Discuss about the Credentials of Customers Crucial Factor.
The privacy of data and information is legal right for individual in era of digital communication. The privacy of information has many advantages and it is usually related with the security if personal data while it is saved in computer systems. The secured information is preferred in almost all the fields such as the medical records of patients, the financial records of companies, the bank details of customers, the examination results of students and many more (smith, 2016). The privacy of information is also called as the privacy of data (HOLLISTER, 2018). In today’s world of big data, where in every second the huge amount of digital data is generating continuously, the privacy of this information is the most crucial factor for everybody. It is not possible to save all data in personal devices as the memory is limited for all the devices, so the concept of cloud is most popular nowadays. In cloud storage, the data is saved on remote locations thus the security of this data is on highest priority. In this report we are going to analyse the data breach which was happened in the year 2017 in J P Morgan. As per the report of financial regulator the JP Morgan chase & co. have to pay around $2.8 million amount to its customers. The privacy violation was happened in JP Morgan in year 2017, due to which millions of customers were affected.
The privacy of information can be ensured in many ways such as by using encryption, data masking and implementing authorization.
Privacy violations are very common in present scenario. According to a survey done by CSO in 2018, some of the biggest data breaches of present century are (Armerding, 2018):
Company |
Description |
Yahoo |
During September 2016, around 3 billion user accounts of yahoo were attacked. According to Yahoo the main victims of this privacy violation were the passwords. In October 2017 it was stated that the security question and answers were also affected and it was considered as the biggest data breach in the history (GREEN, 2018). |
Adult Friend Finder |
It was happened during October-2016 and around 412.2 million accounts were affected due to this data breach. Six databases were hacked by hackers. Due to this around 20 years of user’s data which included addresses, name, passwords and emails were impacted (Weinstein, 2016). The main cause of this data breach was the weak encryption algorithm used in database. |
eBay |
In May 2014, this cyber-attack was happened due to which near about 145 million users were affected. The private data of users were exposed because of this attack. It was basically a network attack, in which hackers entered in the network using personal credentials of some employees of organization and they accessed the network for 229 days. |
Equifax |
It is the biggest credit bureau in US. On September 7, 2017 due to one application vulnerability, the security of private data of around 147.9 million customers was compromised. |
Heartland payment systems |
In this privacy violation incidence, around 134 million credit cards of users were exposed due to SQL injection. |
Target stores |
Due to this data breach the debit and credit card details of 110 million users were affected. The breach was started just before the thanksgiving note. In this breach, hackers got the accessibility rights through a third party software named HVAC at the POS and collected the personal details of plastic money. |
TJX Companies Inc. |
In this data breach around 94 million credit cards were affected. Hackers took the advantage of weak encryption algorithm and captured the details of credit card during wireless transmission. |
Uber |
In 2016, around 57 million of users and drivers personal information was affected in this data breach. In personal information there were no clues of credit and debit card information only the names, addresses, contact numbers and email ID of users were affected. |
JP Morgan Chase |
This is one of the largest bank in the world. Due to data breach around 76 million households were affected and around 7 million of small businesses lost their personal information. |
US Office personnel management |
In this data breach, hackers of China were entered in the OPM system but could not be detected till 2014 March. The information of users were exposed and later misuse this data. |
It is clear from above table that almost all the companies are affected from the privacy violation in recent years. These incidences of data breach were sufficient for the financial down gradation of these companies (Solove, 2014). As per the study around 48 billion dollars were lost in US due to the data breach. As per the report published by Forrester, some of the top 6 common factors for the privacy violations are (Morgan, 2018):
JP Morgan is one of the largest bank in the history of US. It is one of the main victim of privacy violation in US (CROWE, 2016). At the time of data breach in this bank the US attorney Ms. Preet Bharara claimed about three people for the biggest theft of data and information of this financial organization. It is one of the main bank in US having assets of $2.5 trillion. Suddenly news arises that nearly 76 million of customers and around 7 million small businesses were affected due to the privacy issues. In this incidence the main effects were seen are (Lin, 2017):
Every organization wants the security of data and to ensure this, the companies are advised to prepare a checklist for the security parameters. As per the experts the following steps must be taken by CIO’s and CISOs:
Notify the data breach immediately: Whatever is done wrong in the organization, must be reported on urgent basis. Experts says that the solution of privacy violation must be taken as soon as possible. As per the RKON technologies, when the database server is recognized for the data breach, the disk image of this server must be prepared in order to preserve the state of the server. These images must be read only and password authenticated (Roman, 2016).
Prepare a task force: A team of technical experts must be prepared immediately so that the breach can be reported to the legal authorities (Brandon, 2017).
Do proper testing of security issues: It is recommended that before disclosing the breach towards the outside of the organization, the data breach must be completely resolved.
Take support from local authorities: To communicate about the privacy violation with internal and public departments, a clear and concise report must be prepared along with the solution.
Immediate resolve the problem: It is obvious that the company must mention all the implications included in the data breach and about the expected related issues of the organization. The remedial process of data breach is recommended and full-fledged precautions are recommended.
Conclusion
The violation of privacy cannot be completely prevented through any mode of communication, as there are multiple modes of communication present. But if the companies follow some standard guidelines, it can be controlled to some extent. Companies are also recommended to generate an impressive plan to handle the security issues. It is concluded that the causes and solutions will come together. After taking the remedial steps in data breach, continuous auditing and analysis of security breaches must be done to reduce the chances of privacy violation.
References
Armerding, T. (2018, January 26). the-biggest-data-breaches-of-the-21st-century.html. Retrieved from www.csoonline.com: https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html
Brandon, J. (2017, October 7). 5-steps-to-take-when-a-data-breach-hits.html. Retrieved from www.csoonline.com: https://www.csoonline.com/article/2692565/data-breach/5-steps-to-take-when-a-data-breach-hits.html
Carolyn Strobel, D. (2014, June 26). top-6-causes-of-data-breach. Retrieved from www.druva.com: https://www.druva.com/blog/top-6-causes-of-data-breach/
CROWE, P. (2016, November 10). 49739816.cms. Retrieved from www.businessinsider.in: https://www.businessinsider.in/JPMorgan-is-the-chief-victim-in-the-largest-theft-of-customer-data-from-a-financial-institution-in-US-history/articleshow/49739816.cms
GREEN, D. (2018, April 3). If-you-shopped-at-these-7-stores-in-the-last-year-your-data-might-have-been-stolen. Retrieved from www.businessinsider.in: https://www.businessinsider.in/If-you-shopped-at-these-7-stores-in-the-last-year-your-data-might-have-been-stolen/articleshow/63601056.cms
HOLLISTER, S. (2018, April 13). yahoo-aol-oath-privacy-policy-verizon-emails-messages. Retrieved from www.cnet.com: https://www.cnet.com/news/yahoo-aol-oath-privacy-policy-verizon-emails-messages
Lin, D. (2017, November 10). JPMorgan-is-the-chief-victim-in-the-largest-theft-of-customer-data-from-a-financial-institution-in-US-history. Retrieved from www.businessinsider.in: https://www.businessinsider.in/JPMorgan-is-the-chief-victim-in-the-largest-theft-of-customer-data-from-a-financial-institution-in-US-history/articleshow/49739816.cms
Morgan, L. (2018, May 20). list-of-data-breaches-and-cyber-attacks-in-march-2018. Retrieved from www.itgovernance.co.uk: https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-march-2018/
Roman, J. (2016, September 15). jpmorgan-a-7319. Retrieved from www.bankinfosecurity.com: https://www.bankinfosecurity.com/jpmorgan-a-7319
smith, R. (2016, February 12). information-privacy. Retrieved from www.techopedia.com: https://www.techopedia.com/definition/10380/information-privacy
Solove, D. S. (2014, July 2). privacy-data-security-violations-whats-harm. Retrieved from teachprivacy.com: https://teachprivacy.com/privacy-data-security-violations-whats-harm/
Weinstein, M. (2016, December 18). 13-ways-your-privacy-violated-9479084. Retrieved from www.mirror.co.uk: https://www.mirror.co.uk/tech/13-ways-your-privacy-violated-9479084
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download