KEMBAR78
Module Four Short Paper | PDF | Information Security | Encryption
0% found this document useful (0 votes)
65 views4 pages

Module Four Short Paper

This paper discusses the impact of a data breach at a California-based aircraft manufacturing firm that works with the U.S. government. Private employee data like names, addresses, bank account and social security information were stolen. The firm must follow laws like FISMA, California's AB2828 data breach notification law, and notify affected employees. To prevent future breaches, the firm should implement multifactor authentication for remote workers to access networks, since the breach occurred due to a remote worker using a simple password.

Uploaded by

vivek chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views4 pages

Module Four Short Paper

This paper discusses the impact of a data breach at a California-based aircraft manufacturing firm that works with the U.S. government. Private employee data like names, addresses, bank account and social security information were stolen. The firm must follow laws like FISMA, California's AB2828 data breach notification law, and notify affected employees. To prevent future breaches, the firm should implement multifactor authentication for remote workers to access networks, since the breach occurred due to a remote worker using a simple password.

Uploaded by

vivek chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Running head: IMPACT OF DATA BREACH 1

Module Four Short Paper: Impact of Data Breach

Student Name

IT 412

Professor Name

South New Hampshire University

March 24, 2019


IMPACT OF DATA BREACH 2

Short Paper: Impact of Data Breach

A data breach infers to an unlawful acquisition and access of unredacted and unencrypted

computerized information that compromises the confidentiality or security of private data kept

by an entity or individual (Kennedy, 2008, p. 269). In the case scenario, the security violations of

the regulations established by “Federal Information Security Management Act of 2002

(FISMA)” and breach of federal and state laws necessitates the California-based aircraft

manufacturing firm in dealings with U.S. government to follow a compliance process of

response. In this specific case of data breach, there was an ample of private data that was

embezzled comprising employee addresses, names, bank account and social security information

as well as existing aircraft designs. This incident breaks numerous concerns of state laws and

needs a multi-notification practice. With the information breach demonstrating that they were

competent to obtain staff data comprising social security statistics. One of the major state laws

that required to be taken into consideration by the corporation is “California Law AB2828”.

Quach Tiffancy (2016) mentions “currently, the law requires notification of a breach when a

California resident’s unencrypted personal information is compromised. However, effective

January 1, 2017, the amended law requires notification of a security breach when (a) there is

unauthorized acquisition of both encrypted personal information and the encryption key or

security credential, and (b) the business has a reasonable belief that the encryption key or

security credential could render such personal information readable or useable”. California law

necessitates a state or business organization to inform any California local whose unencrypted

private information, as clearly described, was acquired, or practically supposed to have been

attained, via an unsanctioned individual “(California Civ. Code s. 1798.82(a) [person or

business]) and (California Civil Code s. 1798.29(a) [agency]” (ca, 2019). In case they do not
IMPACT OF DATA BREACH 3

comply with the law, they expose themselves fit for not simply litigations from the staffs

however, might likewise experience controls from the US government for not carrying out as

they must. This “California law” outlines “encryption key” as the private key or procedure aimed

to leave the information clear (Quach, 2016).

Owning to the firm having data on government staffs the firm should adhere to the

FISMA act. This law is characteristically supposed to apply simply to government firms. But

vendors and contractors that offer facilities to handle information systems in the best interests of,

or keep close relations with a governmental firm might be held to identical standards (Ely, 2010).

Accompanied by FISMA the firm should likewise obey the “California Civ. Code s.

1798.82(a)”. While complying with FISMA the business should categorize risks, have a system

inventory and a security strategy, establish safety controls, perform risk evaluations and keep

authorization. The guidelines for warning or notice from the California state are, fair notification

of information breach, enumerate what occurred, what the firm is implementing to support and

what the client can do likewise, it will comprise where an individual can drive for additional

data. To stick to FISMA the corporation should report data security events inside one hour of

data breach. It was identified that this breach happened owning to a vulnerable remote access PC

connection a worker establishing using a simple secret word, for simplicity of working from

remote/home location. Hence, in order to manage and avoid such breach in future, it is

recommended that Aircraft Manufacturing firm to implement multifactor verification to prevent

remote worker (attacker) from obtaining access to directed networks, even while authentic

authorizations are compromised. Time-based hard token, soft token, card-based token or SMS-

based text messages are all successful approaches to protect remote site logins that can support

avoid remote invaders from getting into the company’s core networks (Bond, 2017).
IMPACT OF DATA BREACH 4

References

Bond, R. (2017, December 06). How to Prevent the Uber Hack: 5 Defensive Tactics. Retrieved

from hitachi-systems-security: https://www.hitachi-systems-security.com/blog/how-to-

prevent-the-uber-hack/

ca. (2019). Data Security Breach Reporting. Retrieved from ca:

https://oag.ca.gov/privacy/databreach/reporting

Ely, A. (2010, March 18). 10 Steps To Ace A FISMA Audit. Retrieved from informationweek:

https://www.informationweek.com/regulations/10-steps-to-ace-a-fisma-audit/d/d-

id/1087682

Kennedy, C. H. (2008). The Business Privacy Law Handbook. Artech House.

Quach, T. (2016, November 08). California Amends Data Breach Notification Law to Require

Notification of Breach of Encrypted Personal Information When Encryption Key Has

Been Leaked. Retrieved from proskauer:

https://privacylaw.proskauer.com/2016/11/articles/california/california-amends-data-

breach-notification-law-to-require-notification-of-breach-of-encrypted-personal-

information-when-encryption-key-has-been-leaked/

You might also like