Opm Hack

Improved Essays
With the expansion of technology and the Internet, people fiercely protect their online

identity to include regularly changing and safeguarding online passwords, upgrading security

scans to keeps computers protected from viruses. However, personal and sensitive information

exists online, and it is vulnerable even when safety measures are in place. This vulnerability led

to a compromise of the Office of Personnel Management (OPM) database and sensitive

information was obtained by unauthorized sources. Living in the information age is exciting and

convenient. People can sit at their computers and conduct research without ever having to

consult a print-version encyclopedia, shop without ever having to leave the comforts of their couch, and see who is at the front door without letting anyone know whether someone is home or not. And just as cyber surfing has become part of everyday living, so has hacking. It goes with the territory, and to expect otherwise is to sell the technology short. There are several analytical reports on the recent Office of Personnel Management (OPM) hack. Reliable sources of information were used to provide a credible research paper. Utilizing different methods of conducting a research starts with formulating a research question. The research question delivers the initial fragment to identify resources that can provide legitimate data and verifiable information about the topic. Identifying proper resources during the research is a key element to providing thought provoking discussion. In addition, the level of understanding with the topic must be conveyed to portray full credibility of the research paper. Furthermore, assessing the current state of knowledge about the topic is useful in arranging the research to alleviate any confusion and present a proper message to the reader. Using qualitative research provides crucial? answers to the question about what may have caused the OPM hack. Qualitative research on how OPM database were hacked started with identifying behavioral patterns on how OPM handled its computer security measures prior to the cyber attack which caused millions of personnel records to be exposed. In addition, sensitive personal identifiable information, or PII, was compromised and is now in the hands of hackers. According to a Washington Post report dated July 9, 2015, there were two major
…show more content…
Identifying quality reporting about

the OPM hack was the key factor in eliminating the "noise" on the Internet. Advocating qualitative research on how OPM may have been hacked shows the dynamic

nature of qualitative research. Structured survey is a huge part of qualitative research.

Furthermore, using every opportunity to investigate reports about the OPM hack will help us

understand how people behaved prior to the hack. Qualitative research enabled researchers to

go beyond initial responses and inconsistent rationales. Part of this research paper is an

interview conducted of one of the victims of the hack whose information was part of the

compromised data from the OPM database. The hackers success in infiltrating the OPM database

showed vulnerabilities within the system. The OPM breach was motivated by highly dedicated

adversaries that may receive and recruit sources from within. Larger organizations are prone to

attacks similar to the OPM hack due to its size and anomalies in the system. Hackers often

monitor online and system activity that can be identified through operational patterns. Human

behavior played a major role in a systematic approach that hackers used to detect

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Target Attacker Timeline Date 1: 10/8/2013. (Estimated date) Reconnaissance and scanning: Attackers acquired Fazio Mechanical Firm’s user code and password through a phishing email containing a Trojan called Citadel, a password sniffing bot program. The phished credentials provided access to Target’s payment system network. Extensive reconnaissance and scanning would have been needed in order to identify Fazio Mechanical as a Target vendor, and acquire the emails of employees that possessed the login credentials necessary to access Target’s systems. Date 2: November 11th 2013 (Around 34 days after date 1) Exploitation: Attackers first breach Target’s system.…

    • 591 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The recent airing of Ashley Madison's dirty laundry continues to be a hot topic around the internet. Two weeks ago, a group of hackers calling themselves 'Team Impact', breached the security of the controversial dating website and made away with the information of millions of users. Many outlets have combed through the near 10 gigabytes of data dumped by Team Impact onto the dark web, but this find from Gizmodo stands out.…

    • 291 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Most people can remember the Target breach, whether they were affected by it or not. Personally, this was the first big data breach that I remember, and I was one of the millions affected by it. While I do not shop at Target often of course I bought one thing from the store during the time of the breach. I was a nervous wreck, my wife was even worse. Luckily the only thing affected was our nerves and not our personal identities.…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    CSE 543: Individual Report

    • 1293 Words
    • 6 Pages

    We have done detail analysis of each and every entity in our report. The defense against attacks can occur only when the attack is known so that preventive measures can be put into motion. We have involved all the countermeasures White hat can use to prevent attack against Black hat. Recent anthem data breach affected 80 million individuals received multi-day coverage, sending shockwaves through the nervous public. This breach highlights the growing threat healthcare industry is facing.…

    • 1293 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    The term “Hacking” came around when two men (Steve Gold and fellow journalist Robert Schifreen) were convicted for forgery under the Act of Forgery and Counterfeiting of 1981. Also these two attackers gain access to the British Telecom Prestel account and got access to all of the Identification numbers of Customers. However, messages were left in the Duke of Edinburgh (Prince Phillip) private mailbox. They weren’t intentionally attempting to gain anything. They were both charged with this offence but in interest today, because of the obvious wrongness for distributing sufficiently with the attacker.…

    • 323 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Decent Essays

    Miller, J. and J. Miller., (2009). 21st Century Criminology: A Reference Handbook. 1st ed.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Data breaches by way of hacking is gaining popularity. This is evident from the recent cyber-attack on Anthem's information technology system. Hackers…

    • 733 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The cybersecurity business sector is persistently developing as society depends upon the improvement and usage of data innovation systems. The recent number of complex cyber incidents and breaches occurring in the United States has become more excessive. As new advances in technology rise, new security issues in network infrastructures has increased from previous decades. For example, unknown hackers were able to achieve once of the largest breaches of OPM network in history. According to the Michelle Singletary, a Columnist for the Washington Post, stated personal information — birth dates, home addresses and Social Security numbers — for 4.2 million current and former federal government employees was compromised.…

    • 1150 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Washington, a former aid to Democratic candidate Hillary Clinton has turned over security logs from Clinton’s private server to the FBI. Records of these security logs show no signs of foreign hacking. Former aid, Bryan Pagliano, describes how he initially set up the server in her home in New York. As secretary of the state, Clinton’s work related emails have been made public as part of the Freedom of Information Act lawsuit. After receiving sporadic emails, somebody clicked on a malicious link that was traced to Russia.…

    • 472 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Nothing was ever the same when I turned on my computer that morning, and I made a decision that would change the very course of history... It began as a typical day; soldiers parading down the streets, gray skies above... I turned on my laptop and opened my browser, but then an icon popped up at the bottom of my screen. "Informer97 has requested to chat with you" I glanced at it for a brief moment, and I didn't recognize that screenname...…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays