Milestone 4 In Milestone 4 you are going to create a PowerPoint presentation that evaluates your previous 3 milestones. The PowerPoint presentation i

Milestone 4
In Milestone 4 you are going to create a PowerPoint presentation that evaluates your previous 3 milestones. The PowerPoint presentation is a minimum of 8 slides that analyze all the major findings from your research. The title and reference slide does not count toward the presentation. You must properly APA format the slide. Utilize all the guidance from the residency to develop your PowerPoint presentation.

Note: Previous Milestones 1,2 and 3 are attached to the work.

Don't use plagiarized sources. Get Your Custom Assignment on
Milestone 4 In Milestone 4 you are going to create a PowerPoint presentation that evaluates your previous 3 milestones. The PowerPoint presentation i
From as Little as $13/Page

Running head: Capital One 1

Preventing Capital One Breach

Name: Rakesh Kalumula

Id: 002836752

2

The administrative factor that led to the security incident in the capital one left out a lot of

questions on how the intruder got in without the administration coming to notice. The capital one

data breach investigations took place and found that a Seattle resident by the name Paige

Thompson. She was involved in the computer fraud that led her to access about one hundred

million applications of credit cards and getting access to other data that was made possible

through the misconfigured firewall (Novaes Neto, 2020).

Thompson executed a command which later retrieved all security credentials for all the

administration account, which enabled her to copy more than seven hundred folders that were

hoisted by the amazonmaking confusion of how all this was made without the knowledge of

the administration. The administrative factors that were not secured led to this breach because

the capital one was not monitoring the credit cards and identifying protections to its members

over and over. Freezing of credit cards should be carried to ensure that if someone else tries to

access other people’s accounts, they will have to give passwords so that they access them. The

administration should also be proactive towards cybersecurity and give out knowledge to their

members about the cyber-attacks (Rao, 2016).

The physical control that led to this breach was that the capital one breach would have been

caused because there was no enough performance in monitoring services by the organization.

Thus if the organization did this, then they would have noted that they were being attacked.

Hence organizations are supposed to use available tools or monitor the systems consistently and

diligently because they are not supposed to assume the data integrity (Vorobiev, 2017).

3

Some of the technical issues that affected the capital one organization were that they did not use

appropriate software-defined perimeter type of technology. Thus they assumed they would not

have problems that made them not closing their cloud environment and software as a service for

access through their own devices, location, and users. Avoiding all these technical issues will

never be an effect on the capital one breach or to any organization (Novaes Neto, 2020).

Organizations should also be aware of their weakness and strengths. They should be able to fix

their weakness so that it wont be known to the outside people or hackers. This will be of benefit

since the hackers will not use their weakness to them so that they can cause breaches to an

organization (Rao, 2016).

4

REFERENCES

Novaes Neto, N., Madnick, S., de Paula, M. G., & Malara Borges, N. (2020). A Case Study of

the Capital One Data Breach (Revised).

Vorobiev, E. G., Petrenko, S. A., Kovaleva, I. V., & Abrosimov, I. K. (2017, May). Analysis of

computer security incidents using fuzzy logic. In 2017 XX IEEE International

Conference on Soft Computing and Measurements (SCM) (pp. 369-371). IEEE.

Rao, B. T. (2016). A study on data storage security issues in cloud computing. Procedia

Computer Science, 92, 128-135. Running head: MITIGATION OF SECURITY INCIDENT 1

Mitigation of Security Incident

Name: Rakesh Kalumula

Student Id: 002836752

MITIGATION OF SECURITY INCIDENT 2

Mitigation of Security Incident

The information technology has taken the world by storm, with a precedent pace in the

applications being conducted. Numerous benefits have come with the use of these technologies

with companies resorting to using these technologies to achieve their milestones. However, some

disadvantages have come with these advances; data breach cases have been rampant with the

Capital One case being the most vivid in this regard. The digital fraud that led to external access

of more than a hundred million clients` data being at risk meant that the impact was devastating.

Therefore, this paper calls for some of the most effective ways in which the incident would be

mitigated and the damage prevented from taking place.

First, the Capital One incident would have been prevented by the use of the zero-trust

technology coupled with a software-defined technology that only allows authorized individuals.

This is the first measure that should be considered in organizations of this caliber due to the

advances that have taken place in the world (Torkura et al. 2019, September). The organization

has employed people from different walks and its only through the use of strict control and

monitoring digital devices that the management will be able to identify any malicious activities

and prevent further damage from taking place. This would also mean that employees can only

access areas that they are allowed hence limiting chances of unknowingly breaching the facility`s

data.

Secondly, the company should assess the damage, identify the clients whose data was

breached, and initiate appropriate measures. In this regard, it would be important that the

company`s clients are trained in the best ways of having strong passwords. The passwords should

MITIGATION OF SECURITY INCIDENT 3

be strong enough to prevent any entry whenever from an intruder. This would also entail training

the clients on why they have to keep their passwords secret and not to share with anybody so that

they can avoid similar incidents that would put their data at risk (Chowdhury, Lau &

Pittayachawan, 2019).

Thirdly, there is no leaving anything for chances. The Capital One will be mitigated by

having in place a credit monitoring for all the affected clients. Its not clear if the data was used in

the breach but the management should not ignore anything at this level. As a result, both the

management and the clients will have to work hand in hand to ensure that there is no future data

breach. The use of sites like credit karma should be able to make an individual to easily identify

and notify the client of any activity taking place. Therefore, through the use of these alerts the

client and the management should be able to remain updated on any of the activities taking place

and initiate appropriate measures whenever required.

Besides that, the company also advocates for the freezing of the credit accounts to help in

the mitigation of the security incident. This will give the fraudsters a hard time accessing the

account but its not a guarantee that the account is secured. This is because access to one`s driving

license any official document one is likely to be allowed to access the account without the owner`s

consent. Therefore, this is not the most appropriate measure that can be applied at this level but it

helps in delaying the attack from taking place.

Finally, the overall mitigation measure for such incidents is being alerted on all fronts.

Both the clients and the management team have to be alert; this is an issue that requires collective

responsibility. As technology advances the management of these vices becomes complex.

Therefore, to effectively manage and prevent such incidents from taking place its critical that they

MITIGATION OF SECURITY INCIDENT 4

all remain alert and always upgrade their software system with the changes taking place in the

sector (Torkura et al. 2019, September).

In summary, Capital One breach is an incident that would have been prevented if

appropriate security measures were considered. However, due to mistakes committed initially,

there must be the use of appropriate mitigation measures to prevent such incidents in the future.

MITIGATION OF SECURITY INCIDENT 5

References

Chowdhury, P., Lau, K. H., & Pittayachawan, S. (2019). Operational supply risk mitigation of

SME and its impact on operational performance. International Journal of Operations &

Production Management.

Torkura, K. A., Sukmana, M. I., Cheng, F., & Meinel, C. (2019, September). SlingShot-Automated

Threat Detection and Incident Response in Multi Cloud Storage Systems. In 2019 IEEE

18th International Symposium on Network Computing and Applications (NCA) (pp. 1-5).

IEEE. Running head: SECURITY PROTOCOLS 1

Security Protocols

Name: Kalumula Rakesh

Id: 002836752

SECURITY PROTOCOLS 2

CAPITAL ONE

The data breach is an emerging challenge facing individuals, government, and private

sectors due to the advancement of information technology (Manworren, 2016). Data has become

an essential asset in many organizations and thus, increasing pursuit of hackers to access this

database illegally. Organizations have turned their effort in securing the information system;

however, this effort this operation has been undermined by various factors such as advanced

technology that empowers hackers, inside malice, weak system, and irresponsible users. Inside

malice is of the main contributor to a security breach; in this unauthorized access to the database

is facilitated by trusted people making it hard to managecapital One data breach robust

example inside malice.

The Capital One hack was conducted between in March 22 and 23 in 2019; The breach

was detected in June 2019. The system hacker gained access to customers information of almost

106 million clients and applicants. According to the report released by Capital One management,

the breach facilitated compromise of data related to clients’ credit card applications from 2005 to

2019 (Colby, 2019). The personal data exposed in this includes the name, date of birth, credits

scores, address, social security numbers, and transactional data. In a quick response, the firm

notified the clients whose data were exposed and canceled all the credit cards that were believed

to be exposed.

The data breach was conducted by former Amazon Web Service software engineer, Ms.

Thompson Paige. At the time of the attack, AWS hosted the capital One database. FBI

investigators noticed Thompson on her online activities that indicated suspicious activities

revealing data theft. Further, the investigation revealed that she was behind a group social

SECURITY PROTOCOLS 3

network group known as Seattle Warez Kiddies that conducted illicit hacking (Flitter, 2019).

The hacker is believed to be observing the firm data system while she was working at AWS and

identified the security weakness in the Capital One database.

SECURITY PROTOCOLS 4

References

Colby, C. (2019) Capital One data breach: What you can do now following bank hack. Retrieved

by May 30, 2020, from https://www.cnet.com/how-to/capital-one-data-breach-what-you-

can-do-now-following-bank-hack/

Flitter, E.& Weise, K. (2019) Capital One Data Breach Compromises Data of Over 100 Million:

New York Times. Retrieved by May 30, 2020, from

https://www.nytimes.com/2019/07/29/business/capital-one-data-breach-hacked.html

Manworren, N., Letwat, J., & Daily, O. (2016). Why you should care about the Target data

breach. Business Horizons, 59(3), 257-266.

https://www.cnet.com/how-to/capital-one-data-breach-what-you-can-do-now-following-bank-hack/

https://www.cnet.com/how-to/capital-one-data-breach-what-you-can-do-now-following-bank-hack/