identity to include regularly changing and safeguarding online passwords, upgrading security
scans to keeps computers protected from viruses. However, personal and sensitive information
exists online, and it is vulnerable even when safety measures are in place. This vulnerability led
to a compromise of the Office of Personnel Management (OPM) database and sensitive
information was obtained by unauthorized sources. Living in the information age is exciting and
convenient. People can sit at their computers and conduct research without ever having to
consult a print-version encyclopedia, shop without ever having to leave the comforts of their couch, and see who is at the front door without letting anyone know whether someone is home or not. And just as cyber surfing has become part of everyday living, so has hacking. It goes with the territory, and to expect otherwise is to sell the technology short. There are several analytical reports on the recent Office of Personnel Management (OPM) hack. Reliable sources of information were used to provide a credible research paper. Utilizing different methods of conducting a research starts with formulating a research question. The research question delivers the initial fragment to identify resources that can provide legitimate data and verifiable information about the topic. Identifying proper resources during the research is a key element to providing thought provoking discussion. In addition, the level of understanding with the topic must be conveyed to portray full credibility of the research paper. Furthermore, assessing the current state of knowledge about the topic is useful in arranging the research to alleviate any confusion and present a proper message to the reader. Using qualitative research provides crucial? answers to the question about what may have caused the OPM hack. Qualitative research on how OPM database were hacked started with identifying behavioral patterns on how OPM handled its computer security measures prior to the cyber attack which caused millions of personnel records to be exposed. In addition, sensitive personal identifiable information, or PII, was compromised and is now in the hands of hackers. According to a Washington Post report dated July 9, 2015, there were two major …show more content…
Identifying quality reporting about
the OPM hack was the key factor in eliminating the "noise" on the Internet. Advocating qualitative research on how OPM may have been hacked shows the dynamic
nature of qualitative research. Structured survey is a huge part of qualitative research.
Furthermore, using every opportunity to investigate reports about the OPM hack will help us
understand how people behaved prior to the hack. Qualitative research enabled researchers to
go beyond initial responses and inconsistent rationales. Part of this research paper is an
interview conducted of one of the victims of the hack whose information was part of the
compromised data from the OPM database. The hackers success in infiltrating the OPM database
showed vulnerabilities within the system. The OPM breach was motivated by highly dedicated
adversaries that may receive and recruit sources from within. Larger organizations are prone to
attacks similar to the OPM hack due to its size and anomalies in the system. Hackers often
monitor online and system activity that can be identified through operational patterns. Human
behavior played a major role in a systematic approach that hackers used to detect