The Nexus: Technology and Security Violations/Breaches: A Re-Structed, Re-Write














Technology Evolution, and The Dangers

for IT Security, Inherent-

with the Growth: “Risk”

























Research Paper, By: Miss. Bayo Elizabeth Cary, AA, BA, MLIS

Capella University, IAS1005

November 10, 2017

Re-Write/Re-Structure: Final Submit

Professor: Dr. Susan Ferebee

























Miss. Bayo Elizabeth Cary, AA, BA, MLIS

400 NW 1st Avenue, Apartment: 410

Gainesville, FL 32601

Email: bai_o@yahoo.com

November 7, 2017



Permission, as per instructor: Rewrite, Re-submission:


Unit 1 Capella University Final
From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS



Assignment Directions:



  • Building IAS Library Research Skills

For most, returning learners, research and information literacy skills take time to cultivate. You will continue to develop and refine these skills throughout your program. This assignment allows you to practice and improve on your current skills by providing an opportunity for you to review academic and non-academic Information Assurance and Security (IAS)–related sources related to digital forensics, network defense, and health care security. To assist you and provide areas of improvement, complete the Research and Information Literacy Skills (RAILS), Library Research Knowledge Assessment, study activity found in this unit.

For this assignment, you will review the Communication and Collaboration Timeline media that presents past information technology advances, along with specific information security breaches. You are to review the timeline, which ends at the year 2008. Based on your review of the RAILS study activity, you are to provide the following:

·         Provide a new communication technology (can be a type of communication channel, type of application, type of social media, etc.) for each year from 2010 to the present;

·         Provide an instance of a security breach for each year, 2010 to the present, and each communication technology.

·         Identify the industry, company, type of breach, severity of breach, type of violation(s) and type of penalty or penalties associated with each breach listed above.


·         Identify the academic research techniques used to locate academic and non-academic sources.









As corporate assets have progressively shifted toward intangibles over tangibles, the value of these assets has become

 increasingly contingent on the security

of the systems housing corporate information.

                                                                                               (Matwyshyn, 2009, p. 579)



Technology and Security Breaches: 2010

1) Communication Technology:



The Square (Collect Banking Credit Card for Payment):


                      There might not be a piece of tech more due for an update than the cash register.

                      Enter Square, a payment platform created by Twitter co-founder Jack Dorsey. With

                      the aid of a tiny magnetic card reader that attaches to a smart phone, Square lets

                      anyone process credit cards. It might not do away with paper entirely — plenty of

                      people still prefer cash — but you certainly don't need to wait for a receipt: sign on

                      the screen, and Square sends a copy straight to e-mail. (Fletcher, 2010)



Terrorists fund their activities, with illegal money: “Black money.” The money used to finance terrorism, is obtained through the support, of illegal and illicit activities, i.e.: betting, stealing, money laundering, espionage, slave trading, human trafficking, child pornography, etc. (Irwin& Milad, 2016, p. 407-408.) Stealing money, when data exchanges are made, through various means, such as online, or-with a new collection device, like: The “Square,” is a main way, in which Intl terror, are able to prosper, and to support themselves-when adamantly opposed, by any given Intl government.

2) Related: Security Breach: Citigroup Bank (Banking Information Breach):


A) Lincoln National Financial Securities: Password management of accounts breach:

               Not only did Lincoln National mistakenly print a username and password in a brochure  

               posted on a public website, but it let employees and affiliates share usernames and

               passwords. Unfortunately, those credentials belonged to a portfolio information system

               housing data for 1.2 million customers. (Phifer, 2011).



Identity theft, is the primary means, by which, a perpetrator gains access, to: private, confidential-otherwise, secure, banking, and other personal information (SSA Pamphlet, 2017, p. 1). In, 2013, I was false arrested by US police, in Seattle, WA. I was arrested, for complaining about a prostitute, at a bus stop, smoking crack, and-for, having in my possession, a can-opener. The Seattle, WA, attacked me, and tried to beat-me-to-death, several times, for having the can-opener, concealed, and in my possession, the officers, pretended like the can-opener, was a weapon. I was illegally taken to a substation-where my Miranda Rights were denied, the police stole all-of-my personal ID, my: college ID cards, SS card, food stamp card, bank cards, and welfare benefits card.



         US police in Seattle, WA, were the first group of US police to break my left wrist, my back was severely injured, and my left kidney punctured-I suffered internal bleeding, and, I have never recovered. The judge, at the Seattle, WA downtown 5th Avenue jail-where I was illegally detained: Lynch, refused to grant me my Miranda Rights, or clinic attention-on record. I was illegally held for 3 days, at the jail, in solitary confinement, because inmate intake, at the jail said, that I had: illogical, unreasonable, and unhealthy fears, about being raped, at a US institution-I read the Florida Bar journal, I know what happens at US correctional institutions.



        My back has never recovered, and US police, just broke my left wrist again, for trying to leave the US, for Emergency political asylum, and medical care in Europe: Iceland/Ireland-after they stole my passport, at a Washington, DC airport. My back causes me, severe, and chronic acute pain. US police in Seattle, WA-refused to return to me, the personal documents, and ID cards-financial and otherwise, that they stole from me. I reported the situation, to a-number-of US government agencies-not limited to: FTC, Social Security office, and the FBI, and CIA-not even my SS number was changed.



B) CitiGroup: Human Error/Fraud:

               Ultimately, many breaches are still the result of human over-sight or error. Even though

               these SSNs were printed in a way that resembled mail routing numbers and may not

               have resulted in actual identity thefts, this shows how even a highly-regulated company

               with rigorous data handling processes can still shoot itself in the foot in a fairly big way

                                                                                                                                    (Phifer, 2011).



The Social Security Administration, of the United States, prints pamphlets, with US tax payer money, to provide free information, to Americans, regarding the ways in which, a perpetrator, may illegally gain access, to your personal identification information (SSA Pamphlet, 2017, p. 2).



        There are a-number-of steps, that any given individual can take, to protect personal information. However, when US police, attack you-like they did me, and place a gun to your head, after trying to beat-you-to-death-to steal all-of-your personal identifying information. There ultimately, is nothing you can do-when US police illegally use, their gun and badge-except to pray, that when you book a flight, for a safer country, that they will not attack you again-like they did me, and at the airport-to steal, your passport too.

3) Data Related to Technology and Relevant Security Breaches:


Industry:  Financial


Company: Banking: Lincoln National and Citi Bank


Type of Breach: PII Information Storage and Transmission Breach:


             I) Lincoln Financial: "Information loss from mishandling of private personal access
             codes and passwords" (Phifer, 2011).


             II) Citi Bank: "Human error-due to extent of loss-indication of employees
             engaging in White Collar Crime: Fraud" (Phifer, 2011).


Severity of Breach:


             I) Lincoln Financial: "This single incident accounts for nearly all the records breached by insider access during 2010 – but most other insider breaches were reported as having unknown record impact. According to the ITRC, just 51 percent of all breaches report number of records exposed, making it hard to assess their severity (Phifer, 2011)."


             II) Citi Bank: "For example, approximately 600,000 CitiGroup were sent annual tax documents that had Social Security numbers printed on the outside of the envelope (Phifer, 2011)."


Types of Violations:


Violation: "Insecure storage or transmission of PII and other sensitive information (University of California: IT, 2015).


Penalties: There are penalties for PCI non-compliance (University of California: PCI-DSS, 2015):


                      ‘The Payment Card Industry, has established fines of up to $500,000 per incident

                       for security breaches when merchants are not PCI compliant. In addition, it is

                        required that all individuals whose information is believed to have been

                       compromised must be notified in writing to be on alert for fraudulent charges. As

                       such, the potential cost of a security breach can far exceed $500,000 when the cost

                       of customer notification and recovery is calculated.’

                       (University of California: PCI-DSS, 2015):



                                   1) Potential cost of a security breach:
                                   2) Fines of $500,000 per incident for being PCI non-compliant;
                                   3) Increased audit requirements;
                                   4) Potential for campus wide shut down of credit

                                       card activity by your bank;
                                   5) Cost of printing and postage for customer notification mailing;
                                   6) Cost of staff time (payroll) during security recovery;
                                   7) Cost of lost business during register or store

                                       closures and processing time;
                                  8) Decreased sales due to marred public image and

                                       loss of customer confidence.

                                       (University of California: PCI-DSS, 2015)

Technology and Security Breaches: 2011

1) Communication Technology:



Telemedicine: Robotic Check-Ups:


                          Technology is a cost-effective an increasingly potent means to connect clinics in

                          the vast and medically underserved rural regions of the United States with big

                          city medical centers and their specialists as a tool for triage and assessment in

                          emergencies, but new medical robots go one step further—they can now patrol

                          hospital hallways on more routine rounds, checking on patients in different

                          rooms and managing their individual charts and vital signs without direct human

                          intervention. (MacRae, 2013)


Technology is intended to improve lives-purportedly. Medicine from a distance-could be scary. I understand, that there are situations, whereby, a medical professional is not available, however, in my opinion, the long distance medical robot-is too unfavorable. If you are not able to care for own medical needs, then I think you should stay in a well populated area. You have to be competent, and responsible for your own needs.

2) Security Breach: 2011:


A) Sutter Physicians Services: “Data from both Sutter Physicians Services and Sutter Medical Foundation was breached in November 2011 (Schwartz, 2011)."


B) Tricare and SAIC: "In September, backup tapes containing SAIC (Science Applications International Corporation) data were stolen from the car of a Tricare employee (Schwartz, 2011)."

3) Data Related to Technology and Relevant Security Breaches:


Industry: Medical Financial: Billing and Fund-Raising Services:


Company:


        I) Sutter Physicians Services;


        II) Tricare and SAIC.


Type of Breach: 

            "IIP Information Storage and Transmission Breach (University of California: IT, 2015)." On college campuses, Universities in the US, try to reinforce information breaches-I do not know that it is possible. There is a warning, about keeping your information, as private as possible, and then what happens-when the information is breached, is what always happens. There really is not resolution the situation. Private information-that has been exposed is useless, and the US never replaces Social Security numbers-not that I am aware of.


          I) Sutter Physicians Services: . . ."A thief stole a desktop computer from the organization, which contained about 3.3 million patients' medical details--including name, address, phone number, email address and health insurance plan name--stored in encrypted format" (Schwartz, 2011); IT information-is stolen every day in the US. I think it is a problem, that Americans continue to pretend, like anything IT-can be kept private. US police steal my: computers, laptops, servers, flash drives, memory cards, cell phones, digital cameras, Photo ID cards, Social Security cards, Welfare benefits card, food stamp card-you name it, if it is related to personal information-police in the US steal it.


           II) Tricare and SAIC: IIP data breach, ". . .Data related to current and retired members of the armed services, as well as their families" (Schwartz, 2011). Military personnel, are in a more vulnerable position in the US-than most of the rest of us. There are a-large-number of immigrants in the US, who are actively supporting Intl Terror. Members of our US military, and secret service government employees, have far more to be concerned about when it comes to data breach issues: phone number, home address, family members, etc. Intl Terror illegally target honest, and hard-working members of our US military and government.


Severity of Breach:


           I) Sutter Physicians Services: "The security lapse occurred on two levels: both the data itself (being unencrypted) and the physical location (stored in an unsecure location)," according to the PRC report" (Schwartz, 2011); I have found, that when it comes to keeping data perfectly safe-then, I need to hand deliver it. If I wrote everything down, if I talked about everything-then, nothing about would be private. Some people, will take your everything-and then leave you dying in the dirt, right outside your own home-I know, it is happening to me. I am an American-what do I have? Nothing.


           II) Tricare and SAIC: "The breach led to a $4.9 billion lawsuit being filed, which aims to award $1,000 to each of the 5.1 million people affected by the breach" (Schwartz, 2011):


                              The Tricare/SAIC breach is significant because not only are the victims at risk

                              of medical identity theft, but financial identity theft as well. The breach begs

                              several questions: Why were the backup tapes being transported in an

                              employee's personal vehicle? And why were those records not encrypted?"

                                                                                                                           (Schwartz, 2011)


When there are: rules, laws, and regulations-then those are just guidelines, to help people learn what the rules are. When people refuse to follow the law, or to reinforce the law-then, the fact that something is in writing, is on absolutely no help. America is a failed country, and a police State. You could call the police, and chances are-they will make your situation worse, they my even kill you, for your laptop!


Violations:


HIPPA Violations for both Companies, handling private and secure medical patient’s information.


Penalties:


        Sutter Physicians Services: "A class-action lawsuit lodged against the companies alleged that they also failed to inform affected patients about the breach in a timely manner" (Schwartz, 2011); HIPPA violations, happen every day. I find it very hard to believe, that it is possible to sue over the issue. People who work in hospitals-talk about anything. In my opinion-based on my own painful experiences-nothing is private in the US.


        Tricare and SAIC: HIPPA Penalties Apply. I think, that is the HIPPA penalties, could be reinforced-people everywhere, would be suing. I, took HIPPA training myself. I took the guidelines seriously, and would not have breached anyone's personal information. However, my experience has been-that the new immigrants to the US, those supporting Intl Terror, are always dishonest. If something were important to me-information or anything else, I would not trust anyone else, with that: information, etc.


Penalties Continued: HIPAA Violation and Penalty Payment-Criminal Charges Are Also Possible:


                              HIPAA violations cost your practice. The federal fines for noncompliance are

                              based on the level of perceived negligence found within your organization at  

                              the time of the HIPAA violation. These fines can range from $100 to $50,000

                              per violation (or per record), with a maximum penalty of $1.5 million per year

                              for each violation. OCR has also levied criminal charges for HIPAA

                              violations in the past. (Compliancy Group, 2015)


When there are no reinforceable penalties-then people will speak to you in any way, and will treat you in the most disdainful ways. America is a nightmare. There are people here, who support Intl terror, from all over the world, and there is no one to complain to-if a US law is broken. US police never respond. The Feds, take a message, and never get back-to-you.

Technology and Security Breaches: 2012:

1) Communication Technology:



Social Media: Facebook Timeline: Significantly Increased Data Collections Online:


                         In the past, much of the data that users contributed to Facebook was in the form

                         of unstructured status updates. The addition of a “Like” button, and the ability to

                         link that button to third-party websites (Social Indexing: May/June 2011),

                         provided somewhat more fine-grained information that could be used for

                         targeting ads. Timeline goes well beyond that, prompting users to add an

                         extensive array of metadata to their updates, which makes mining value much

                        easier. And by design, it encourages users to revisit and add more information to

                         old updates, or retroactively add completely new biographical information.

                                                                                                                 (Greenwald, 2012)


I think there need to be, more new start-up companies-that are not centered around California-that focus on online social media. I wonder, why other countries, have not developed more computer technology-the field in not that challenging. As a consumer-I want more choices.

2) Breach:

Disqus Confirms 2012 hack of the comment tools:


                           Disqus has confirmed its web commenting system was hacked. The company,

                           which builds and provides a web-based comment plugin for news websites.

                           About a third of those accounts contained passwords, salted and hashed using

                           the weak SHA-1 algorithm, which has largely been depreciated in recent years

                           in favor of stronger password scramblers. The data also contained sign-up dates

                           and the date of the last login. (Whittaker, 2017)


I think that someone normal-an American hacked Disqus. It is insulting to Americans, that online social networking websites, remove people's comments. Americans have a US Constitutional Right-that protects our ability to communicate.

3) Data Related to Technology and Relevant Security Breaches:


Industry: Internet and Online Social Networking


Company: Social Networking Start Up: Disqus


Type of Breach:

              "IIP Personal Information Breach" (University of California: IT, 2017).
"Hackers stole more than 17.5 million email addresses in a data breach in July 2012" (Whitaker, 2017).


Severity of Breach:


            "Some of the exposed user information dates back to 2007. Hunt added that 71 percent of email addresses were already in Have I Been Pwned's database of more than 4.7 billion records" (Whittaker, 2017). Have I Been Pwned-is an Intl “Black market”-for stolen information. It is illegal, to: buy, sell, or trade-"hot" stolen items-even on the Internet.


Violations:
                      Two states, Nevada and Minnesota, require Internet Service Providers to keep

                      private certain information concerning their customers, unless the customer gives

                      permission to disclose the information. Both states prohibit disclosure of personally

                      identifying information, but Minnesota also requires ISPs to get permission from

                      subscribers before disclosing information about the subscribers' online surfing

                      habits and Internet sites visited.

                      (US Government: NCSL: Privacy& Personal Info., 2017)


Only two states in the Union, have even attempted, to reinforce online: rules or regulations. The task, of policing the Internet, is soo incredibly difficult, and that is one of the main reasons, why-the WEB, is not really regulated.


Penalties:
                        Several states have introduced measures in response to the repeal of federal

                        Internet privacy protections that were approved by the Federal Communications

                        Commission in the final days of the Obama administration. The rules, which had

                        not yet gone into effect, would have put tough restrictions on what internet service

                        providers could do with consumer data collected. (US Government: NCSL

                        Privacy& Legislation., 2017)

 
On October 27, 2016, the US FCC, released new rules, to govern the safety of Internet use, and to further protect consumers, from: fraud, identity theft, hackers, and other activities-that, currently, and frequently now occur online.

           The new laws, that were issued, on October 27, 2016-were at the very end, on the Obama Administration: "FCC ADOPTS PRIVACY RULES TO GIVE BROADBAND CONSUMERS INCREASED CHOICE, TRANSPARENCY AND SECURITY FOR THEIR PERSONAL DATA" (Hart, 2016). Because the Internet, is relatively new territory, and not ruled by very many laws-it is extremely difficult, to reinforce penalties-when any crime at all-occurs on the Internet-particularly, through online social networking.

Technology and Security Breaches: 2013

1) Communication Technology: Temporary Social Media:


". . .While Snapchat promises to erase photos from its servers, the company’s privacy policy adds that it “cannot guarantee that the message data will be deleted in every case" (Rosen& Rosen, 2017). There are no benefits, to pretending, like information is not: “spidered,” and sorted, and collected, and stored-from online activity. Snapshot is not deleting the inappropriate communications or photos.

2) Security Breach: 2013:

A) Twitter Breach:


             "The company made. . . announcement of a data breach in February that exposed the usernames, email addresses and encrypted passwords of 250,000 users" (Rosen& Rosen, 2017). The US suffers data breaches, of a serious nature-daily. Nothing is secure in the US-really. As Americans, our information is everywhere-and then it is stolen, and the information is sold on the: “Black market.”


B) Zendesk Breach:


              "Despite all the technologies in place at organizations to protect user data, sometimes a third-party breach exposes information" (Rosen& Rosen, 2017). Third party, and other breaches happen all the time. There are companies all over the Internet-collecting, and cataloging, and posting lists on personal information online-it is illegal, and the information about you-is for sale. The US Feds, do nothing about the problem, and people are afraid, to complain, because US police, are already editing important and pertinent information out of our: Wiki pages, and other US government websites. America, is a police State. Thank God-we even have an Internet still!

3) Data Related to Technology and Relevant Security Breaches:


Industry: Online Social Networking: Start Up Internet Company:


Company:


      I) Twitter


      II) Zendesk


Breach:


       I) Twitter:

           "The company announced that it detected unusual network activity" (Rosen& Rosen, 2017). Twitter, and other online social networking companies-monitor client accounts too closely, and it is illegal. Twitter has hired enough employees-that people working for them, follow, every single letter that you type-of every single Tweet that you send. Twitter thinks every other Tweet I post, is unusual activity. I spend a great deal of time, on line, complaining about human rights abuses in the US. Twitter supports and Intl terrorist agenda.


       II) Zendesk:

             "Zendesk, which provides customer support messages to users of Twitter, Tumblr and Pinterest, announced a data breach in February that impacted its clients" (Rosen& Rosen, 2017). Information online, can never be safe-with soo many people handling the information. Online social networking companies, hire employees-from all over the world, and have headquarters-in most major cities, in other countries: London, France, Mexico City, etc.



Severity of Breach:


        I) Twitter:

             "We discovered one live attack and were able to shut it down in process moments later. However, our investigation has thus far indicated that the attackers may have had access to limited user information," wrote Bob Lord, director of information security at Twitter. "This attack was not the work of amateurs, and we do not believe it was an isolated incident."


        II) Zendesk:

            "The breach exposed thousands of email addresses and support messages from users of the services. Security experts said the email addresses were valuable to attackers because they could be used in well-designed phishing attacks to bait victims for more information" (Rosen& Rosen, 2017).


Violations:

            There is a violation of trust. Innocence is lost. There really are no reinforceable laws concerning the Internet-and an exposure of personal information. Only 2 State in the Union, tried to ratify laws, that would protect personal information-shared online. Mr. Obama, signed some new FFC laws into place-just before he left office, and because it was too close to his exit stage Left, the laws are unpopular, and therefore-with no political support-the laws have not been ratified, or reinforced.


Penalties:


         I) Twitter:

             "Twitter recently rolled out support for two-factor authentication to bolster the security of its user base" (Rosen& Rosen, 2017). The Twitter account verification, does not work. When Twitter kicks you out, for using your American right, to free speech-the two-system authentication, will not allow you to re-enter. There is such a thing, as too secure.


         II) Zendesk:

              Social Networking companies, from the US-do not follow US law. The online companies, operate in any ways and means-that they have deemed. The way in which US social networking companies operate, because it is outside, the guidelines of the US laws, and government: rules, and regulations-are operating illegally. Online social networking companies in the US-make decisions, regarding commentary, and information sharing-based on world politics. Most online social networking websites-from the US, if not all-illegally support: Intl Terrorism, and censor comments, from Americans.


          America, has a US Constitution, to protect American citizens-therefore, online Internet companies from the US, have no legal rights-to censor: "offensive commentary." There are almost rules or regulations, that can be enforced-on the Internet-however, the few that are enforceable, such as: no child porn, no children or slaves for sale online, no illegal or illicit drug sales online-happen all the time, and on the most popular online social networking websites. However, I am personally kicked out of Twitter-every 5 seconds, quite literally, for making negative comments about: "Gay rape sex."


         Anal rape, is an Intl Terror agenda, and no legally allowed in the US. I am kicked out f Twitter, for complaining about: prostitution in the US. Prostitution, is not legal in the US. I get kicked out of Twitter-to objecting to Gay marriage, and to Gay adoption-and I have a human right-in the US, to hold that political point of view. Twitter, and many other online social networking websites-refuse to respect, the US Constitution-and my: "Freedom of Speech." If there is a security breach, at an online social networking website-there really are no penalties, that can be reinforced.


             The online social networking company-can increase security measures, and-they can do almost anything else they want, as well-including selling the personal information, that you provide-while logged into their online social networking systems and servers. I do not believe-not for a minute, that any of the new: Snapshot data-is disappearing, I think it is being collected, and maintained, because that is how the Internet work. Snapshot, made you no promises. You should not have taken that picture!

Technology and Security Breaches: 2014

1) Communication Technology: immersive virtual worlds computer fantasy goggles:


                  "Oculus Rift Thirty years after virtual-reality goggles and immersive virtual worlds made their debut, the technology finally seems poised for widespread use" (Hardekopf, 2015). People who have larger expendable income, make purchases from high-end retail stores, like: Neiman Marcus and Sony. Employees, who work at name brand and designer stores, process credit cards with a higher available balance-generally. When a credit card with no-limit is stolen, it is worth much more, on the: “Black market.” America is rife with: liars and thieves. I think it would be dangerous to own a credit card-with, no limit.

2) Security Breach: 2014:

A) Neiman Marcus:


                  "In January, news broke of a card hack at Neiman Marcus where hackers accessed the debit and credit card information of customers who shopped at this chain between July 16, 2013 to October 30, 2013" (Hardekopf, 2015). Neiman Marcus, and other high-end stores-should be more careful, about who they hire, and how credit cards are processed. When people pay significantly more, for retail products-they logically expect, a better quality of product, and a better quality of service.


B) Sony:


                    "Data continues to come out about this November 24 Sony breach. The security firm Identity Finder found the hack exposed over 47,000 Social Security numbers, including over 15,000 current or former employees" (Hardekopf, 2015). A breach of personal information, is always a serious problem, for a consumer. A US Social Security card-is supposed to be well guarded-at-all-times. US Social Security office, is supposed to provide a new social security number-if yours is stolen, and, they refuse to do so.

          When a Social Security card is stolen, there are several government websites, that the identity theft can be reported to. You can also go into your local Social Security office-to request immediate action-to protect your identity. The US government, never responds, to any of the complaints, and the Social Security Office tells you-that the theft, is not serious-a lie.

3) Data Related to Technology and Relevant Security Breaches:


Industry
: High End Retail


Company:


A) Neiman Marcus;


B) Sony.


Type of Breach: Hackers:


            I) Neiman Marcus:

              "Only in-store customers were affected, not online transactions" (Hardekopf, 2015). You can never tell-really, if a person is telling you the truth. There are too many instances-especially in major companies, when people are more worried about the bottom line. US companies lie to the general public-all-of-the-time, to protect, their shares on Wall Street.


           II) Sony:

              "In early December, hackers leaked five unreleased movies online and some employees' Social Security numbers" (Hardekopf, 2015). Hacking, is not that difficult. Computer systems retain information. People choose not to protect their passwords. The passwords that are chosen-are easy to guess, if you know the person, and so on.


Severity of Breach:


            I) Neiman Marcus:

            "Originally, the company estimated that as many as 1.1 million cardholders could have been affected. But further investigation found that it affected a maximum of 350,000 customers. The breach occurred when malicious software was installed onto the Neiman Marcus system that collected payment card data from customers who made purchases during those dates" (Hardekopf, 2015). I think-when reporting information breaches, that it would be more helpful, to talk about the information breach affects people-and not just a guess, in regarding how much information was exposed.


            II) Sony:

              "In addition, these numbers appeared more than 1.1 million times on 601 publicly-posted files stolen by hackers. A significant number of files containing the Social Security numbers were accompanied by other personal information, such as full names, dates of birth and home addresses, increasing the chances of identity fraud" (Hardekopf, 2015). I think that breaching personal data, in mass numbers-is an act of Intl terrorism. Data breaches happens soo often in the US, and the impact is soo negative-that when an-individual-posts, the information publicly-it is obviously malicious, and vicious act against Americans.


Violations:


                  "Our office (Social Security Office) does not investigate the loss or theft of personal property including wallets and purses containing personal identification. If your wallet or purse containing your Social Security Card is stolen, contact your local police department immediately to file a theft report. You should also contact SSA directly at 1-800-772-1213 to request a replacement Social Security Card" (US Government: Social Security, n.d.). The local police, steal Social Security cards, and would-in reality, do nothing, to assist an individual, in recovering one.


Penalties:


                "If someone uses your Social Security number to obtain credit, loans, telephone accounts, or other goods and services, contact the Federal Trade Commission (FTC). The FTC collects complaints about identity theft from those whose identities have been stolen" (US Government: Social Security, n.d.). "Concerned about how a company is handling your personal information? Report concerns, use the identity theft category" (US Government: FTC, n.d.). I have contacted the FTC, several times, about stolen credit cards, and other government ID's-that were stolen, to protect my identity-and the FTC, never responded. There are a number of US government, and employees, like the: Department of Justice-which exist, and that, do absolutely nothing, for anyone.

Technology and Security Breaches: 2015

1) Communication Technology: Apple Pay: Pay from Your Cellphone:


             "A clever combination of technologies makes it faster and more secure to buy things with a wave of your phone" (Robert, 2017). With an increase in innovations, that utilize data transmissions, over WiFi-or WiFi accessible electronic devices, like cellphone, the security of your personal information decreases. In theory, a new fun electronic toy-is a welcome entertainment. In reality-another new way, to transmit information from your banking institution-has new, and added financial risks.

2) Security Breach: 2015: Experian/T-Mobile:


                           T-Mobile uses Experian to process its credit applications. Experian explained

                           the details on its Web site: The unauthorized access was in an isolated incident

                           over a limited period-of-time. It included access to a server that contained

                           personal information for consumers who applied for T-Mobile USA postpaid

                           services or products, which require a credit check, from Sept. 1, 2013 through

                           Sept. 16, 2015. (Ramanan, 2015)


Credit checks are mandatory for even small lines of credit in the US. Experian, is 1, of 3 major credit agencies. Due to the fact, that there are only 3 major credit checking agencies in the US-businesses, and consumers-have almost no choice about who they work with.

3) Data Related To Technology and Relevant Security Breaches:

Industry: Cellphone Communications and Banking/Credit Check Services


Company: T-Mobile and Experian


Type of Breach: 

            "Experian Plc (EXPN.L), the world's biggest consumer credit monitoring firm disclosed a massive data breach that exposed sensitive personal data of some 15 million people who applied for service with T-Mobile US Inc" (Ramanan, 2015). I think, that-because credit is important, and because there are risks attached to any transactions, that people need to make better informed decisions, regarding who they work with. Some companies, and some transactions-are safer than others.


Severity of Breach: 

             "No. of records compromised: 15 million people’s records" (Ramanan, 2015). There is no scale, for the severity of a secure information breach. Any number of records lost-over 1 million-must be severe.


Violations:

              "IIP Personal Information Breach" (University of California: IT, 2017). If a company breaches an agreement with you, to keep your personal data and information safe-you can report them, to the: Better Business Bureau (BBB) (BBB, 2017). I do not know, what the consequences are-if any, for filing a BBB report online?


Penalties:

              Information breaches, are soo common in the US-you take your chances. To remedy the situation, you can log online, and research various credit repair, and credit protection services. Chances are, that T-Mobile, and Experian-will inform clients, that they will increase their security measures. No penalties-will be levied, against either: T-Mobile or Experian.

Technology and Security Breaches: 2016:

1) Communication Technology: Intl Terror Target: FBI &Homeland Security: Hackers:


                   "Power from the Air: Internet devices powered by Wi-Fi and other telecommunications signals will make small computers and sensors more pervasive" (Harris, 2017). WiFi has passcodes, and people share WiFi passcodes, on the “Black market”-it is for sale, just like everything else.

             Additionally, there are programs-that help you, to hack WiFi passcodes. Every time, you log-on to a public WiFi website now, there is supposed to be a warning, regarding the vulnerability, of data being shared-over a public WiFi. It is interesting to me, that electronic devices-in the very near future, will be powered by WiFi-like power from the airwaves, and it also sounds like a security breach to me.

2) Security Breach: 2016:


Federal Bureau of Investigation, Department of Homeland Security:


                "In February, hackers threatened to, and ultimately did, dump the records of nearly 30,000 FBI and Department of Homeland Security workers" (Karunda, 2016). It is difficult to discern, when examining a data breach, how hackers accessed information. Many times, it is presumed, that the hackers, uploaded a: virus, or a worm, or utilized social engineering-and stole passwords themselves. Often times, hackers can steal information, by jumping on WiFi, and boarding the computers, and the servers themselves-remote access.

3) Data Related to Technology and Relevant Security Breaches:


Industry: US Secret Service


Company: US Federal Government


Type of Breach:

               Main Server Breach: "The records included personal information on around 9,000 DHS employees and around 20,000 FBI employees, including names, titles and contact information" (Karunda, 2016). It is dangerous for US Federal employees, to have their personal information breached. However, USSS-can arrest, for almost any reasons at all. If the culprits-who stole the Feds personal information-could be located, they could be arrested, for the terrorists, that they are-further protecting: America and American citizens, from Intl Terror.


Severity of Breach:

                "The hacker, which first reached out to Motherboard with the files, claimed he had access to even more files, totaling 200 GB" (Karunda, 2016). Information must be duplicated, for better preservation. Some people will steal anything. Vital Federal government information, needs to be saved on safe servers, outside of the US-not just in D.C..


Violations: Violation of Laws Protecting US Secret Service Employees


Penalties: USSS: United States Secret Service


                     . . . The Secret Service has evolved to serve a dual mission of investigating financial

                     crimes and providing protection for the president, vice president, their families, and

                    other political figures, both U.S. and foreign. Criminal investigations covered by the

                    Service include computer and telecom fraud, identity theft and financial institution

                    fraud - and recently, investigations into computer-based attacks on the nation’s

                    financial and informational infrastructure, often under the auspice of anti-terrorist

                    activities. (USSS, 2016)


The duties and obligations, of USSS-keep the President of the US safe. If President Trump, is discontent-with those sworn to take a bullet, for his protection-then, he should hire someone else. The US, is such a dangerous country, I am not able to agree, that President Trump is safer than me-just because he has USSS, watching over him. It is almost impossible to complain about anything in America. If something were wrong in the Whitehouse-in D.C., I seriously doubt, that President Donald Trump, would be able to complain about it. In America-you must keep yourself safe-I know the police never help anyone.

Technology and Security Breaches: 2017:

1) Communication Technology: Cyber Warfare: Major Internet Problem For US: 2017
Conversational System:

                           The current focus for conversational interfaces is focused on chatbots and

                           microphone-enabled devices (e.g., speakers, smartphones, tablets, PCs,

                           automobiles). However, the digital mesh encompasses an expanding set of

                           endpoints people use to access applications and information, or interact with

                           people, social communities, governments, and businesses. The device mesh

                           moves beyond the traditional desktop computer and multiple devices to

                           encompass the full range of endpoints with which humans might interact. As the

                           device mesh evolves, connection models will expand and greater cooperative

                           interaction between devices will emerge, creating the foundation for a new

                           continuous and ambient digital experience. (Microsoft, 2017)


I think that it is dangerous, to be too connected. When passwords are interchangeable, and when computer systems are all relying on each other, for information, and functioning-then, it is much easier-to take down an entire country-with a devastating cyber war.

2) Security Breach: Intl Terror Attack: Cyber Warfare: Predicted, or Real and Here? 

 
               "Nation-state cyber-attacks will move from espionage to war. Experian predicts that cyber conflicts between nation-states will escalate from espionage to cyber-warfare in 2017" (Olavsrud, 2017). The acrimony, between Americans, and the new immigrants who support Intl Terror is growing. Intl Terror, fly though the US, and often times-now, call US homes.

                I agree-that a cyber war, would be more peaceful-however, I have serious concerns, as to whether a cyber war, could ever resolve any disagreements. War aspects-it seems to lead to further agitation, and more war-not: Peaceful Negotiations, and World Peace.

3) Data Related to Technology and Relevant Security Breaches:


Industry: Department of Defense: Pentagon:


             Experian notes that when the issue of state-sponsored cyber-attacks came up during the recent U.S. presidential campaign, both candidates said they would favor using cyber weapons to retaliate, leading Experian to predict an escalation in cyber-attack conflict in 2017. These conflicts will tend to leave consumers and businesses as collateral damage. (Olavsrud, 2017)
It is the obligation, of the US Pentagon, to keep America safe, with the war machines. Has the US Pentagon agreed to wage a cyber war-against Intl Terror, and if so, then it requires a formal announcement, to the general public-just like any other deadly exchange.


Company: United States Government:


              " 'The progression of cyber-attacks driven by nation-states will undoubtedly place critical infrastructure in the crosshairs, potentially leading to widespread outages or exposed personal information that could impact millions of innocent consumers,' the report said" (Olavsrud, 2017). Cyber war, is generally not violent, it is only malicious, and frustrating. Cyber war, is a fast and quick war-if done the wrong way, to engage in fraudulent acts-that would cause one to be classified as a felon.


Type of Breach: Cyber Attack, Massive Breach of Info. & Attack of US Internet, Computer, Server, WAN/LAN, Website-systems.


Severity of Breach:


                             Experian recommends companies address this threat by participating in their

                             respective Information Sharing and Analysis Center (ISAC) to share cyber

                             threat information with peers and national defense organizations. Additionally,

                             businesses &8212; especially businesses involved in critical infrastructure —

                             should prepare for full-on disruption. Proactive steps could involve purchasing

                             insurance protection and shoring up security measures against large-scale

                             disruptions. (Olavsrud, 2017)


Preventative measures, are always important. However, Cyber war, is unpredictable-or it would not be effective. A pre-emptive strike, is preferable, to a response focus-solely on defense, if an enemy is preparing to attack.


Violations: Espionage, Treason, Intl Terror


Penalties: Gitmo, Death Penalty





Identify the library databases used for research of IAS breaches:



Capella Online Library and Databases Available for: IAS Security Research-Breaches:





















Homeland Security Digital Library: https://www-hsdl-org.library.capella.edu/c/



































Identify the academic research techniques used to locate academic and non-academic sources:



·         Search various online OCLC Academic Research Databases;

·         Change the search terms;

·         Use Boolean Connectors: and, or, etc.;

·         Read through articles, with related materials, to search, for: “key terminology;”

·         Search through a wide variety of online, and offline, research materials: Internet, books, newspaper, magazines, etc.;

·         Include: personal interviews, emails, and other information sources-like MP3 sound recordings.



Online Resources: Regulating Bodies:








Office of the Comptroller of the Currency: https://www.helpwithmybank.gov/national-banks/national-banks.html



Definitions:


Personal Identity Information (PII):


                      Personal identity information (PII) is unencrypted computerized information that

                      includes an individual’s first name or initial, and last name, in combination with

                      any one or more of the following:


                              1) Social Security number (SSN);
                              2) Driver’s license number or State-issued Identification Card number;
                              3) Account number*-credit card number, or debit card number in combination

                                 with any required security code, access code, or password such

                                 as expiration date or mother’s maiden name that could permit access

                                 to an individual’s financial account;
                              4) Mental or physical condition;

                              5) Medical treatment or diagnosis by a health care professional;
                              6) Health insurance information, including an;

                              7) Individual’s health insurance policy number or

                                  subscriber identification number, any unique identifier

                                  used by a health insurer to identify the individual, or;

                              8) Any information in an individual’s application and claims

                                  history, including any appeals records. (University of California: IT, 2015)

Restricted Data:


               “Restricted data”: “Any confidential or personal information that is protected by law or policy and that requires the highest level of access control and security protection, whether in storage or in transit” (University of California: IT, 2015).

                                                           References

ABI/INFORM. (2017). ABI/INFORM. Capella Proquest Database Collection. Retrieved from
https://search-proquest-com.library.capella.edu/abicomplete/advanced?accountid=27965



ACM Digital Library. (2017). ACM Digital Library. Capella ACM Digital Library Database Collection. Retrieved from https://dl-acm-org.library.capella.edu/advsearch.cfm



Better Business Bureau (BBB). (2017). Start with Trust. Better Business Bureau: An ethical marketplace where buyers and sellers trust each other. Retrieved from https://www.bbb.org/en/us/


Compliancy Group: HIPPA Violations and Breaches. (2017). HIPPA Fines Listed by Year. Compliancy Group: HIPPA Done Right. Retrieved from
https://compliancy-group.com/hipaa-fines-directory-year/



Computers and Applied Sciences. (2017). Computer and Applied Sciences Database. Capella EBSCOhost. Retrieved from http://web.b.ebscohost.com.library.capella.edu/ehost/search/advanced?vid=0&sid=bc715d34-60d1-4913-a17a-80befcc809e1%40sessionmgr102



Computing Database. (2017). Computing Database. Capella Proquest Database. Retrieved from  https://search-proquest-com.library.capella.edu/computing/advanced?accountid=27965


Fletcher, Dan. (2010). The 50 Best Inventions of 2010. Time. Retrieved from
http://content.time.com/time/specials/packages/article/0,28804,2029497_2030652_2029803,00.html


Gale Virtual Reference Library. (n.d.). Gale Virtual Reference Library. Capella Gale Virtual Reference Library Database. Retrieved from
http://go.galegroup.com.library.capella.edu/ps/start.do?p=GVRL&u=minn04804&authCount=1



Greenewald, Ted. (2012). Facebook's Timeline. MIT Technology Review. Retrieved from
http://www2.technologyreview.com/news/427678/facebooks-timeline/


Google Scholar. (n.d.). Google Scholar. Capella Google Scholar Database. Retrieved from
https://scholar-google-com.library.capella.edu/



Hardekopf, Bill. (2015). Forbes: Worst Data Breaches of 2014. Forbes: Worst Data Breaches of 2014. Retrieved from https://www.forbes.com/sites/moneybuilder/2015/01/13/the-big-data-breaches-of-2014/#6bbd3cacefe6


Harris, Mark. (2017). Power from The Air. MIT Technology Review. Retrieved from
https://www.technologyreview.com/s/600773/10-breakthrough-technologies-2016-power-from-the-air/


Hart, Kim. (2016). FCC ADOPTS PRIVACY RULES TO GIVE BROADBAND CONSUMERS INCREASED CHOICE, TRANSPARENCY AND SECURITY FOR THEIR PERSONAL DATA. Retrieved from
http://www.ncsl.org/research/telecommunications-and-information-technology/privacy-legislation-related-to-internet-service-providers.aspx


Homeland Security Digital Library. (n.d.). Homeland Security Digital Library. Capella Homeland Security Digital Library Database. Retrieved from
https://www-hsdl-org.library.capella.edu/c/






IGI Global Info. Sci. Videos. (1998-2017). IGI Global Info. Sci. Capella IGI Global Info. Sci. Database. Retrieved from https://www-igi-global-com.library.capella.edu/gateway/search/?btid=136



Irwin, Angela, S. M.& Milad, George. (2016). The use of crypto-currencies in funding violent jihad. Journal of Money Laundering. Vol. 19, No. 4. Retrieved from DOI 10.1108/JMLC-01-2016-0003



International Security Center and Counter Terrorism Reference Center. (2017). International Security Center and Counter Terrorism Reference Center. Capella EBSCO host. Retrieved from http://web.a.ebscohost.com.library.capella.edu/ehost/search/advanced?vid=0&sid=900173ae-b78d-416e-8762-1458d5021bd0%40sessionmgr4010



Karunda, Sarah. (2016). The 10 Biggest Security Breaches For 2016. CRN. Retrieved from http://www.crn.com/slide-shows/security/300081491/the-10-biggest-data-breaches-of-2016-so-far.htm



LearnTechLib. (n.d.) LearnTechLib. Capella host. Retrieved from https://www-learntechlib-org.library.capella.edu/



Library, Information Science and Technology Abstracts. (2017) Library, Information Science and Technology Abtracts. Capella EBSCO host. Retrieved from https://www-learntechlib-org.library.capella.edu/


MacRae, Michael. (2013). Top 5 Medical Technology Innovations. ASME: The American Society of Mechanical Engineers. Retrieved from
https://www.asme.org/engineering-topics/articles/bioengineering/top-5-medical-technology-innovations2



Matwyshyn, Andrea M. (2009). CSR and the Corporate Cyborg: Ethical Corporate Information Security Practices. Journal of Business Ethics. Vol. 88. p. 579-594. DOI 10.1007/s10551-009-0312-9

 
Microsoft. (2017). Technology Trends for 2017. IT Business Trends. Retrieved from
http://www.itbusinessedge.com/slideshows/top-10-strategic-technology-trends-for-2017.html



Military Database. (2017) Military Database. Capella Proquest host. Retrieved from https://search-proquest-com.library.capella.edu/military/advanced?accountid=27965


Olavsrud, Thor. (2017). 5 Data Breach Predictions 2017. CIO from IDG. Retrieved from
https://www.cio.com/article/3155724/security/5-data-breach-predictions-for-2017.html



Phifer, Lisa. (2011). Top 10 Data breaches: 2010. eSecurity Planet. Retrieved from
https://www.esecurityplanet.com/views/article.php/3921656/Top-10-Data-Breaches-of-2010.htm



Proquest Central. (2017) Proquest Central. Capella Proquest host. Retrieved from https://search-proquest-com.library.capella.edu/central/advanced?accountid=27965


Ramanan, Sai. (2015). Forbes: Top 10 Security Breaches of 2015. Title of Online Periodical. Forbes. Retrieved from
https://www.forbes.com/sites/quora/2015/12/31/the-top-10-security-breaches-of-2015/#570fdb5140d6


Robert, Hof. (2017). Ten Breakthrough Technologies (2015). MIT Technology Review. Retrieved from
https://www.technologyreview.com/s/535001/apple-pay/


Rosen, Christine& Rosen, Jeffrey. (2017). Temporary Social Media Messages that quickly self-destruct could enhance the privacy of online communication and make people feel freer to be spontaneous. MIT Technology Review. Retrieved from
https://www.technologyreview.com/s/513731/temporary-social-media/



Sage Journals Online. (2017). Sage Journals Online. Capella host Sage Journals. Retrieved from http://journals.sagepub.com.library.capella.edu/search/advanced


Schwartz, Mathew J. (2011). 6 Worst Data Breaches of 2011. The Dark Room. Retrieved from
https://www.darkreading.com/attacks-and-breaches/6-worst-data-breaches-of-2011/d/d-id/1102001



Skillsoft. (2017) Skillsoft Library. Capella host Skillsoft. Retrieved from https://capella.skillport.com/skillportfe/main.action#browsecatalog

Social Security Administration Pamphlet. (2017). Identity Theft and Your Social Security Number: Securing Today and Tomorrow. SSA United States Government Publications. Publication No. 05-10064



Telecommunications Database. (2017). Telecommunications Data. Capella Proquest host. Retrieved from https://search-proquest-com.library.capella.edu/telecomms/advanced?accountid=27965


University of California: Santa Cruz. (2015). Information Technology Services. University of California: Santa Cruz: University Home: Security: Breaches. Retrieved from
https://its.ucsc.edu/security/breaches.html


University of California: Santa Cruz. (2015). PCI-DSS Security Penalties. University of California: Santa Cruz: University Home: Security: Penalties. Retrieved from
https://financial.ucsc.edu/Pages/Security_Penalties.aspx


US Government. (n.d.). FDIC: Federal Deposit Insurance Corporation. Retrieved from
https://www.fdic.gov/


US Government: FTC. (n.d.). Federal Trade Commission: Protecting Americas Consumers. Retrieved from
https://www.ftc.gov/



US Government. (n.d.). Internal Revenue Service. Retrieved from https://www.irs.gov/


US Government. (n.d.). Interstate Technology and Regulatory Council. Retrieved from
http://www.itrcweb.org/


US Government. (n.d.). NCUA: National Credit Union Association. Retrieved from
https://www.ncua.gov/Pages/default.aspx



US Government. (n.d). Securities Exchange Commission. Retrieved from
https://www.sec.gov/


US Government. (n.d.). The Feds: Board of Governors Federal Reserve. Retrieved from
https://www.federalreserve.gov/foia/about_foia.htm


US Government. (n.d.). Who Regulates My Bank. Retrieved
https://www.helpwithmybank.gov/national-banks/national-banks.html


US Government: NCSL. (2017). Privacy of Personal Information Held by Internet Services. Retrieved from
http://www.ncsl.org/research/telecommunications-and-information-technology/state-laws-related-to-internet-privacy.aspx#ISPs


US Government: NCSL. (2017). Privacy Legislation Related to Internet Providers. Retrieved from
http://www.ncsl.org/research/telecommunications-and-information-technology/privacy-legislation-related-to-internet-service-providers.aspx


US Government: OIG. (n.d.). Office of The Inspector General: Social Security Administration. Retrieved from
https://oig.ssa.gov/report-fraud-waste-or-abuse/what-cant-oig-investigate


United States Secret Service. (2016). United States Secret Service (USSS). ALL Gov: Everything Our Government Really Does. Retrieved from
http://www.allgov.com/departments/department-of-homeland-security/united-states-secret-service-usss?agencyid=7355


Whittaker, Zack (2017). Disqus Confirms 2012 hack of the comment tools. Zero Day Net. Retrieved from
http://www.zdnet.com/article/disqus-confirms-comments-tool-hacked/



Worldcat.org. (2001-2017). OCLC Worldcat.org. Capella Worldcat.org host. Retrieved from http://www.worldcat.org/




·Other Apps

Comments

Popular posts from this blog

Unit 8 Assignment-Locked Out of Group Chat-Forced To Work Alone-Dr. Susan Ferebee-Capella University-Trying To Illegally Flunk Me!

Complaint RE: Dr. Susan Ferebee: Flunking Me-After an IP Address Lock Out, to: Academic Coach: Scribner at Capella University

Unit 2 Discussion 2