logo

The Data Security Breaches - WRTG 393

8 Pages2326 Words326 Views
   

Added on  2020-03-01

About This Document

WRTG 393 - The following paper is based on Data Breach. Data breach is computer security breach. The paper discusses one incident that took place in June 2017 - Deep Root Analytics.  The data security breaches have advanced at such a arte that it seems to be almost impossible for the data to be kept unprotected for a single moment also as the hackers are always on the look about for such a situation where in they can enter the system of companies and steal crucial information which would hamper them.

The Data Security Breaches - WRTG 393

   Added on 2020-03-01

ShareRelated Documents
PART ACOMPUTER SECURITY BREACH TOOK PLACE IN JUNE 2017- DEEP ROOT ANALYTICSINTRODUCTIONThe data security breaches have advanced at such a arte that it seems to be almost impossible for the data to be kept unprotected for a single moment also as the hackers are always on the look about for such a situation wherein they can enter the system of companies and steal crucial information which would hamper them. In the year 2016, the Republican National Committee hired Deep Root Analytics , a data analytics company to collect crucial political data with regards the voters in the USA (Daitch, 2017). Chris Vickery who was working as a cyber risk analyst found out that the crucial and critical data that was gathered by Deep Root Analytics i.e. basically comprised of private information for nothing less than 200 million citizens of America was stored on an Amazon Cloud server and that too without any protection such as passwords or any such authentication for over a fortnight in the month of June 2017. The examination of the situation has confirmed that the data that has been leaked comprises of names, addresses, phone numbers, date of birth and Voter registration numbers that were mentioned in the Voter Ids of the voters(Newman,2017). ASSESSMENT OF THE ISSUEOn doing a complete examination of the said case, it is understood that the main reason behind the attack was Deep Root Analytics themselves and he negligence act conducted by them of storing data on the cloud without protecting the same. The researcher, Chris Vickery had found out that there was a flawed database which comprised data of
The Data Security Breaches - WRTG 393_1
almost all the voters who were registered and which was gathered by the said analyst. The main issue here was absence of any password which would help protect it from access from unwanted people. However since the same was missing thereby anyone with an internet connection could gain access of the information and thereby tamper it. Around a terabyte of data was breached due to negligence (Bertrand, 2017). The issue here was also that various files that were exposed had not originated from Deep Root. They are the total of outside data entities and organizations and Republican super PACs , which basically puts the attention onto the ever increasing data network and that had supposedly lent a helping hand to the current president of US, slender limits in key swing rates. Even though the data possessed by Deep Root contained facts and figures typical of any political campaign, yet the fact that it is crucial for immoral and malicious individuals and groups cannot be ignored (Cameron & Conger, 2017). The said issue propelled when the firm had updated their security settings early in the month of June 2017. Thus the main issue that can be understood from this kind of a data breach is that the analyst firm had obtained data from various other companies which contained data such as the type of campaigning that would help the President win the elections, the cost attached with the same, the kind of voters available etc. the files exposed were critical as they were data on the Democratic Senatorial Campaign Committee, Planned Parenthood and the American Civil Liberties Union (Walsh, 2017). The data breached also comprised of the preferences of the voters such as stem cell research and gun control. Thereby it can be rightly said that the carelessness on the part of the company made many people pay a price for it and that too the information was sensitive enough from the political perspective as well (Matthews, 2017).
The Data Security Breaches - WRTG 393_2
SOLUTIONS TO PREVENT SUCH HACKSSolutions are many which would help protection of such carelessness again in future. One of the most important was to ensure that if any updates have to be run on any previous data stored, then it is a necessity to ensure that adequate safeguards are installed. Even thoughDeep Root Analytics have assumed full responsibility for the occurrence of the breach, they have immediately on being aware of the same, have updated their security settings so that no further loss occurs. However, there should also be a system wherein after any updates being done, the system should by itself prompt about the lack of passwords or weak passcode. This would help protection as well as dealing with such a negligence in future as well (Lapdwsky, I2017). This is basically human error which can occur anytime, but such an error can be very disastrous for the whole country as it may lead to development of terrorism to a greater scale, hence these data analytics companies should either destroy off the data after the work is over or ensure security is not lacked at any moment whatsoever. CONCLUSIONThere on a concluding note, it is understood that the staff of Deep Root Analytics were very careless and had a negligent attitude which led them to forgetting of checking the security settings once the system was duly updated. Storing any data in cloud definitely provides more space to the organizations, but at the same time they end up exposing the sameto a huge arena of hackers who are always on the verge of stealing data and tampering them or playing unwanted games with the information. Deep Root Analytics although has presently taken care of the same and also confirmed that as per them not much of tampering have been done, yet they should ensure that the person behind the same should be thoroughly trained again.
The Data Security Breaches - WRTG 393_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Assignment | Voter Records Breach
|10
|2492
|149

Report On Internet Security In Conducting Elections
|10
|2652
|51

Cyber Attacks and Computer Security - Report
|12
|2768
|43

Security Breaches And Ransomware | Assignment
|10
|2263
|35

Search the Web for News on Computer Security Breaches
|7
|2118
|43

Computer Security Breach: Torrance Memorial Medical Center
|9
|2442
|105