Discuss about the Security Breaches for Anthem Health Organization.
Today, data breaches has become a big question for many organizations and firms and there is a need to focus on how hackers find paths to steal the confidential data and infiltrate networks. In 2015, numerous industries, such as, Sony, JP Morgan Chase, and eBay have suffered with data breaches. Therefore, these industries continuously make investments in different security technologies to prevent the industry from data breaches. This report includes the Anthem and JP Morgan Chase hacking case that has happened in September, 2015.
Anthem health organization is one of the second-largest U.S health insurance frim. In September 2015 it was reported that organization face a security breach which is also a one of the biggest health care breach, in which about eighty million customers data were at risk of infection (Thole, Moll, 2015). In an statement posted by the organization on its website, president Joseph Swedish anounced that the hackers might gain access to the delicate data for example, names, Social safety numbers, medical recognition proofs, business data, and also income data of the organization. Anthem organization was the target of the cyber hackers as it is nation’s largest medical care insurance organization, therefore is the current target of the security breach. Almost eighty million customersclients, including the organization’s own cheif executive officer, are at complete risk as their personal data was stolen.
The outsourcing of tasks provide several opportunities, but data breach also happens by this outsourcing. At whatever point an outsider has been assaulted, it is dependably either because of lance phishing, malware, and Trojan or an online vulnerability. Almost seven million diminutive business customers have suffered because of this hacking (Telang,2015). Millions of customers had lost their private data and were publicly uncovered as a consequence of the data failure due to some Russian cyber-hackers. Yet, there is no proper information as how much data had been hacked in this data breach. The hackers also broke several networks of the Anthem organization, and they had stolen delicate data from the accounts of the customers.
Having proper techniques to measure and set-ups to forestall hacking in any case is the best technique to anticipate the leaking of delicate information, and actualizing the basic safety efforts, for example, regulatory benefits and hindering all the projects that are not white-listed deals with the most potential safety holes. There are a few methods created by the Cyber-security council, which Anthem must utilize. Anthem organization must utilize applications like cryptography to protect the delicate data, such as, the email-ids and credit card details of the account-holders as well as ensure their customers that their private data is safe. Anthem’s delicate data must be controlled or protected by the proper utilization of cryptography algorithm (Bradbury, D, 2013).
JP Morgan is one of the biggest banks in the whole U.S. During the September of 2015, they became the main target of a huge cyber-attack in which the data of almost 76,000,000 households and 7,000,000 small enterprises was hacked. This cyber-attack began in September 2015, but it was not disclosed until November, 2015 (Crowe, 2015). JP Morgan Bank is the world’s largest bank and it controls the assets of approximately $2.59 Trillion (Zeissler, Ikeda, & Metrick, 2015). As indicated by the required SEC documenting, the attackers or hackers from abroad has gained access to the names, addresses, telephone numbers as well as email-ids of account holders of JP Morgan Bank. Nevertheless, the account informations, passwords, social and legal document numbers were not taken by the hackers. JP Morgan has reported that they invest $250,000,000 yearly in the digital safety, in spite of such a large amount of investment, the bank was troubled by the huge cyber-attack and has failed in retaining the cyber security of its account holders (Hansen, Eisenbach, Torres, Graham, & Hardwicke, 2015). The three men, Ziv Orenstein, Joshua Samuel and Gery Shalon, were detected as hackers and numerous charges were filed against them, such as, hacking of data, identity theft, safety frauds, as well as money laundering (Hong, 2015).
As indicated by the records documented with the Exchange as well as Security Commission, JP Morgan has affirmed that just names, addresses, and emails had got hacked. The assailants were unable to take cash, and delicate passwords, credit card details and social security numbers were also not got hacked by the attackers. However, this information seems to be untrue as many clients of JP Morgan have complained that their personal and delicate data have stolen. According to several authorities associated with the security breaches has said that the data hackers run a dozen of illegal online websites as well as Bitcoin channels. In September 2015, the JP Morgan team has admitted that eighty-three million account holders data were hacked in which hacking of names, phone numbers as well as addresses of millions of clients had been unprotected. The JP Morgan hacking case was one of the biggest information and data security failures in the history.
Along with the JP Morgan, four other organizations were also breached with the same kind of cyber-attack. In this cyber-attack, some other or the third-party entity was involved as an ordinary entity, which most of the time had complete access to many other banks (“JP Morgan Chase admits to breach affecting 83 million customers and businesses”, 2015). In many cyber-attacks, the third party is the main reason which lead to these downfalls, and it was pretty sure that in JP Morgan’s case too, a third party was involved and was the main reason of the cyber-attack (Riley, & Robertson, 2015). To secure the details of account-holders, JP Morgan preferred to overcome few Human Resources related issues, therefore, they had outsourced their numerous tasks. This outsourcing had become the major reason for this data breach (Sreedevi, 2015). Then again, when organizations focus on the disadvantages of outsourcing of tasks, they come to know that data breach is one of the main issues caused by the outsourcing and it also wipe out an organization as well as the profits accrued by the outsourcing.
It is really essential by organizations to upgrade the security standards from time to time, JP Morgan hacking case could be anticipated if they had consistently tried to make efforts for up-gradation of their security standards. To overcome this hacking issue, JP Morgan must utilize two-factor certification to forestall this type of attacks. In this certification factor, users require passwords and one-time secured pin to access the delicate data of clients. All the servers used in JP Morgan Chase should be regularly updated (Zeissler, & Metrick, 2015). If somebody ever found the unreliable server then they will definitely utilize it to break the system or networks completely. Multiple law and social control agencies, such as, Federal Agency of Investigation, International Security Bureau, Division of Homeland Safety, and United State Attorney’s Federal Agency are there, which have helped JP Morgan to overcome the consequences of data breach occurred in the bank and helped them in improving their financial services.
Conclusion
This study has uncovered that the JP Morgan and Anthem both organizations was devastated by the information break in which they had cautioned a large portion of a million prepaid cash clients that their delicate data might be at hazard. Two cyber-attacks has occurred within the time frame of six months, which was the huge situations for the safety mechanism of JP Morgan Chase and Anthem health organization.
References
Bradbury, D. (2013). Insuring against data breaches. Computer Fraud & Security, 2013(2), 11-15.
Crowe, P. (2015).s JPMorgan is the chief victim in the largest theft of customer data from a financial institution in US history. Business Insider. Retrieved 3 April 2017, from https://www.businessinsider.in/JPMorgan-is-the-chief-victim-in-the-largest-theft-of-customer-data-from-a-financial-institution-in-US-history/articleshow/49739816.cms
Hansen, C., Eisenbach, C., Torres, C., Graham, S., & Hardwicke, F. (2015). Maxillary Sinus Inflammatory Myofibroblastic Tumors: A Review and Case Report. Case Reports In Oncological Medicine, 2015, 1-9.
Hong, N. (2015). Charges Announced in J.P. Morgan Hacking Case. WSJ. Retrieved 3 April 2017, from https://www.wsj.com/articles/prosecutors-announce-charges-in-connection-with-j-p-morgan-hack-1447169646
JPMorgan Chase admits to breach affecting 83 million customers and businesses. (2015). Computer Fraud & Security, 2014(10), 1-3.
Khandelwal, S. (2017). JPMorgan Hack — Three Men Charged in Biggest Bank Hack in History. The Hacker News. Retrieved 3 April 2017, from https://thehackernews.com/2015/11/jpmorgan-chase-hack.html
Pagliery, J. (2017). JPMorgan’s accused hackers had vast $100 million operation. CNNMoney. Retrieved 3 April 2017, from https://money.cnn.com/2015/11/10/technology/jpmorgan-hack-charges/index.html
Riley, M., & Robertson, J. (2015). Digital Misfits Link JPMorgan Hack to Pump-and-Dump Fraud. Bloomberg.com. Retrieved 3 April 2017, from https://www.bloomberg.com/news/articles/2015-07-21/fbi-israel-make-securities-fraud-arrests-tied-to-jpmorgan-hack
Sreedevi, B. (2015). Evaluation of Quality of Service Metrics for Hacking and Counter Hacking Mechanism in Mobile Ad Hoc Networks. Indian Journal Of Science And Technology, 8(23).
Smith, J. (2015). Health Data Breaches Compromised 29 Million Patient Records in 2010 2013. Caring For The Ages, 16(6), 6.
TalkTalk and other breaches leave millions vulnerable to fraud. (2015). Computer Fraud & Security, 2015(11), 1-3.
Telang, R. (2015). Policy Framework for Data Breaches. IEEE Security & Privacy, 13(1), 77-79.
Thole, E., Solms, C., & Moll, C. (2015). Cyber Security: How to DealWith (Cross Border) Data Breaches?. Computer Law Review International, 16(5).
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download