Question

The laptop that was stolen was password protected; however, it did not contain any encryption software....

The laptop that was stolen was password protected; however, it did not contain any encryption software. While no reports of identity theft have been reported, it is unknown what has been done with the laptop or the information on the laptop. All individuals impacted by the data breach were notified by written letter of the data breach. Each of the individuals impacted are encouraged to continue to monitor their credit reports to watch for suspicious activity.

1. What could have been done to prevent this data breach from occurring?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

following methods have been done to prevent data breaching

a) patching and updating software as soon as options are available

b) ENCRYPTION for sensitive data

c) upgrading when software is no longer supporting by manufactuo

d) enforcing BYOD security policies

e) enforcing strong credentials and multifactor authentication

f) educate people or employee about best security practices and ways to avoid socially eengineered  attack .

Add a comment
Know the answer?
Add Answer to:
The laptop that was stolen was password protected; however, it did not contain any encryption software....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Cryptography is one of the most fundamental aspects of cyber-security. As we've seen, encryption and hashing...

    Cryptography is one of the most fundamental aspects of cyber-security. As we've seen, encryption and hashing are pervasive throughout computing. There are techniques such as SSL used to encrypt "data in transit" (data which is actively being sent over the network) and there are technologies that can be employed on your end devices to encrypt "data at rest" (data which is stored on a device or server). Recently, there has been some controversy over encryption. Once available primarily to the...

  • CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of...

    CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of Personnel Management (OPM) is conducted, may have been extracted. Government offi responsible for recruiting and retaining a world-class cials say that the exposure of security clearance irn workforce to serve the American people and is also mation could pose a problem for years responsible for background investigations on pro- spective employees and security clearances. In June the OPM system, and its records were protected...

  • MGMT SS STATS, an umbrella body that facilitates and serves various Social Security Organizations...

    MGMT SS STATS, an umbrella body that facilitates and serves various Social Security Organizations/Departments within the Caribbean territories, stood poised to meet the needs of its stakeholders by launching an online database, located at www.SSDCI.gov. The database will provide members and the public with access to the full set of services that can (also) be initiated face to face; and it will provide managed, private, secure access to a repository of public and/or personal information. For example, insured persons accumulate...

  • 90 Who Stole the X-Rays? Dale Buchbinder You are the CEO at Immaculata Medical Center (IMC)...

    90 Who Stole the X-Rays? Dale Buchbinder You are the CEO at Immaculata Medical Center (IMC) in a large urban city. It is Monday morning, and you have just been informed by the manager of the Radiology Department that some unknown person came on Saturday pre- tending to be a member of the company that disposes of outdated X-rays. One of the security guards directed this individual to the area where the old X-rays were stored Over a six-hour time...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e.,...

    Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e., utilitarian view, moral rights view, justice view, practical view) you feel are being used by both sides of the argument (i.e., for and against downloading) to justify their positions? High Court Enters File-Sharing Spat; Justices Must Determine Software Providers' Liability For Copyright Violations by Anne Marie Squeo. Wall Street Journal. (Eastern edition). New York, N.Y.: Mar 30, 2005. pg. A.2 WASHINGTON -- The Supreme...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT