preview

Unit 2 Assignment 1: Executive Summary

Decent Essays

Unit 2 Assignment 1: Executive Summary on Veteran’s Affairs (VA) and Loss of Private Information • Mistakes committed by both the employees and the Veteran’s Affairs Administration that lead to data loss. o Employee taking home records on 26.5 million veterans  Records were subsequently stolen by a burglar o The data included names, SSN’s, Date of births, disability ratings o Stolen laptop computer and hard drive containing sensitive data for up to 26.5 million veterans, their spouses, and active duty military personnel have been found. o The veterans affairs had given permission in 2002 for the analyst, from whom the equipment was stolen, to work from home with data that included millions of SSN’s, disability ratings, and other personal information. o …show more content…

o Equipment such as laptops with such valuable information should have not been taken home. o Most encrypted protocols include a hashing algorithm to ensure no data was altered in transit. This can also help defeat “Man in the Middle” attacks, because by decrypting and re-crypting data, the attacker will alter the signature even if they don’t change any of the key data. o Encryption in transit should be mandatory for any network traffic that requires authentication, or includes data that is not publicly accessible. You do not need to encrypt your public facing website, but if you want customers to logon to view things, then you should use encryption to protect both the logon data, and their privacy while they access your site. o Encryption of data stored on media is used to protect the data from unauthorized access should the media ever be stolen. o Physical access can get past file system permissions, but if the data is stored in encrypted form and the attacker does not have the decryption key, they have no more than a useful paperweight or a drive they can format use for something

Get Access