Public-Key Cryptography Analysis

Improved Essays
An administrator came to realize that their credentials had been used to run a query that they would not normally run, this would be a violation of separation of duties; which means that “any task in which vulnerabilities exist, steps within the tasks are assigned to different positions with different management”. Meaning that the attacker would have only been able to use this vulnerability through this employee because of their role in the copy, and other employee would have not had the ability to run this query. The attacker used job listing sites to narrow down what software Anthem uses to house their data; from their they used this public information to sort out over 100 employees that had access to this data. The attacker then used malware to get a hand full of employee’s credentials. Even though it is said that to keep all the personal information stored in Anthem’s computer system encrypted would have not stopped or prevented this attack because these attackers had done their research and knew what credentials they would need to perform the attack, no matter how the information was stored they still would have been able to access it. The one thing that could have been done is using cryptography for all the employee’s, especially those whom can use their credentials to perform special task. …show more content…
This form of cryptographic would give them a public key and a private key, the public key any random set of numbers and letters that would match up with the private key but the private key would only be displayed once while attempting to complete a task which is only good for 5 minutes if they user doesn’t input the out come of the two within the time frame they will be required to generate a new private key in order to move

Related Documents

  • Improved Essays

    After analyzing the current situation of accounting firms, it seems that this organization understands the importance of information security but it is severely lacking. This requires to introduce a user training program to make every employee understands the importance of how they behave themselves every day in protecting the company’s network…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    This will keep their data secured and confidential. Sign in and sign out system also can be used for visitor. When the visitors arrives they sign in and when they out they sign out, this will help the organisation to identify what visitors are in the building and who was in the building. If anything happens in the building with that time they signed up, the organisation will know who was in the building and that will help them to investigate who caused the problem. Biometrics…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Companies should train their employees (not only IT employees) to be caution in the use of their credentials, and to report any suspicious email or activity in their accounts. Anthem’s officials acted quickly. They notified FBI after noticing unusual network activity. Time played an important role in this case, and the early intervention of the FBI avoided the hacking to extend much more. Anthem changed all the passwords as soon as they knew about the breach.…

    • 552 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Given the University’s many diverse systems and disparate departmental roles managing the various systems the overall information security plan was not update to date nor consistent. There were obvious holes in the security plan which allowed a hacker to infiltrate the main domain server. The hacker secured administration rights on the server and they managed to infect other systems attached to the network. Thankfully, a trail of clues were found by the administrators.…

    • 671 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In certain cases, employee owned computers are being used to make a vpn connection to the corporate data center. In the course of normal business, remote users access non-public information and sensitive corporate data. There are two distinct security issues associated with the current method of remote computing. First, regulatory requirements require that non-public information at rest must be protected by encryption. Additionally, corporate policy requires sensitive corporate data at rest must be protected by encryption.…

    • 501 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    A number of attacks were overlooked by the IT staff in there evaluation. They missed the fact that a man-in-the-middle attack was used to eavesdrop on the entire network. This is how the disgruntled employee was able to stop and altered the notification email from the auditor to the president and some other employees. They missed the fact that a rouge device was used to carry out the attack.…

    • 1877 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Azman's Article Analysis

    • 215 Words
    • 1 Pages

    As published in the ABA Journal (2016) Azman, a lawyer that was fired from the law firm where he used to work, used computer access codes and logins to delete e-mails from Piscitelli’s computer (his former boss) as well as peers. According to the article the employee who had been fired attempted to black mail his former boss by telling him that would steal his clients, criticize and disparage his performance and reputation. When Piscitelli warned the former employee (Azman) that he would take legal actions if he acted upon his treats, Azman used credentials he had gained access from work to delete e-mail communication about his threats to his boss Piscitelli. Information security is a major issue not only for personal computer users…

    • 215 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Public Key Infrastructure is a comprehensive subject that is constantly developing to meet high growing demands of the business word. PKI is one of the most effective way for securing networks. The encrypted information that is sent is delivered using a public key. An individual is able to provide the public key to the sender, or the key can be retrieved from the directory from where it was published. PKI works in concert of other security mechanisms to help protect vital information (Weise, 2001).…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Vulnerable Password Effect on HIPAA Introduction The University of Mississippi Medical Center suffered from multiple HIPAA violations. An unofficial visitor to their campus had stolen one of their laptops, and due to the fact that UMMC’s network was unprotected because they used a universal username and password. The active directory containing 67,000 files was exposed to danger! There was an estimation of 10,000 patients files dating back to 2008 and he optical character recognition affirms that the university failed to disclose the individuals whose ePHI was believed to have been accessed.…

    • 544 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    HealthIT Topic of Week Valerie Ritter Chamberlain College of Nursing Nursing Informatics NR 512 Dr. Rebecca Glenn October 1, 2016 HealthIT Topic of Week Nursing informatics has an impact on every advanced practice profession in nursing. The impact that it plays on the nurse executives holds so much importance. According to Simpson (2013), nurse executives sit at the executive table during technology evaluations and routinely find themselves ill prepared to debate with their physician counterparts.…

    • 1241 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Nowadays, continuity of care has never been so easy. The creation of Electronic Health Records(EHR) has made it so easy for healthcare workers to access patient medical records for an efficient and accurate care. Every healthcare Institution under HIPAA is responsible for the protection of maintaining patient records, regardless of whether they use a vendor to process or store their patient information. It’s so important that privacy and security must cover all of healthcare company’s health information systems for HIPAA compliant of EHR. A newly revised HIPAA Security Rule requires providers to assess the security of their database, application, and system that contain patient data for maintaining a secure EHR system.…

    • 520 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Great Essays

    Hacking In Healthcare

    • 1225 Words
    • 5 Pages

    Introduction Hacking the Healthcare System Healthcare has the highest cyber-attacks in the industry. This is only growing. Nearly half of all health care organizations have reported criminal attacks that caused a breach in their systems (Goodman, 2015). These hackers are gaining access to the electronic health information. Identification, banking information, and pharmacies used are just some of the data that these online hackers are getting their hands on.…

    • 1225 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays