Sign In
Not register? Register Now!
Pages:
3 pages/≈825 words
Sources:
3 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 16.2
Topic:

Current Affairs Report IT & Computer Science Paper (Other (Not Listed) Sample)

Instructions:

Current affairs report
Please write an analysis report about the recent attack on the US Office of Personnel Management. In the report, please answer the following questions:
1- What type of attack was launched on OPM?
2- What was compromised or breached?
2- How was the attack accomplished if known?
4- Your own analysis and feedback about the attack?
5- Who are the victims? What are the implications for them?

source..
Content:


Attack on the US Office of Personnel
Name
Institution
Attack on the US Office of Personnel
Technologies have continued to change over time to meet the emerging demands of users. In the same situation, technologies meant to support accomplishment of malicious tasks have also continued to emerge to keep abreast with such changes. The latter situation puts systems at risks of facing attacks. This has led to serious attacks on information system. This was the case when the personal information of employees held by the Office of Personnel Management (OPM) became the subject of attack by cybercriminals. In view of this, this paper explores issues underlying the attack, including the type of the attack, victims, implications, and possible causes.
The attack was a cybercrime. It involved hacking of government computers under the care and custody of the OPM Agency. It took place in various occasions. The attack compromised the integrity of personal data belonging to various citizens. The information was sensitive and included health, addresses, financial history, and other private information (Davis 2015). Each person has a right to privacy of personal information. The attack was a violation of the privacy Act of 1974 that has provisions safeguarding against invasion of personal privacy through misuse or abuse of records held by federal agencies (DOS, 2016). 

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Cyber Infrastructure It & Computer Science Research
    Description: Organizations are always prone to common network vulnerabilities such as insecure ports, weak password encryption, poor firewall exploitation, and short of appropriate security policy. Due to this organizations and companies have developed cyber-security policy to manage the risk of security exposure...
    1 page/≈275 words| 1 Source | APA | IT & Computer Science | Other (Not Listed) |
  • HTML sample IT & Computer Science Research Paper Essay
    Description: Are you looking for research paper writing service or help with your PhD research? Get help from Academia Research on any topic from our experienced research paper writers.Our team of skilled writers delivers high quality, 100% original content within the shortest time in creative writing and writing...
    1 page/≈275 words| No Sources | APA | IT & Computer Science | Other (Not Listed) |
  • Database Management IT & Computer Science Research
    Description: Structured query language is used for communication in database as highlighted by Beaulieu (2009). It is the typical language for interactive database management structures. The system is made up of three constituents which include; data control language (DCL), data manipulation language...
    2 pages/≈550 words| 3 Sources | APA | IT & Computer Science | Other (Not Listed) |
Need a Custom Essay Written?
First time 15% Discount!