Milestone 2 In the first milestone, you identified a recent security incident that took place. There were multiple incidents that were chosen such as

Milestone 2
In the first milestone, you identified a recent security incident that took place. There were multiple incidents that were chosen such as Target, OPM, Equifax, Home Depot, Capital One and so many more.
In the second milestone, you will access the administrative, physical, and technical controls of the particular company then determine which one of these administrative, physical, and technical controls were not secure and led to the security incident.

Guidelines for Submission: Your paper must have a title and reference page, be submitted as a two page Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format. As a reminder, every assignment goes through a plagiarism checker so follow all the guidelines that we have discussed as you read your articles, books, etc. and summarize the author’s thoughts.

Don't use plagiarized sources. Get Your Custom Assignment on
Milestone 2 In the first milestone, you identified a recent security incident that took place. There were multiple incidents that were chosen such as
From as Little as $13/Page

Running head: SECURITY PROTOCOLS 1

Security Protocols

Name: Kalumula Rakesh

Id: 002836752

SECURITY PROTOCOLS 2

CAPITAL ONE

The data breach is an emerging challenge facing individuals, government, and private

sectors due to the advancement of information technology (Manworren, 2016). Data has become

an essential asset in many organizations and thus, increasing pursuit of hackers to access this

database illegally. Organizations have turned their effort in securing the information system;

however, this effort this operation has been undermined by various factors such as advanced

technology that empowers hackers, inside malice, weak system, and irresponsible users. Inside

malice is of the main contributor to a security breach; in this unauthorized access to the database

is facilitated by trusted people making it hard to managecapital One data breach robust

example inside malice.

The Capital One hack was conducted between in March 22 and 23 in 2019; The breach

was detected in June 2019. The system hacker gained access to customers information of almost

106 million clients and applicants. According to the report released by Capital One management,

the breach facilitated compromise of data related to clients’ credit card applications from 2005 to

2019 (Colby, 2019). The personal data exposed in this includes the name, date of birth, credits

scores, address, social security numbers, and transactional data. In a quick response, the firm

notified the clients whose data were exposed and canceled all the credit cards that were believed

to be exposed.

The data breach was conducted by former Amazon Web Service software engineer, Ms.

Thompson Paige. At the time of the attack, AWS hosted the capital One database. FBI

investigators noticed Thompson on her online activities that indicated suspicious activities

revealing data theft. Further, the investigation revealed that she was behind a group social

SECURITY PROTOCOLS 3

network group known as Seattle Warez Kiddies that conducted illicit hacking (Flitter, 2019).

The hacker is believed to be observing the firm data system while she was working at AWS and

identified the security weakness in the Capital One database.

SECURITY PROTOCOLS 4

References

Colby, C. (2019) Capital One data breach: What you can do now following bank hack. Retrieved

by May 30, 2020, from https://www.cnet.com/how-to/capital-one-data-breach-what-you-

can-do-now-following-bank-hack/

Flitter, E.& Weise, K. (2019) Capital One Data Breach Compromises Data of Over 100 Million:

New York Times. Retrieved by May 30, 2020, from

https://www.nytimes.com/2019/07/29/business/capital-one-data-breach-hacked.html

Manworren, N., Letwat, J., & Daily, O. (2016). Why you should care about the Target data

breach. Business Horizons, 59(3), 257-266.

https://www.cnet.com/how-to/capital-one-data-breach-what-you-can-do-now-following-bank-hack/

https://www.cnet.com/how-to/capital-one-data-breach-what-you-can-do-now-following-bank-hack/

Leave a Comment

Your email address will not be published. Required fields are marked *