Discuss about the Hacks of OPM Databases.
In this report, we are going to discuss about a one year old news of information security breaches. Information security breaches put vulnerable impact on business organizations, its reputation and their customers whose data is saved into database of organization. For last many years, various information breaches have seen by users of IT and till now they are bearing loss of those breaches. The main reason for these information security breach is improper management of information into database, lack of security and authorized access of data. To mitigate these breaches both users and developers need to be responsible. Now in this report, we will discuss about information security breach in detail with its countermeasures. (Gallagher, 2015)
The news of information security breach that we will thoroughly discuss here in this report is about “Hacks of OPM Databases”. We have selected this news because it is one of ten most popular news of information security breaches and a wide range of customers of this company have compromised with this problem. It will be good to understand about actual breach and how it happened and who was affected due to this. This selected news is related information security breach because in this incident, sensitive data of current and former employees has stolen by hackers. It means confidential information of customers of company has stolen by hackers. (U.S. Office of Personnel Management, 2016)
This is an important segment of this report that describes both technical and non-technical reasons of this information security breach. According to analysis, it is found that personal information of at least 22.1 million people have been stolen and this information includes addresses, mental health and criminal records. It means personal and official information of employees and other members of organization has lost. In this incident of information security leakage, U.S government databases are hacked by hackers. These databases of U.S government holding files of security clearance and personal records that exposed sensitive information near about 22.1 million people. According to resources of this news, not only personal records are hacked of current and former employees by hackers but also widespread information of their friends and relatives have also stolen. It means large number of victims were influenced by this. According to officials of this attack, this security breach is done by China’s domestic civilian spying program. This is a non-technical reason about this attack and we will discuss about this in detail later in this report. Here are some technical reasons of this attack:
Besides these, technical issues, there are also some non-technical issues found for this attack. As we have already mentioned above that investors have investigating that attackers were belong to China’s domestic civilian spying program on American citizens. According to FBI Director James B. Comey, it is treasure trove of information for everyone who are working with, worked with and tried to work with United States government. Here China is suspected for stealing large amounts of data on Americans and it was part of strategic plan for increasing intelligence collection. This reason is non-technical, because it is concerned with government levels of USA and China. Investigators of this attack are trying to find out exact reason for this information security breach. Foreign spy service is also used by U.S government to identify solid reason for this attack. (USA TODAY, 2016)
According to evaluation of this security breach of OPM, this was severely bad attack for government of United States of America. Due to exposure of data which can be used in other cyber espionage operation includes spear phishing attacks and blackmailing. Besides this, following social impacts were also encountered by OPM. (Corbin, 2016)
Any kind of security breach whether it is small or large put bad impact on all people who are victim of that attack. OPM databases attack was not less harmful, it has impacted a wide range of people, their families and friends. Here we have some social impacts of this information security breach that must be considered by other countries and must try to understand all technical and non-technical issues of this breach. (InformationWeek, 2016)
These are some essential impacts of OPM information security breach. These impacts are social and as well as economic. After this attack, citizens of America are worried about their personal information that is stored into OPM databases. (Nakashima, 2016)
From above discussion, it is cleared that this information security breach was very much vulnerable for Americans and they still have impact of this attack.( Krebsonsecurity.com, 2016) Here are some essential remedies for controlling this attack and must be implemented successfully by US government. These remedies are listed as below:
These remedies will provide successful results if these will be implemented appropriately by technical experts. Not only OPM databases, but other companies’ databases should be aware about these security and privacy issues.
Conclusion
After this whole discussion about OPM information security breach, we can say that this discussed attack was so much vulnerable and there were various technical and non-technical reasons exist for this attack. In this report, we have discussed remedies for mitigated these security issues. Lack of these security tools and techniques directly lead to harmful attacks. Hackers always try to find out weak points of an information system from where they can access unauthorized information. These weak points are left due to lack of awareness and knowledge about how to protect system and database. If users will have information about this, then most of the systems can be remedies.
References
U.S. Office of Personnel Management. (2016). OPM Announces Steps to Protect Federal Workers and Others From Cyber Threats. (2016). Retrieved 22 September 2016, from https://www.opm.gov/news/releases/2015/07/opm-announces-steps-to-protect-federal-workers-and-others-from-cyber-threats/
Corbin, K. (2016). How OPM data breach could have been prevented. CIO. Retrieved 22 September 2016, from https://www.cio.com/article/2947453/data-breach/how-opm-data-breach-could-have-been-prevented.html
FCW. (2016). Exclusive: The OPM breach details you haven’t seen — FCW. (2015). Retrieved 22 September 2016, from https://fcw.com/articles/2015/08/21/opm-breach-timeline.aspx
Nakashima, E. (2016). Hacks of OPM databases compromised 22.1 million people, federal authorities say. Washington Post. Retrieved 22 September 2016, from https://www.washingtonpost.com/news/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-21-5-million-people-federal-authorities-say/
Deac, A. (2015). The Top 10 Worst Cyber Security Breaches from 2013-2015 | TruShield. Trushieldinc.com. Retrieved 22 September 2016, from https://trushieldinc.com/the-top-10-worst-cyber-security-breaches-from-2013-2015/
Nextgov. (2015). Timeline: What We Know About the OPM Breach (UPDATED). Retrieved 22 September 2016, from https://www.nextgov.com/cybersecurity/2015/06/timeline-what-we-know-about-opm-breach/115603/
Gallagher, S. (2015). “EPIC” fail—how OPM hackers tapped the mother lode of espionage data. Ars Technica. Retrieved 22 September 2016, from https://arstechnica.com/security/2015/06/epic-fail-how-opm-hackers-tapped-the-mother-lode-of-espionage-data/
Lawfare.(2016). Why the OPM Hack Is Far Worse Than You Imagine. Retrieved 22 September 2016, from https://www.lawfareblog.com/why-opm-hack-far-worse-you-imagine
USA TODAY. (2016). OPM hack Q&A: What we know and what we don’t. Retrieved 22 September 2016, from https://www.usatoday.com/story/news/politics/2015/06/27/opm-hack-questions-and-answers/29333211/
InformationWeek. (2016).OPM Breach Leads To New Systems, Procedures – InformationWeek. Retrieved 22 September 2016, from https://www.informationweek.com/strategic-cio/security-and-risk-strategy/opm-breach-leads-to-new-systems-procedures/a/d-id/1324077
U.S. Office of Personnel Management.(2016). OPM Announces Steps to Protect Federal Workers and Others From Cyber Threats. Retrieved 22 September 2016, from https://www.opm.gov/news/releases/2015/07/opm-announces-steps-to-protect-federal-workers-and-others-from-cyber-threats/
Krebsonsecurity.com. (2016). Catching Up on the OPM Breach — Krebs on Security. Retrieved 22 September 2016, from https://krebsonsecurity.com/2015/06/catching-up-on-the-opm-breach/
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download