Even complicated and confusing topics will be easily developed and covered if you request our help writing an essay. Place an order today!

Response needed, needs to seem like a dialogue:

The ramifications of the university database breach, especially one containing so much student information, ban be severe. While the database targeted did not contain credit card information, it did contain names, social security numbers, and personal addresses of numerous students and alumni of the university (Liebowitz, 2012). With this type information, identity theft is a major concern. Hackers with malicious intent can use social security numbers to open financial accounts, file for tax refunds, and obtain medical care (DiGangi, 2015).

A big vulnerability this specific case highlights is consolidating information into one area or database. Having all the information of students and alumni in one place undoubtedly makes operations for the university easier, but also makes it easier to steal a lot of valuable information all in one event. The university was also storing information of applicants who may have never actually registered and attended the school which is also a problem as this information most likely does not need to remain in the system (Liebowitz, 2012).

If I were the CISO of the U of Nebraska, I would make the typical recommendations of strong security in layers involving firewalls and access control. Additionally, I would recommend the database be separated into two different groups of active students and former alumni. People who have applied but never attended courses could be archived for up to a year but then their information would need to be dropped. Also, I would recommend implementing strong encryption of the database and deploying some type of context-aware access control method which could block access based on where authentication is occurring or time of day as well (Kearns, 2015).

References:

DiGangi, C. (2015, January 17). What an ID thief can do with a social security number. Retrieved from http://blog.credit.com/2015/02/5-things-an-identit...

Kearns, D. (2015, February 18). How we can prevent another Anthem breach. Retrieved from http://www.darkreading.com/attacks-breaches/how-we...

Liebowitz, M. (2012, June 4). U of Nebraska data breach affects 650,000. Retrieved from http://www.nbcnews.com/id/47678637/ns/technology_a...

testimonials icon
/*! elementor - v3.6.5 - 27-04-2022 */ .elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading...
testimonials icon
Who ‘owns’ traditional medicine? Does any group have a claim to ‘traditional’ beliefs, practices, or the ph...
testimonials icon
Short answer questions1.What is learning? Define what is a learning organisation?2.List five potential formal and five potential...
testimonials icon
Surname 1NameInstitutionInstructorDateInformation technology & supply chain1. Describe how packet switching works?Packet switching is a type of n...
testimonials icon
A train leaves Philadelphia at 5:00 PM. A second train leaves the same city in the same direction at 7:00 PM. The second train travels 30 mp...
testimonials icon
Imagine that you were tasked to redesign a Primary Care facility in your local community. You facility should include ele...
testimonials icon
World View Chart AssignmentsDue Weeks 2 through 10 and worth 35 points each week, with a total of 315 points.  A worl...
testimonials icon
Running Head: Florida Statutes on RobberyFlorida Statutes on RobberyStudents NameInstitution Affiliation1Florida Statutes on Robbery2Florida statutes...
testimonials icon
I want you to correct my project, and the excel sheet to meet specific requirments...
Calculate Price

When you use PaperHelp, you save one valuable — TIME

You can spend it for more important things than paper writing.

Approx. price
$65
Order a paper. Study better. Sleep tight. Calculate Price!
Created with Sketch.
Calculate Price
Approx. price
$65