

...Article Review: HIPAA breaches: minimizing risks and patient fears Student Name HCS/335 March 13, 2013 Instructor Name Article Review: HIPAA breaches: minimizing risks and patient fears The article, “HIPPA breaches: minimizing risks and patient fears”, by Gabby Loria who is a Market Research Associate for Software Advice, is an industry view case study of concerns that patients have in relation to potential security risks related to health care. Patient privacy and medical document security are the main topics of this article. The article discusses the importance of provider confidentiality, proper handling of health information along with proposed solutions for potential security issues. There is a focus on the patients perception of what is considered to be protected. Loria points out that forty-five percent of patients are apprehensive about security gaps involved with their private health information (Loria, G., 2015). Protected Health Information: Patient Privacy Concern The potential breach in HIPPA, Health Insurance Portability and Privacy Act of 1996, brings up several patient privacy concerns. One consideration is the method that the patient’s health data is distributed and utilized. Electronic health records are at risk of security breaches from hackers without adequate safety measure in place. According to Loria, (2015), “In January, health insurance provider Anthem discovered that hackers had broken into a database containing...

Words: 1506 - Pages: 7

Premium Essay

Identity Theft Research Paper

...organizations made 100% sure the people they're doing company with are who they claim to be, identity theft wouldn't are available. Identity Theft's Major Cause - Poor Information Protection Given details should be closed up and kept secure, why is identity theft running rampant? You'd figure company and govt organizations will give top concern to defending and verifying details. That's not always the scenario. Monthly - and increasingly frequent news reviews of massive security breaches confirm this reason. According to Comfort Rights Resource, 299 company and govt security breaches revealed over 93 thousand personal information between Feb 15, 2005 and Sept 7, 2006. That's one security breach revealed every two days! Many of these information are enough for successful identity theft. So why so many security breaches today? More organizations than before have revealed security breaches due to a few new state rules. And it's getting more intense. The latest wave of security breaches was only the tip the iceberg. Not all organizations and organizations need to check security breaches. Besides, many don't even know it's...

Words: 1226 - Pages: 5

Premium Essay

Case Study 3

... Evaluate the obligation Flayton Electronics has to its customers to protect their private data. All client data needs to be kept secure all of the time. Doing this helps to protect company operations from being slowing down because the firm looks bad in the eyes of the public. Flayton Electronic has an obligation to protect all client information so that their needs are met without and drama or dilemmas. The firm does not want to have an instance on their hands where personal client data or company records were compromised. Flayton Electronic needs to protect the complete client base from any type of impending exposure. Adequate protection should be offered with the credit card despite the fact that the card is also covered by Flayton Electronics individual banks. The action of shielding the confidential data of clients would reclaim the representation of the company. Securing date can be protection of the data is made possible through use of refined examination tools that would identify any abnormal patterns before they had the chance to surface. In the beginning stages when the business was entering into an agreement with well-regarded clients, the customer data was to be confined from other outside entities. It is the duty of Flayton Electronics to ensure the client records are kept safe. An envisioned security breach might have been looked into to prevent the firm from losing their profits. Illegal use of any client information...

Words: 1012 - Pages: 5

Premium Essay

Csec

...Intervention:…………………………………….……5 Government’s Intervention Impacts on National Security………………….….5-6 Real World National Security Breaches…………………………………………6 Arguments of the Private Sector to Take Responsibility.................................6-7 Failure to Take Responsible Action................................................................7 Conclusion…………………………………………………………………………7-8 References.....................................................................................................8-9 Introduction In 1969, the first ever network was born into existence (ARPANET) also called advanced research projects agency network. The Government Defense Department worked diligently on this break through in order to link some of the United States most prominent research universities with a couple of purposes in mind: That is, developing experience in interconnecting computers and to expand productivity via resource sharing (Bosworth, 2014). These independent large-scale computer systems only had four nodes which included the big time universities like UCLA, Utah, University of California, and Stanford. At the time there was no thought of any concerns for security issues as the mainframe computer rooms...

Words: 1747 - Pages: 7

Premium Essay

Social Engineering

...intelligence Brian Nance CIS 502 Theories of Security Management Strayer University Prof. (Dr.) Gideon Nwatu May, 5, 2013 Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs “Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures”. (Rouse, 2006) Social engineering is a con game in where a person breaks into a computer network in the efforts to gain the confidence of an authorized user and to get them to reveal information that will compromise their network security. Social engineering relies on the weakest link, which are human beings. Most social engineering attacks happen when attackers send urgent emails or correspondence to an unsuspecting authorized user of an urgent problem that requires immediate network access. According to (Rouse, 2006) these types of social engineering tactics appeal to vanity, a since of authority, or greed. Attackers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it. Security experts believe people are more dependent on information than ever and social engineering will remain the greatest threat to any security system. They also believe that educating people about...

Words: 2232 - Pages: 9

Premium Essay

Breach Hippa

...How To Avoid Data Breach? How do data breaches occur? • we suspect our information system has been • targeted and patient information exposed. After one a laptop and other portable device is lost or stolen. • We did a rapid assessment to mitigation of damage and is and define scope of the incident we discovered following facts: – – – – data are not encrypted laptop are not protected by password Information of patients are exposed. No log file exist What are consequences of these breaches ? A data security breach can have devastating consequences for healthcare organizations as well as patients or clients What are our strategies to prevent theses breaches • We must be in compliance with the final HIPAA Omnibus Rule through following : – Administrative safeguards – Physical safeguards – Technical safeguards What is HIPAA? • HIPAA: Health Insurance Portability and Accountability Act • It was passed by Congress in 1996 • broadly applicable to the health care industry • intended to address security for both electronic and physical patient records • standardizing electronic exchange of administrative & financial data in health care system • It includes requirements for: • Transfer and continuation of health insurance coverage • Reducing healthcare fraud and waste – The protection and confidential handling of protected health information (PHI) What is a breach? – A breach is an impermissible use or disclosure that compromises the security or privacy of PHI and poses a significant...

Words: 3265 - Pages: 14

Premium Essay

The Importance of Network Security to Safeguard Organizational Proprietary Data

...Running head: Network Security The Importance of Network Security to Safeguard Organizational Proprietary Data Donald Shipman Strayer University Dr. Kwang Lee June 10, 2012 Abstract Cyber-criminal activity is on the rise in a world that thrives on the use of technology in everyday living. The close-minded thought process of simple theft of a credit card number or a social security number are long gone. Crimes in today’s business are much more extreme to include attacks that disable key functions of major operations such as public transportation and utilities, to the major financial records of customer information being exposed and stolen. In this paper I will focus on the latter. It is important that companies make significant investment in network security in order to protect its proprietary data from hackers and other criminals. I will address current attitudes toward network security, the rise in and recent increase in criminal activity, existing counteractive measures along with their effectiveness and the direction of network security for organizations in the future. Ultimately, the paper will show the importance of network security in organizations and the immediate change is needed to restore the consumer confidence about their information being safe. Introduction The Internet has become a staple of the business world today. One might find it impossible to be current on the latest world events without being able to effectively use it, navigate it, and understand...

Words: 2112 - Pages: 9

Premium Essay

Cmgt441 Week 2 Web Security

...Website Security Website Security is important in helping to protect both consumers and corporations from security threats. As more and more companies make their products available online, and consumers continue to find online shopping more convenient, threats to website security continue to rise. These threats can come in the form of identity theft and lead to consumers’ finances being stolen and used by the offenders. This also creates a financial burden to companies, as they could be liable for the financial damages to consumers, along with losing some of the trust that their consumers may have for them. Implications of a Security Breach Security breaches can be very damaging to an organization. Financially, it can be a nightmare, but a breach also means that the company will have to overhaul its website security practices and policies. For example, in August 2007, Monster Worldwide Inc., a company that runs Internet job boards Monster.com and USAJobs.gov, fell victim to a security breach that was very costly.(Hobson, 2014). According to NBC News, approximately 1.3 million people’s information was stolen. Normally, resumes do not contain any data that could be immediately damaging, such as Social Security Numbers, credit card numbers, and bank account numbers, but contact information can be used in phishing scams to gain more sensitive information. This security breach cost Monster $80 million in upgrades to improve the security of its site.(Bergstein, 2014)...

Words: 817 - Pages: 4

Premium Essay

Cloud Computing and Information Security

...Information Security Krystal Hagi Daytona State College Student Khagi1@yahoo.com Abstract In order to discuss the security of information in cloud computing, we must first cover what is Cloud Computing. There are many types of cloud computing services, such as, SaaS, PaaS, IaaS, public clouds, private clouds, and hybrid clouds Examples. They all work similarly but have not only different tools, but varying levels of security for various needs. These differing types of clouds and networks as a service offer off site data storage in a secured location, which in essence frees up space and virtual infrastructure for personal and/or business networks, and devices. There are advantages and disadvantages to cloud computing, just like any other product or service. The advantages being, storage for data, accessibility from virtually anywhere there is a network connection, automated management, security, apps, tools, etc. The disadvantages include monthly costs for space on the offsite network, security, involvement of a third party, no access to the physical structure - which means if the cloud server goes down, your data may not be accessible, etc. There is one instance with cloud computing that is both an advantage and a disadvantage, and that is the security. While a cloud may be more secure than your own network How?, personal or business, using cloud services puts the security out of your hands in both the physical and logical sense. Using a cloud, means the security of the server...

Words: 4955 - Pages: 20

Premium Essay

The Importance Of Computer Security

...Executive Summary Computers and networks are involved in virtually all activities today. They are used to communicate, to create intellectual property, to store data, to perform business transactions and much more. Networks afford users the opportunity to continuously use computers through wireless connectivity across many different platforms. Any computer connected to a network can be used for many purposes. Just because a computer is located in the workplace does not mean that the computer is used only for work. The pervasive nature of computers and networks means that they are increasingly connected to incidents and crimes, which can be accidental and/or malicious (Mandia et al, 2003). Fig 1. (Schneiderman, 2014) http://www.net-security.org/secworld.php?id=17119...

Words: 1729 - Pages: 7

Premium Essay

Hippa

...HIPPA: Security and Privacy Audits | MIS565 | | | | Abstract Companies who work with patient health care information are required to comply with the requirements of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). As such, the HHS rolled out a new audit initiative to assess compliance across the nation with the privacy and security standards for protected health information This paper focus on how the audit program of HIPPA works, what the covered entity can do to prepare for the audit, and what happens once the audit is complete. Introduction Ever since implementation of the HIPAA privacy and security standards, entities have been required to establish and maintain a variety of compliance mechanisms, including written policies and procedures, training of responsible workforce members, business associate agreements, relevant notices to patients or plan participants, and health plan document amendments. Until now, most compliance actions have been complaint-driven investigations arising from alleged violations of the HIPAA privacy or security standards (Arant, 2011). Pursuant to the HITECH Act, a more robust enforcement program was created to make a more ???? The U.S. Department of Health & Human Services' Office for Civil Rights (OCR) administers HIPAA (including the HITECH amendments) by investigating complaints, enforcing rights, promulgating regulations, developing policy and providing...

Words: 1705 - Pages: 7

Premium Essay

Visual Data Security

...Visual Data Security White Paper Brian Honan, BH Consulting July 2012 1 Introduction Welcome to Secure’s White Paper on Visual Data Security. As data gets ever more versatile and mobile, we want to make sure that individuals, businesses, organisations and governments across Europe are aware of the threats posed by visual data security breaches. Simply put, visual data security is ensuring that information cannot be seen by unauthorised individuals. This is particularly important when dealing with private or sensitive information, and the threat of a breach has risen enormously with the shift in working practices towards increased mobility, flexibility and shared resources. This White Paper has been commissioned to give some background to visual data security and provide simple, easy to follow advice on how to prevent a breach and protect individuals’ personal data and organisations’ commercially sensitive information. It’s not about constraining people’s working habits or holding back the tide, but about embracing new trends and empowering employers and employees to take small steps to work in a safe and secure manner. By promoting a greater understanding of these risks and the behavioural and practical procedures that can be adopted to reduce them, we hope to enhance data security across the continent. We hope you find the Paper of interest. For any further information please don’t hesitate to contact us on info@visualdatasecurity.eu. Happy reading and stay secure...

Words: 4506 - Pages: 19

Free Essay

The Pci-Dss Framework: Protecting Stored Cardholder Data

...Cardholder Data Introduction Payment cards, whether they are debit or credit cards are an essential component of modern commerce. EMV-based cards have already helped improve the security of millions of bank cards throughout the world, giving even more people the confidence to make payments. But there are other security concerns associated with bank cards. (Card Technology Today, 2009) Globally, debit and credit cards are used for a wide variety of payments with Internet card payments increasingly significantly in recent years. However, with this growth in Internet-based transactions has come an increase in stories related to Card Not Present (CNP) fraud via Internet channels. (Laredo, 2008) The proliferation of fraud and identity theft cases has put the Payment Card Industry (PCI) on the offensive frontlines. (Morse and Raval, 2008) American Express, Discover, JCB, MasterCard, and Visa have joined forces and formed the PCI Security Standards Council, an independent organizational entity, in order to take back control of this widespread epidemic of identity thefts and fraudulent activities (PCI Security Standards Council, 2006). The PCI Security Standards Council has formulated a detailed set of 12 security requirements called PCI Data Security Standard (DSS) for merchants to follow. While many people feel that PCI in itself may be ineffective,...

Words: 3961 - Pages: 16