Friday, November 23, 2012

Business Fraud - Ais Writing Assignment

Educational Credit Management Corp - ECMC, a schoolchild loan guarantee agency based off of Minnesota, announce on March 2010 that there was a security break in their establishment. Student loan borrowers had their mortalal education (names, well-disposed security numbers, addresses, and dates of birth at a minimum) stolen off of the exposit via portable media. In the article, Data Theft Hits 3.3 Million Borrowers, Pilon famed that this is believed to be the largest data breach of its kind and could affect as many as 5% of all federal student-loan borrowers (Para. 1). As a precaution, ECMC made arrangements with Experian, the acknowledgement protection agency, to provide credit monitoring services to borrowers affected by the data breach. In addition to the free credit monitoring services, borrowers will as well be given identity theft insurance reporting (Karnowski, 2010, para. 5). There be several types of security controls to prevent systems and/or information breach. The three controls that were apparently absent from ECMC headquarters were: credential controls, physical access controls and training controls. According to the text, Accounting training Systems, Romney (2009) distinguishes these as Preventative Controls (pp.
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
259) ECMC was very careful in cock-a-hoop details about the data breach, including if the culprit was known, so assumptions are necessary in identifying the control issues that were compromised in this case. According to Romney, trademark controls are those that focus on verifying the identity of the person attempting to access the system (pp. 259). It is possible that ECMC failed to require authentication controls from their employees. If employees were require to have ID badges or passwords to gain access to content highly sensitive areas perhaps the breach wouldnt have happened. Although it is unknown who the perpetrator was, it is possible that the portable media device containing the borrowers personal information was... If you want to get a full essay, order it on our website: Orderessay

Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.