Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

 Case Study Analysis

Overview: This case study analysis will help you analyze a cybersecurity scenario and identify which principles were violated.

Prompt: Use the articles  resources to analyze the cybersecurity occurrence, determine which principleswere violated, and recommend appropriate policies to prevent recurrence.HERE ARE THE LINK OF THE ARTICLES:

http://www.csoonline.com/article/2881532/business-continuity/anthem-how-does-a-breach-like-this-happen.html
https://www.technologyreview.com/s/535111/encryption-wouldnt-have-stopped-anthems-data-breach/
http://www.computerworld.com/article/2880541/state-sponsored-chinese-hackers-suspected-in-anthem-breach.html

Scenario: In February 2015, as many as 80 million customers of the nation’s second-largest health insurance company, Anthem Inc., had their account information stolen. This compromise affected customers in at least 14 different states where Anthem provided services.

The hackers gained access to Anthem’s computer system and got information including names, birthdays, medical IDs, Social Security numbers, street addresses, email addresses, and employment information including income data. Both current and former customers were exposed during this breach.

So, while this was an attack against a medical provider and it resulted in a massive data breach, regulatory requirements were not sufficient to help prevent this breach. Because no actual medical information appears to have been stolen, the breach would not come under Health Insurance Portability and Accountability Act (HIPAA) rules, which govern the confidentiality and security of medical information.

Based on the TestOut sections from this module and the additional module resources you have reviewed, your paper should address the following critical elements:

  • Identification of cybersecurity principles that were violated and rationale ofcause
  • Analysis of cryptography that would have helped prevent thisbreach
  • Recommendation of additional policies that would have been useful to mitigate the breach or even prevent thebreach

Guidelines for Submission: Your paper should be submitted as a 4- to 6-page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. All academic sources must be cited following the latest APA guidelines.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"