The Nexus: Technology and Security Violations/Breaches: A Re-Structed, Re-Write
Technology Evolution,
and The Dangers
for IT Security, Inherent-
with the Growth: “Risk”
Research Paper, By: Miss. Bayo Elizabeth Cary, AA, BA,
MLIS
Capella University, IAS1005
November 10, 2017
Re-Write/Re-Structure: Final Submit
Professor: Dr. Susan Ferebee
Miss.
Bayo Elizabeth Cary, AA, BA, MLIS
400 NW
1st Avenue, Apartment: 410
Gainesville,
FL 32601
Email:
bai_o@yahoo.com
November
7, 2017
Permission,
as per instructor: Rewrite, Re-submission:
Unit 1 Capella University Final
From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS
Assignment Directions:
- Building IAS Library Research Skills
For
most, returning learners, research and information literacy skills take time to
cultivate. You will continue to develop and refine these skills throughout your
program. This assignment allows you to practice and improve on your current
skills by providing an opportunity for you to review academic and non-academic
Information Assurance and Security (IAS)–related sources related to digital
forensics, network defense, and health care security. To assist you and provide
areas of improvement, complete the Research and Information Literacy Skills (RAILS),
Library Research Knowledge Assessment, study activity found in this
unit.
For
this assignment, you will review the Communication and Collaboration Timeline
media that presents past information technology advances, along with specific
information security breaches. You are to review the timeline, which ends at
the year 2008. Based on your review of the RAILS study activity, you are to
provide the following:
·
Provide a new communication
technology (can be a type of communication channel, type of application, type
of social media, etc.) for each year from 2010 to the present;
·
Provide an instance of a security
breach for each year, 2010 to the present, and each communication
technology.
·
Identify the industry, company, type
of breach, severity of breach, type of violation(s) and type of penalty or
penalties associated with each breach listed above.
·
Identify the academic research
techniques used to locate academic and non-academic sources.
As
corporate assets have progressively shifted toward intangibles over tangibles, the
value of these assets has become
increasingly contingent on the security
of
the systems housing corporate information.
(Matwyshyn, 2009, p. 579)
Technology
and Security Breaches: 2010
1) Communication Technology:
1) Communication Technology:
The
Square (Collect Banking Credit Card for Payment):
There might not be a piece of tech more due for an update than the cash register.
Enter
Square, a payment platform created by Twitter co-founder Jack Dorsey. With
the
aid of a tiny magnetic card reader that attaches to a smart phone, Square lets
anyone process credit
cards. It might not do away with paper entirely — plenty of
people still prefer cash
— but you certainly don't need to wait for a receipt: sign on
the screen, and Square
sends a copy straight to e-mail. (Fletcher, 2010)
Terrorists fund their activities,
with illegal money: “Black money.” The money used to finance terrorism, is
obtained through the support, of illegal and illicit activities, i.e.: betting,
stealing, money laundering, espionage, slave trading, human trafficking, child
pornography, etc. (Irwin& Milad, 2016, p. 407-408.) Stealing money, when
data exchanges are made, through various means, such as online, or-with a new
collection device, like: The “Square,” is a main way, in which Intl terror, are
able to prosper, and to support themselves-when adamantly opposed, by any given
Intl government.
2) Related: Security Breach: Citigroup Bank (Banking Information Breach):
2) Related: Security Breach: Citigroup Bank (Banking Information Breach):
A) Lincoln National Financial Securities: Password management of accounts breach:
Not only did Lincoln National
mistakenly print a username and password in a brochure
posted on a public website, but it let
employees and affiliates share usernames and
passwords. Unfortunately, those
credentials belonged to a portfolio information system
housing data for 1.2 million customers.
(Phifer, 2011).
Identity theft, is the primary
means, by which, a perpetrator gains access, to: private,
confidential-otherwise, secure, banking, and other personal information (SSA
Pamphlet, 2017, p. 1). In, 2013, I was false arrested by US police, in Seattle,
WA. I was arrested, for complaining about a prostitute, at a bus stop, smoking
crack, and-for, having in my possession, a can-opener. The Seattle, WA,
attacked me, and tried to beat-me-to-death, several times, for having the
can-opener, concealed, and in my possession, the officers, pretended like the
can-opener, was a weapon. I was illegally taken to a substation-where my
Miranda Rights were denied, the police stole all-of-my personal ID, my: college
ID cards, SS card, food stamp card, bank cards, and welfare benefits card.
US police in Seattle, WA, were the
first group of US police to break my left wrist, my back was severely injured,
and my left kidney punctured-I suffered internal bleeding, and, I have never
recovered. The judge, at the Seattle, WA downtown 5th Avenue
jail-where I was illegally detained: Lynch, refused to grant me my Miranda
Rights, or clinic attention-on record. I was illegally held for 3 days, at the
jail, in solitary confinement, because inmate intake, at the jail said, that I
had: illogical, unreasonable, and unhealthy fears, about being raped, at a US
institution-I read the Florida Bar journal, I know what happens at US
correctional institutions.
My back has never recovered, and US
police, just broke my left wrist again, for trying to leave the US, for
Emergency political asylum, and medical care in Europe: Iceland/Ireland-after
they stole my passport, at a Washington, DC airport. My back causes me, severe,
and chronic acute pain. US police in Seattle, WA-refused to return to me, the
personal documents, and ID cards-financial and otherwise, that they stole from
me. I reported the situation, to a-number-of US government agencies-not limited
to: FTC, Social Security office, and the FBI, and CIA-not even my SS number was
changed.
B)
CitiGroup: Human Error/Fraud:
Ultimately, many breaches are still the
result of human over-sight or error. Even though
these SSNs were printed in a way
that resembled mail routing numbers and may not
have resulted in actual identity
thefts, this shows how even a highly-regulated company
with rigorous data handling
processes can still shoot itself in the foot in a fairly big way
(Phifer, 2011).
The Social Security Administration,
of the United States, prints pamphlets, with US tax payer money, to provide
free information, to Americans, regarding the ways in which, a perpetrator, may
illegally gain access, to your personal identification information (SSA
Pamphlet, 2017, p. 2).
There are a-number-of steps, that any
given individual can take, to protect personal information. However, when US
police, attack you-like they did me, and place a gun to your head, after trying
to beat-you-to-death-to steal all-of-your personal identifying information.
There ultimately, is nothing you can do-when US police illegally use, their gun
and badge-except to pray, that when you book a flight, for a safer country,
that they will not attack you again-like they did me, and at the airport-to
steal, your passport too.
3) Data Related to Technology and Relevant Security Breaches:
3) Data Related to Technology and Relevant Security Breaches:
Industry: Financial
Company: Banking: Lincoln National and Citi Bank
Type of Breach: PII Information Storage and Transmission Breach:
I) Lincoln Financial: "Information loss from mishandling of private personal access
codes and passwords" (Phifer, 2011).
II) Citi Bank: "Human error-due to extent of loss-indication of employees
engaging in White Collar Crime: Fraud" (Phifer, 2011).
Severity of Breach:
I) Lincoln Financial: "This single incident accounts for nearly all the records breached by insider access during 2010 – but most other insider breaches were reported as having unknown record impact. According to the ITRC, just 51 percent of all breaches report number of records exposed, making it hard to assess their severity (Phifer, 2011)."
II) Citi Bank: "For example, approximately 600,000 CitiGroup were sent annual tax documents that had Social Security numbers printed on the outside of the envelope (Phifer, 2011)."
Types of Violations:
Violation: "Insecure storage or transmission of PII and other sensitive information (University of California: IT, 2015).
Penalties: There are penalties for PCI non-compliance (University of California: PCI-DSS, 2015):
‘The Payment Card Industry, has established fines of up to $500,000 per incident
for security breaches
when merchants are not PCI compliant. In addition, it is
required that all individuals whose
information is believed to have been
compromised must be
notified in writing to be on alert for fraudulent charges. As
such, the potential cost
of a security breach can far exceed $500,000 when the cost
of customer notification
and recovery is calculated.’
(University of California:
PCI-DSS, 2015):
1) Potential
cost of a security breach:
2) Fines of $500,000 per incident for being PCI non-compliant;
3) Increased audit requirements;
4) Potential for campus wide shut down of credit
2) Fines of $500,000 per incident for being PCI non-compliant;
3) Increased audit requirements;
4) Potential for campus wide shut down of credit
card
activity by your bank;
5) Cost of printing and postage for customer notification mailing;
6) Cost of staff time (payroll) during security recovery;
7) Cost of lost business during register or store
5) Cost of printing and postage for customer notification mailing;
6) Cost of staff time (payroll) during security recovery;
7) Cost of lost business during register or store
closures
and processing time;
8) Decreased sales due to marred public image and
8) Decreased sales due to marred public image and
loss of customer confidence.
(University
of California: PCI-DSS, 2015)
Technology and Security Breaches: 2011
1) Communication Technology:
Technology and Security Breaches: 2011
1) Communication Technology:
Telemedicine:
Robotic Check-Ups:
Technology is a cost-effective an increasingly potent means to connect clinics in
the
vast and medically underserved rural regions of the United States with big
city medical centers and their
specialists as a tool for triage and assessment in
emergencies, but new medical robots go one
step further—they can now patrol
hospital hallways on more routine rounds,
checking on patients in different
rooms and managing their individual charts and
vital signs without direct human
intervention. (MacRae, 2013)
Technology is intended to improve lives-purportedly. Medicine from a distance-could be scary. I understand, that there are situations, whereby, a medical professional is not available, however, in my opinion, the long distance medical robot-is too unfavorable. If you are not able to care for own medical needs, then I think you should stay in a well populated area. You have to be competent, and responsible for your own needs.
2) Security Breach: 2011:
A) Sutter Physicians Services: “Data from both Sutter Physicians Services and Sutter Medical Foundation was breached in November 2011 (Schwartz, 2011)."
B) Tricare and SAIC: "In September, backup tapes containing SAIC (Science Applications International Corporation) data were stolen from the car of a Tricare employee (Schwartz, 2011)."
3) Data Related to Technology and Relevant Security Breaches:
Industry: Medical Financial: Billing and Fund-Raising Services:
Company:
I) Sutter Physicians Services;
II) Tricare and SAIC.
Type of Breach:
"IIP Information Storage and
Transmission Breach (University of California: IT, 2015)." On college
campuses, Universities in the US, try to reinforce information breaches-I do
not know that it is possible. There is a warning, about keeping your
information, as private as possible, and then what happens-when the information
is breached, is what always happens. There really is not resolution the
situation. Private information-that has been exposed is useless, and the US
never replaces Social Security numbers-not that I am aware of.
I) Sutter Physicians Services: . . ."A thief stole a desktop computer from the organization, which contained about 3.3 million patients' medical details--including name, address, phone number, email address and health insurance plan name--stored in encrypted format" (Schwartz, 2011); IT information-is stolen every day in the US. I think it is a problem, that Americans continue to pretend, like anything IT-can be kept private. US police steal my: computers, laptops, servers, flash drives, memory cards, cell phones, digital cameras, Photo ID cards, Social Security cards, Welfare benefits card, food stamp card-you name it, if it is related to personal information-police in the US steal it.
II) Tricare and SAIC: IIP data breach, ". . .Data related to current and retired members of the armed services, as well as their families" (Schwartz, 2011). Military personnel, are in a more vulnerable position in the US-than most of the rest of us. There are a-large-number of immigrants in the US, who are actively supporting Intl Terror. Members of our US military, and secret service government employees, have far more to be concerned about when it comes to data breach issues: phone number, home address, family members, etc. Intl Terror illegally target honest, and hard-working members of our US military and government.
Severity of Breach:
I) Sutter Physicians Services: "The security lapse occurred on two levels: both the data itself (being unencrypted) and the physical location (stored in an unsecure location)," according to the PRC report" (Schwartz, 2011); I have found, that when it comes to keeping data perfectly safe-then, I need to hand deliver it. If I wrote everything down, if I talked about everything-then, nothing about would be private. Some people, will take your everything-and then leave you dying in the dirt, right outside your own home-I know, it is happening to me. I am an American-what do I have? Nothing.
II) Tricare and SAIC: "The breach led to a $4.9 billion lawsuit being filed, which aims to award $1,000 to each of the 5.1 million people affected by the breach" (Schwartz, 2011):
The Tricare/SAIC breach is significant because not only are the victims at risk
of medical
identity theft, but financial identity theft as well. The breach begs
several
questions: Why were the backup tapes being transported in an
employee's
personal vehicle? And why were those records not encrypted?"
(Schwartz,
2011)
When there are: rules, laws, and regulations-then those are just guidelines, to help people learn what the rules are. When people refuse to follow the law, or to reinforce the law-then, the fact that something is in writing, is on absolutely no help. America is a failed country, and a police State. You could call the police, and chances are-they will make your situation worse, they my even kill you, for your laptop!
Violations:
HIPPA Violations for both Companies, handling private and secure medical patient’s information.
Penalties:
Sutter Physicians Services: "A class-action lawsuit lodged against the companies alleged that they also failed to inform affected patients about the breach in a timely manner" (Schwartz, 2011); HIPPA violations, happen every day. I find it very hard to believe, that it is possible to sue over the issue. People who work in hospitals-talk about anything. In my opinion-based on my own painful experiences-nothing is private in the US.
Tricare and SAIC: HIPPA Penalties Apply. I think, that is the HIPPA penalties, could be reinforced-people everywhere, would be suing. I, took HIPPA training myself. I took the guidelines seriously, and would not have breached anyone's personal information. However, my experience has been-that the new immigrants to the US, those supporting Intl Terror, are always dishonest. If something were important to me-information or anything else, I would not trust anyone else, with that: information, etc.
Penalties Continued: HIPAA Violation and Penalty Payment-Criminal Charges Are Also Possible:
HIPAA violations cost your practice. The federal fines for noncompliance are
based on the
level of perceived negligence found within your organization at
the time of the
HIPAA violation. These fines can range from $100 to $50,000
per violation (or per
record), with a maximum penalty of $1.5 million per year
for each
violation. OCR has also levied criminal charges for HIPAA
violations in the
past. (Compliancy Group, 2015)
When there are no reinforceable penalties-then people will speak to you in any way, and will treat you in the most disdainful ways. America is a nightmare. There are people here, who support Intl terror, from all over the world, and there is no one to complain to-if a US law is broken. US police never respond. The Feds, take a message, and never get back-to-you.
Technology and Security Breaches: 2012:
1) Communication Technology:
Social
Media: Facebook Timeline: Significantly Increased Data Collections Online:
In the past, much of the data that users contributed to Facebook was in the form
of unstructured status
updates. The addition of a “Like” button, and the ability to
link that button to
third-party websites (Social Indexing: May/June 2011),
provided somewhat more
fine-grained information that could be used for
targeting ads.
Timeline goes well beyond that, prompting users to add an
extensive array of
metadata to their updates, which makes mining value much
easier. And by design,
it encourages users to revisit and add more information to
old updates, or retroactively add
completely new biographical information.
(Greenwald, 2012)
I think there need to be, more new start-up companies-that are not centered around California-that focus on online social media. I wonder, why other countries, have not developed more computer technology-the field in not that challenging. As a consumer-I want more choices.
2) Breach:
Disqus
Confirms 2012 hack of the comment tools:
Disqus has confirmed its web commenting system was hacked. The company,
which
builds and provides a web-based comment plugin for news websites.
About a
third of those accounts contained passwords, salted and hashed using
the weak SHA-1 algorithm, which has largely
been depreciated in recent years
in favor of stronger
password scramblers. The data also contained sign-up dates
and the date of the
last login. (Whittaker, 2017)
I think that someone normal-an American hacked Disqus. It is insulting to Americans, that online social networking websites, remove people's comments. Americans have a US Constitutional Right-that protects our ability to communicate.
3) Data Related to Technology and Relevant Security Breaches:
Industry: Internet and Online Social Networking
Company: Social Networking Start Up: Disqus
Type of Breach:
"IIP Personal Information
Breach" (University of California: IT, 2017).
"Hackers stole more than 17.5 million email addresses in a data breach in July 2012" (Whitaker, 2017).
"Hackers stole more than 17.5 million email addresses in a data breach in July 2012" (Whitaker, 2017).
Severity of Breach:
"Some of the exposed user information dates back to 2007. Hunt added that 71 percent of email addresses were already in Have I Been Pwned's database of more than 4.7 billion records" (Whittaker, 2017). Have I Been Pwned-is an Intl “Black market”-for stolen information. It is illegal, to: buy, sell, or trade-"hot" stolen items-even on the Internet.
Violations:
Two states, Nevada and Minnesota, require Internet Service Providers to keep
private certain
information concerning their customers, unless the customer gives
permission to disclose the information. Both
states prohibit disclosure of personally
identifying information,
but Minnesota also requires ISPs to get permission from
subscribers before
disclosing information about the subscribers' online surfing
habits and Internet sites visited.
(US Government: NCSL:
Privacy& Personal Info., 2017)
Only two states in the Union, have even attempted, to reinforce online: rules or regulations. The task, of policing the Internet, is soo incredibly difficult, and that is one of the main reasons, why-the WEB, is not really regulated.
Penalties:
Several states have introduced measures in response to the repeal of federal
Internet privacy protections that were
approved by the Federal Communications
Commission in the final
days of the Obama administration. The rules, which had
not yet gone into
effect, would have put tough restrictions on what internet service
providers could do with consumer data
collected. (US Government: NCSL
Privacy&
Legislation., 2017)
On October 27, 2016, the US FCC, released new rules, to govern the safety of Internet use, and to further protect consumers, from: fraud, identity theft, hackers, and other activities-that, currently, and frequently now occur online.
The new laws, that were issued, on
October 27, 2016-were at the very end, on the Obama Administration: "FCC
ADOPTS PRIVACY RULES TO GIVE BROADBAND CONSUMERS INCREASED CHOICE, TRANSPARENCY
AND SECURITY FOR THEIR PERSONAL DATA" (Hart, 2016). Because the Internet,
is relatively new territory, and not ruled by very many laws-it is extremely
difficult, to reinforce penalties-when any crime at all-occurs on the
Internet-particularly, through online social networking.
Technology and Security Breaches: 2013
1) Communication Technology: Temporary Social Media:
Technology and Security Breaches: 2013
1) Communication Technology: Temporary Social Media:
". . .While Snapchat promises to erase photos from its servers, the company’s privacy policy adds that it “cannot guarantee that the message data will be deleted in every case" (Rosen& Rosen, 2017). There are no benefits, to pretending, like information is not: “spidered,” and sorted, and collected, and stored-from online activity. Snapshot is not deleting the inappropriate communications or photos.
2) Security Breach: 2013:
A) Twitter Breach:
"The company made. . . announcement of a data breach in February that exposed the usernames, email addresses and encrypted passwords of 250,000 users" (Rosen& Rosen, 2017). The US suffers data breaches, of a serious nature-daily. Nothing is secure in the US-really. As Americans, our information is everywhere-and then it is stolen, and the information is sold on the: “Black market.”
B) Zendesk Breach:
"Despite all the technologies in place at organizations to protect user data, sometimes a third-party breach exposes information" (Rosen& Rosen, 2017). Third party, and other breaches happen all the time. There are companies all over the Internet-collecting, and cataloging, and posting lists on personal information online-it is illegal, and the information about you-is for sale. The US Feds, do nothing about the problem, and people are afraid, to complain, because US police, are already editing important and pertinent information out of our: Wiki pages, and other US government websites. America, is a police State. Thank God-we even have an Internet still!
3) Data Related to Technology and Relevant Security Breaches:
Industry: Online Social Networking: Start Up Internet Company:
Company:
I) Twitter
II) Zendesk
Breach:
I) Twitter:
"The company announced that it
detected unusual network activity" (Rosen& Rosen, 2017). Twitter, and
other online social networking companies-monitor client accounts too closely,
and it is illegal. Twitter has hired enough employees-that people working for
them, follow, every single letter that you type-of every single Tweet that you
send. Twitter thinks every other Tweet I post, is unusual activity. I spend a
great deal of time, on line, complaining about human rights abuses in the US.
Twitter supports and Intl terrorist agenda.
II) Zendesk:
"Zendesk, which provides
customer support messages to users of Twitter, Tumblr and Pinterest, announced
a data breach in February that impacted its clients" (Rosen& Rosen,
2017). Information online, can never be safe-with soo many people handling the
information. Online social networking companies, hire employees-from all over
the world, and have headquarters-in most major cities, in other countries: London,
France, Mexico City, etc.
Severity of Breach:
I) Twitter:
"We discovered one live
attack and were able to shut it down in process moments later. However, our
investigation has thus far indicated that the attackers may have had access to
limited user information," wrote Bob Lord, director of information
security at Twitter. "This attack was not the work of amateurs, and we do
not believe it was an isolated incident."
II) Zendesk:
"The breach exposed thousands
of email addresses and support messages from users of the services. Security
experts said the email addresses were valuable to attackers because they could
be used in well-designed phishing attacks to bait victims for more
information" (Rosen& Rosen, 2017).
Violations:
There is a violation of trust.
Innocence is lost. There really are no reinforceable laws concerning the
Internet-and an exposure of personal information. Only 2 State in the Union,
tried to ratify laws, that would protect personal information-shared online.
Mr. Obama, signed some new FFC laws into place-just before he left office, and
because it was too close to his exit stage Left, the laws are unpopular, and
therefore-with no political support-the laws have not been ratified, or reinforced.
Penalties:
I) Twitter:
"Twitter recently rolled out
support for two-factor authentication to bolster the security of its user
base" (Rosen& Rosen, 2017). The Twitter account verification, does not
work. When Twitter kicks you out, for using your American right, to free
speech-the two-system authentication, will not allow you to re-enter. There is
such a thing, as too secure.
II) Zendesk:
Social Networking companies, from
the US-do not follow US law. The online companies, operate in any ways and
means-that they have deemed. The way in which US social networking companies
operate, because it is outside, the guidelines of the US laws, and government:
rules, and regulations-are operating illegally. Online social networking
companies in the US-make decisions, regarding commentary, and information
sharing-based on world politics. Most online social networking websites-from
the US, if not all-illegally support: Intl Terrorism, and censor comments, from
Americans.
America, has a US Constitution, to protect American citizens-therefore, online Internet companies from the US, have no legal rights-to censor: "offensive commentary." There are almost rules or regulations, that can be enforced-on the Internet-however, the few that are enforceable, such as: no child porn, no children or slaves for sale online, no illegal or illicit drug sales online-happen all the time, and on the most popular online social networking websites. However, I am personally kicked out of Twitter-every 5 seconds, quite literally, for making negative comments about: "Gay rape sex."
Anal rape, is an Intl Terror agenda, and no legally allowed in the US. I am kicked out f Twitter, for complaining about: prostitution in the US. Prostitution, is not legal in the US. I get kicked out of Twitter-to objecting to Gay marriage, and to Gay adoption-and I have a human right-in the US, to hold that political point of view. Twitter, and many other online social networking websites-refuse to respect, the US Constitution-and my: "Freedom of Speech." If there is a security breach, at an online social networking website-there really are no penalties, that can be reinforced.
The online social networking company-can increase security measures, and-they can do almost anything else they want, as well-including selling the personal information, that you provide-while logged into their online social networking systems and servers. I do not believe-not for a minute, that any of the new: Snapshot data-is disappearing, I think it is being collected, and maintained, because that is how the Internet work. Snapshot, made you no promises. You should not have taken that picture!
Technology and Security Breaches: 2014
1) Communication Technology: immersive virtual worlds computer fantasy goggles:
"Oculus Rift Thirty years after virtual-reality goggles and immersive virtual worlds made their debut, the technology finally seems poised for widespread use" (Hardekopf, 2015). People who have larger expendable income, make purchases from high-end retail stores, like: Neiman Marcus and Sony. Employees, who work at name brand and designer stores, process credit cards with a higher available balance-generally. When a credit card with no-limit is stolen, it is worth much more, on the: “Black market.” America is rife with: liars and thieves. I think it would be dangerous to own a credit card-with, no limit.
2) Security Breach: 2014:
A) Neiman Marcus:
"In January, news broke of a card hack at Neiman Marcus where hackers accessed the debit and credit card information of customers who shopped at this chain between July 16, 2013 to October 30, 2013" (Hardekopf, 2015). Neiman Marcus, and other high-end stores-should be more careful, about who they hire, and how credit cards are processed. When people pay significantly more, for retail products-they logically expect, a better quality of product, and a better quality of service.
B) Sony:
"Data continues to come out about this November 24 Sony breach. The security firm Identity Finder found the hack exposed over 47,000 Social Security numbers, including over 15,000 current or former employees" (Hardekopf, 2015). A breach of personal information, is always a serious problem, for a consumer. A US Social Security card-is supposed to be well guarded-at-all-times. US Social Security office, is supposed to provide a new social security number-if yours is stolen, and, they refuse to do so.
When a Social Security card is
stolen, there are several government websites, that the identity theft can be
reported to. You can also go into your local Social Security office-to request
immediate action-to protect your identity. The US government, never responds, to
any of the complaints, and the Social Security Office tells you-that the theft,
is not serious-a lie.
3) Data Related to Technology and Relevant Security Breaches:
3) Data Related to Technology and Relevant Security Breaches:
Industry: High End Retail
Company:
A) Neiman Marcus;
B) Sony.
Type of Breach: Hackers:
I) Neiman Marcus:
"Only in-store customers
were affected, not online transactions" (Hardekopf, 2015). You can never
tell-really, if a person is telling you the truth. There are too many
instances-especially in major companies, when people are more worried about the
bottom line. US companies lie to the general public-all-of-the-time, to
protect, their shares on Wall Street.
II) Sony:
"In early December, hackers
leaked five unreleased movies online and some employees' Social Security
numbers" (Hardekopf, 2015). Hacking, is not that difficult. Computer
systems retain information. People choose not to protect their passwords. The
passwords that are chosen-are easy to guess, if you know the person, and so on.
Severity of Breach:
I) Neiman Marcus:
"Originally, the company
estimated that as many as 1.1 million cardholders could have been affected. But
further investigation found that it affected a maximum of 350,000 customers.
The breach occurred when malicious software was installed onto the Neiman
Marcus system that collected payment card data from customers who made
purchases during those dates" (Hardekopf, 2015). I think-when reporting
information breaches, that it would be more helpful, to talk about the
information breach affects people-and not just a guess, in regarding how much
information was exposed.
II) Sony:
"In addition, these numbers
appeared more than 1.1 million times on 601 publicly-posted files stolen by
hackers. A significant number of files containing the Social Security numbers
were accompanied by other personal information, such as full names, dates of
birth and home addresses, increasing the chances of identity fraud"
(Hardekopf, 2015). I think that breaching personal data, in mass numbers-is an
act of Intl terrorism. Data breaches happens soo often in the US, and the impact
is soo negative-that when an-individual-posts, the information publicly-it is
obviously malicious, and vicious act against Americans.
Violations:
"Our office (Social Security Office) does not investigate the loss or theft of personal property including wallets and purses containing personal identification. If your wallet or purse containing your Social Security Card is stolen, contact your local police department immediately to file a theft report. You should also contact SSA directly at 1-800-772-1213 to request a replacement Social Security Card" (US Government: Social Security, n.d.). The local police, steal Social Security cards, and would-in reality, do nothing, to assist an individual, in recovering one.
Penalties:
"If someone uses your Social Security number to obtain credit, loans, telephone accounts, or other goods and services, contact the Federal Trade Commission (FTC). The FTC collects complaints about identity theft from those whose identities have been stolen" (US Government: Social Security, n.d.). "Concerned about how a company is handling your personal information? Report concerns, use the identity theft category" (US Government: FTC, n.d.). I have contacted the FTC, several times, about stolen credit cards, and other government ID's-that were stolen, to protect my identity-and the FTC, never responded. There are a number of US government, and employees, like the: Department of Justice-which exist, and that, do absolutely nothing, for anyone.
Technology and Security Breaches: 2015
1) Communication Technology: Apple Pay: Pay from Your Cellphone:
"A clever combination of technologies makes it faster and more secure to buy things with a wave of your phone" (Robert, 2017). With an increase in innovations, that utilize data transmissions, over WiFi-or WiFi accessible electronic devices, like cellphone, the security of your personal information decreases. In theory, a new fun electronic toy-is a welcome entertainment. In reality-another new way, to transmit information from your banking institution-has new, and added financial risks.
2) Security Breach: 2015: Experian/T-Mobile:
T-Mobile uses Experian to process its credit applications. Experian explained
the details on its
Web site: The unauthorized access was in an isolated incident
over a limited period-of-time. It
included access to a server that contained
personal information
for consumers who applied for T-Mobile USA postpaid
services or products, which require a credit check,
from Sept. 1, 2013 through
Sept. 16, 2015.
(Ramanan, 2015)
Credit checks are mandatory for even small lines of credit in the US. Experian, is 1, of 3 major credit agencies. Due to the fact, that there are only 3 major credit checking agencies in the US-businesses, and consumers-have almost no choice about who they work with.
3) Data Related To Technology and Relevant Security Breaches:
Industry: Cellphone Communications and Banking/Credit Check Services
Company: T-Mobile and Experian
Type of Breach:
"Experian Plc (EXPN.L), the
world's biggest consumer credit monitoring firm disclosed a massive data breach
that exposed sensitive personal data of some 15 million people who applied for
service with T-Mobile US Inc" (Ramanan, 2015). I think, that-because
credit is important, and because there are risks attached to any transactions,
that people need to make better informed decisions, regarding who they work
with. Some companies, and some transactions-are safer than others.
Severity of Breach:
"No. of records compromised:
15 million people’s records" (Ramanan, 2015). There is no scale, for the
severity of a secure information breach. Any number of records lost-over 1
million-must be severe.
Violations:
"IIP Personal Information
Breach" (University of California: IT, 2017). If a company breaches an
agreement with you, to keep your personal data and information safe-you can
report them, to the: Better Business Bureau (BBB) (BBB, 2017). I do not know,
what the consequences are-if any, for filing a BBB report online?
Penalties:
Information breaches, are soo
common in the US-you take your chances. To remedy the situation, you can log
online, and research various credit repair, and credit protection services.
Chances are, that T-Mobile, and Experian-will inform clients, that they will
increase their security measures. No penalties-will be levied, against either:
T-Mobile or Experian.
Technology and Security Breaches: 2016:
1) Communication Technology: Intl Terror Target: FBI &Homeland Security: Hackers:
Technology and Security Breaches: 2016:
1) Communication Technology: Intl Terror Target: FBI &Homeland Security: Hackers:
"Power from the Air: Internet devices powered by Wi-Fi and other telecommunications signals will make small computers and sensors more pervasive" (Harris, 2017). WiFi has passcodes, and people share WiFi passcodes, on the “Black market”-it is for sale, just like everything else.
Additionally, there are
programs-that help you, to hack WiFi passcodes. Every time, you log-on to a
public WiFi website now, there is supposed to be a warning, regarding the vulnerability,
of data being shared-over a public WiFi. It is interesting to me, that
electronic devices-in the very near future, will be powered by WiFi-like power
from the airwaves, and it also sounds like a security breach to me.
2) Security Breach: 2016:
2) Security Breach: 2016:
Federal Bureau of Investigation, Department of Homeland Security:
"In February, hackers threatened to, and ultimately did, dump the records of nearly 30,000 FBI and Department of Homeland Security workers" (Karunda, 2016). It is difficult to discern, when examining a data breach, how hackers accessed information. Many times, it is presumed, that the hackers, uploaded a: virus, or a worm, or utilized social engineering-and stole passwords themselves. Often times, hackers can steal information, by jumping on WiFi, and boarding the computers, and the servers themselves-remote access.
3) Data Related to Technology and Relevant Security Breaches:
Industry: US Secret Service
Company: US Federal Government
Type of Breach:
Main Server Breach: "The
records included personal information on around 9,000 DHS employees and around
20,000 FBI employees, including names, titles and contact information"
(Karunda, 2016). It is dangerous for US Federal employees, to have their
personal information breached. However, USSS-can arrest, for almost any reasons
at all. If the culprits-who stole the Feds personal information-could be
located, they could be arrested, for the terrorists, that they are-further
protecting: America and American citizens, from Intl Terror.
Severity of Breach:
"The hacker, which first
reached out to Motherboard with the files, claimed he had access to even more
files, totaling 200 GB" (Karunda, 2016). Information must be duplicated,
for better preservation. Some people will steal anything. Vital Federal
government information, needs to be saved on safe servers, outside of the
US-not just in D.C..
Violations: Violation of Laws Protecting US Secret Service Employees
Penalties: USSS: United States Secret Service
. . . The Secret Service has evolved to serve a dual mission of investigating financial
crimes and providing protection for the
president, vice president, their families, and
other political figures,
both U.S. and foreign. Criminal investigations covered by the
Service include computer
and telecom fraud, identity theft and financial institution
fraud - and recently, investigations
into computer-based attacks on the nation’s
financial and informational
infrastructure, often under the auspice of anti-terrorist
activities. (USSS, 2016)
The duties and obligations, of USSS-keep the President of the US safe. If President Trump, is discontent-with those sworn to take a bullet, for his protection-then, he should hire someone else. The US, is such a dangerous country, I am not able to agree, that President Trump is safer than me-just because he has USSS, watching over him. It is almost impossible to complain about anything in America. If something were wrong in the Whitehouse-in D.C., I seriously doubt, that President Donald Trump, would be able to complain about it. In America-you must keep yourself safe-I know the police never help anyone.
Technology and Security Breaches: 2017:
1) Communication Technology: Cyber Warfare: Major Internet Problem For US: 2017
Conversational System:
The current focus for conversational
interfaces is focused on chatbots and
microphone-enabled devices (e.g., speakers,
smartphones, tablets, PCs,
automobiles).
However, the digital mesh encompasses an expanding set of
endpoints people use
to access applications and information, or interact with
people, social
communities, governments, and businesses. The device mesh
moves beyond the traditional desktop computer
and multiple devices to
encompass
the full range of endpoints with which humans might interact. As the
device mesh evolves, connection models will
expand and greater cooperative
interaction between
devices will emerge, creating the foundation for a new
continuous and
ambient digital experience. (Microsoft, 2017)
I think that it is dangerous, to be too connected. When passwords are interchangeable, and when computer systems are all relying on each other, for information, and functioning-then, it is much easier-to take down an entire country-with a devastating cyber war.
2) Security Breach: Intl Terror Attack: Cyber Warfare: Predicted, or Real and Here?
"Nation-state cyber-attacks will move from espionage to war. Experian predicts that cyber conflicts between nation-states will escalate from espionage to cyber-warfare in 2017" (Olavsrud, 2017). The acrimony, between Americans, and the new immigrants who support Intl Terror is growing. Intl Terror, fly though the US, and often times-now, call US homes.
I agree-that a cyber war, would
be more peaceful-however, I have serious concerns, as to whether a cyber war,
could ever resolve any disagreements. War aspects-it seems to lead to further
agitation, and more war-not: Peaceful Negotiations, and World Peace.
3) Data Related to Technology and Relevant Security Breaches:
3) Data Related to Technology and Relevant Security Breaches:
Industry: Department of Defense: Pentagon:
Experian notes that when the issue of state-sponsored cyber-attacks came up during the recent U.S. presidential campaign, both candidates said they would favor using cyber weapons to retaliate, leading Experian to predict an escalation in cyber-attack conflict in 2017. These conflicts will tend to leave consumers and businesses as collateral damage. (Olavsrud, 2017)
It is the obligation, of the US Pentagon, to keep America safe, with the war machines. Has the US Pentagon agreed to wage a cyber war-against Intl Terror, and if so, then it requires a formal announcement, to the general public-just like any other deadly exchange.
Company: United States Government:
" 'The progression of cyber-attacks driven by nation-states will undoubtedly place critical infrastructure in the crosshairs, potentially leading to widespread outages or exposed personal information that could impact millions of innocent consumers,' the report said" (Olavsrud, 2017). Cyber war, is generally not violent, it is only malicious, and frustrating. Cyber war, is a fast and quick war-if done the wrong way, to engage in fraudulent acts-that would cause one to be classified as a felon.
Type of Breach: Cyber Attack, Massive Breach of Info. & Attack of US Internet, Computer, Server, WAN/LAN, Website-systems.
Severity of Breach:
Experian recommends companies address this threat by participating in their
respective
Information Sharing and Analysis Center (ISAC) to share cyber
threat information
with peers and national defense organizations. Additionally,
businesses
&8212; especially businesses involved in critical infrastructure —
should prepare for full-on disruption.
Proactive steps could involve purchasing
insurance protection and shoring up security
measures against large-scale
disruptions. (Olavsrud, 2017)
Preventative measures, are always important. However, Cyber war, is unpredictable-or it would not be effective. A pre-emptive strike, is preferable, to a response focus-solely on defense, if an enemy is preparing to attack.
Violations: Espionage, Treason, Intl Terror
Penalties: Gitmo, Death Penalty
Identify the library databases used
for research of IAS breaches:
Capella
Online Library and Databases Available for: IAS Security Research-Breaches:
Computers
and Applied Sciences: http://web.b.ebscohost.com.library.capella.edu/ehost/search/advanced?vid=0&sid=bc715d34-60d1-4913-a17a-80befcc809e1%40sessionmgr102
Computing
Database: https://search-proquest-com.library.capella.edu/computing/advanced?accountid=27965
Gale
Virtual Reference Library: http://go.galegroup.com.library.capella.edu/ps/start.do?p=GVRL&u=minn04804&authCount=1
IGI
Global Info. Sci. Videos: https://www-igi-global-com.library.capella.edu/gateway/search/?btid=136
International
Security and Counter Terrorism Reference Center: http://web.a.ebscohost.com.library.capella.edu/ehost/search/advanced?vid=0&sid=900173ae-b78d-416e-8762-1458d5021bd0%40sessionmgr4010
Military
Database: https://search-proquest-com.library.capella.edu/military/advanced?accountid=27965
Telecommunications
Database: https://search-proquest-com.library.capella.edu/telecomms/advanced?accountid=27965
Identify the academic research
techniques used to locate academic and non-academic sources:
·
Search various online OCLC Academic
Research Databases;
·
Change the search terms;
·
Use Boolean Connectors: and, or,
etc.;
·
Read through articles, with related
materials, to search, for: “key terminology;”
·
Search through a wide variety of
online, and offline, research materials: Internet, books, newspaper, magazines,
etc.;
·
Include: personal interviews,
emails, and other information sources-like MP3 sound recordings.
Online Resources: Regulating Bodies:
SEC: https://www.sec.gov/
Office of the Comptroller of the
Currency: https://www.helpwithmybank.gov/national-banks/national-banks.html
Definitions:
Personal Identity Information (PII):
Personal identity information (PII) is unencrypted computerized information that
includes an individual’s first name or
initial, and last name, in combination with
any one or more of the following:
1) Social Security number (SSN);
2) Driver’s license number or State-issued Identification Card number;
3) Account number*-credit card number, or debit card number in combination
with any required security code, access code,
or password such
as expiration date or mother’s maiden name
that could permit access
to an individual’s financial account;
4) Mental or physical condition;
4) Mental or physical condition;
5) Medical
treatment or diagnosis by a health care professional;
6) Health insurance information, including an;
6) Health insurance information, including an;
7) Individual’s
health insurance policy number or
subscriber identification number, any unique
identifier
used by a health insurer to identify the
individual, or;
8) Any
information in an individual’s application and claims
history, including any appeals records. (University
of California: IT, 2015)
Restricted Data:
Restricted Data:
“Restricted data”: “Any confidential or personal information that is protected by law or policy and that requires the highest level of access control and security protection, whether in storage or in transit” (University of California: IT, 2015).
References
ABI/INFORM. (2017). ABI/INFORM. Capella Proquest Database Collection. Retrieved from https://search-proquest-com.library.capella.edu/abicomplete/advanced?accountid=27965
ACM Digital Library. (2017). ACM
Digital Library. Capella ACM Digital Library Database Collection. Retrieved
from https://dl-acm-org.library.capella.edu/advsearch.cfm
Better Business Bureau (BBB).
(2017). Start with Trust. Better Business Bureau: An ethical marketplace where
buyers and sellers trust each other. Retrieved from https://www.bbb.org/en/us/
Compliancy Group: HIPPA Violations and Breaches. (2017). HIPPA Fines Listed by Year. Compliancy Group: HIPPA Done Right. Retrieved from https://compliancy-group.com/hipaa-fines-directory-year/
Computers and Applied Sciences. (2017).
Computer and Applied Sciences Database. Capella EBSCOhost. Retrieved from http://web.b.ebscohost.com.library.capella.edu/ehost/search/advanced?vid=0&sid=bc715d34-60d1-4913-a17a-80befcc809e1%40sessionmgr102
Computing Database. (2017).
Computing Database. Capella Proquest Database. Retrieved from https://search-proquest-com.library.capella.edu/computing/advanced?accountid=27965
Fletcher, Dan. (2010). The 50 Best Inventions of 2010. Time. Retrieved from http://content.time.com/time/specials/packages/article/0,28804,2029497_2030652_2029803,00.html
Gale Virtual Reference Library. (n.d.). Gale Virtual Reference Library. Capella Gale Virtual Reference Library Database. Retrieved from http://go.galegroup.com.library.capella.edu/ps/start.do?p=GVRL&u=minn04804&authCount=1
Greenewald, Ted. (2012). Facebook's
Timeline. MIT Technology Review. Retrieved from
http://www2.technologyreview.com/news/427678/facebooks-timeline/
http://www2.technologyreview.com/news/427678/facebooks-timeline/
Google Scholar. (n.d.). Google Scholar. Capella Google Scholar Database. Retrieved from https://scholar-google-com.library.capella.edu/
Hardekopf, Bill. (2015). Forbes:
Worst Data Breaches of 2014. Forbes: Worst Data Breaches of 2014. Retrieved
from https://www.forbes.com/sites/moneybuilder/2015/01/13/the-big-data-breaches-of-2014/#6bbd3cacefe6
Harris, Mark. (2017). Power from The Air. MIT Technology Review. Retrieved from https://www.technologyreview.com/s/600773/10-breakthrough-technologies-2016-power-from-the-air/
Hart, Kim. (2016). FCC ADOPTS PRIVACY RULES TO GIVE BROADBAND CONSUMERS INCREASED CHOICE, TRANSPARENCY AND SECURITY FOR THEIR PERSONAL DATA. Retrieved from http://www.ncsl.org/research/telecommunications-and-information-technology/privacy-legislation-related-to-internet-service-providers.aspx
Homeland Security Digital Library. (n.d.). Homeland Security Digital Library. Capella Homeland Security Digital Library Database. Retrieved from https://www-hsdl-org.library.capella.edu/c/
IGI Global Info. Sci. (1998-2017).
IGI Global Info. Sci. Capella IGI Global Info. Sci. Database. Retrieved from https://www-igi-global-com.library.capella.edu/gateway/
IGI Global Info. Sci. Videos.
(1998-2017). IGI Global Info. Sci. Capella IGI Global Info. Sci. Database.
Retrieved from https://www-igi-global-com.library.capella.edu/gateway/search/?btid=136
Irwin, Angela, S. M.& Milad, George.
(2016). The use of crypto-currencies in funding violent jihad. Journal of Money
Laundering. Vol. 19, No. 4. Retrieved from DOI 10.1108/JMLC-01-2016-0003
International Security Center and
Counter Terrorism Reference Center. (2017). International Security Center and
Counter Terrorism Reference Center. Capella EBSCO host. Retrieved from http://web.a.ebscohost.com.library.capella.edu/ehost/search/advanced?vid=0&sid=900173ae-b78d-416e-8762-1458d5021bd0%40sessionmgr4010
Karunda, Sarah. (2016). The 10
Biggest Security Breaches For 2016. CRN. Retrieved from http://www.crn.com/slide-shows/security/300081491/the-10-biggest-data-breaches-of-2016-so-far.htm
LearnTechLib. (n.d.) LearnTechLib.
Capella host. Retrieved from https://www-learntechlib-org.library.capella.edu/
Library, Information Science and
Technology Abstracts. (2017) Library, Information Science and Technology
Abtracts. Capella EBSCO host. Retrieved from https://www-learntechlib-org.library.capella.edu/
MacRae, Michael. (2013). Top 5 Medical Technology Innovations. ASME: The American Society of Mechanical Engineers. Retrieved from https://www.asme.org/engineering-topics/articles/bioengineering/top-5-medical-technology-innovations2
Matwyshyn, Andrea M. (2009). CSR and
the Corporate Cyborg: Ethical Corporate Information Security Practices. Journal
of Business Ethics. Vol. 88. p. 579-594. DOI 10.1007/s10551-009-0312-9
Microsoft. (2017). Technology Trends for 2017. IT Business Trends. Retrieved from http://www.itbusinessedge.com/slideshows/top-10-strategic-technology-trends-for-2017.html
Military Database. (2017) Military
Database. Capella Proquest host. Retrieved from https://search-proquest-com.library.capella.edu/military/advanced?accountid=27965
Olavsrud, Thor. (2017). 5 Data Breach Predictions 2017. CIO from IDG. Retrieved from https://www.cio.com/article/3155724/security/5-data-breach-predictions-for-2017.html
Phifer, Lisa. (2011). Top 10 Data
breaches: 2010. eSecurity Planet. Retrieved from
https://www.esecurityplanet.com/views/article.php/3921656/Top-10-Data-Breaches-of-2010.htm
https://www.esecurityplanet.com/views/article.php/3921656/Top-10-Data-Breaches-of-2010.htm
Proquest Central. (2017) Proquest
Central. Capella Proquest host. Retrieved from https://search-proquest-com.library.capella.edu/central/advanced?accountid=27965
Ramanan, Sai. (2015). Forbes: Top 10 Security Breaches of 2015. Title of Online Periodical. Forbes. Retrieved from https://www.forbes.com/sites/quora/2015/12/31/the-top-10-security-breaches-of-2015/#570fdb5140d6
Robert, Hof. (2017). Ten Breakthrough Technologies (2015). MIT Technology Review. Retrieved from https://www.technologyreview.com/s/535001/apple-pay/
Rosen, Christine& Rosen, Jeffrey. (2017). Temporary Social Media Messages that quickly self-destruct could enhance the privacy of online communication and make people feel freer to be spontaneous. MIT Technology Review. Retrieved from https://www.technologyreview.com/s/513731/temporary-social-media/
Sage Journals Online. (2017). Sage
Journals Online. Capella host Sage Journals. Retrieved from http://journals.sagepub.com.library.capella.edu/search/advanced
Schwartz, Mathew J. (2011). 6 Worst Data Breaches of 2011. The Dark Room. Retrieved from https://www.darkreading.com/attacks-and-breaches/6-worst-data-breaches-of-2011/d/d-id/1102001
Skillsoft. (2017) Skillsoft Library.
Capella host Skillsoft. Retrieved from https://capella.skillport.com/skillportfe/main.action#browsecatalog
Social Security Administration
Pamphlet. (2017). Identity Theft and Your Social Security Number: Securing
Today and Tomorrow. SSA United States Government Publications. Publication
No. 05-10064
Telecommunications Database. (2017).
Telecommunications Data. Capella Proquest host. Retrieved from https://search-proquest-com.library.capella.edu/telecomms/advanced?accountid=27965
University of California: Santa Cruz. (2015). Information Technology Services. University of California: Santa Cruz: University Home: Security: Breaches. Retrieved from https://its.ucsc.edu/security/breaches.html
University of California: Santa Cruz. (2015). PCI-DSS Security Penalties. University of California: Santa Cruz: University Home: Security: Penalties. Retrieved from https://financial.ucsc.edu/Pages/Security_Penalties.aspx
US Government. (n.d.). FDIC: Federal Deposit Insurance Corporation. Retrieved from https://www.fdic.gov/
US Government: FTC. (n.d.). Federal Trade Commission: Protecting Americas Consumers. Retrieved from https://www.ftc.gov/
US Government. (n.d.). Internal
Revenue Service. Retrieved from https://www.irs.gov/
US Government. (n.d.). Interstate Technology and Regulatory Council. Retrieved from http://www.itrcweb.org/
US Government. (n.d.). NCUA: National Credit Union Association. Retrieved from https://www.ncua.gov/Pages/default.aspx
US Government. (n.d.). Security Breach Documents. Retrieved from http://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx
US Government. (n.d). Securities Exchange Commission. Retrieved from https://www.sec.gov/
US Government. (n.d.). The Feds: Board of Governors Federal Reserve. Retrieved from https://www.federalreserve.gov/foia/about_foia.htm
US Government. (n.d.). Who Regulates My Bank. Retrieved https://www.helpwithmybank.gov/national-banks/national-banks.html
US Government: NCSL. (2017). Privacy of Personal Information Held by Internet Services. Retrieved from http://www.ncsl.org/research/telecommunications-and-information-technology/state-laws-related-to-internet-privacy.aspx#ISPs
US Government: NCSL. (2017). Privacy Legislation Related to Internet Providers. Retrieved from http://www.ncsl.org/research/telecommunications-and-information-technology/privacy-legislation-related-to-internet-service-providers.aspx
US Government: OIG. (n.d.). Office of The Inspector General: Social Security Administration. Retrieved from https://oig.ssa.gov/report-fraud-waste-or-abuse/what-cant-oig-investigate
United States Secret Service. (2016). United States Secret Service (USSS). ALL Gov: Everything Our Government Really Does. Retrieved from http://www.allgov.com/departments/department-of-homeland-security/united-states-secret-service-usss?agencyid=7355
Whittaker, Zack (2017). Disqus Confirms 2012 hack of the comment tools. Zero Day Net. Retrieved from http://www.zdnet.com/article/disqus-confirms-comments-tool-hacked/
Worldcat.org. (2001-2017). OCLC
Worldcat.org. Capella Worldcat.org host. Retrieved from http://www.worldcat.org/
Comments
Post a Comment