Question

In: Computer Science

Select one of the laws from the NIST document to discuss: -What is the law? -What...

Select one of the laws from the NIST document to discuss:

-What is the law?

-What are some of the key considerations related to the law you selected?

-Can you find an example of a breach that compromised the law you selected?

-For example, in the Equifax breach, credit history information was stolen. What laws were broken?

-What were other legal consequences to the breach?

-Can you find another example?

Solutions

Expert Solution

a) With the advancement in technology, computer science is being widely used in almost every fields. So, National Institute of Standards and Technology has come up with several laws based on cyber security and supports overall mission to advance US’s innovations and industrial advancements by empowering standards and related technology through various development in the field of cyber security. NIST’s cybersecurity Act seeks to enable development and implementing innovative technologies to secure the data in IT fields.

b) key considerations regarding Cyber Security Act:

  • This law focusses on disseminate clear and concise resources that are being used in helping businesses to reduce the cyber security risk.
  • The Act must be implemented on wide ranges of businesses starting from small businesses to large IT giants. This Act promotes cybersecurity awareness among the companies and introduce the security strategy.

c) The OPM (US Office of Personnel Management) where personal information of near about 22 million current and former federal data has been leaked. Here the NIST law has been compromised in this data breach.

d) in the Equifax breach, personal information such as Social Security Numbers, addresses, date of birth and even driver license number has been hacked. The number of users is reported to be nearly 143 million consumer and more than 209000 user’s credit card details has been exposed. This is totally against the Cyber Security Act which has been implemented by NIST. All the personal information has been leaked from Database and this is against the NIST act. Application vulnerability of their website led to this attack. Company’s negligence towards NIST security implementation has done the damage.

e) The Federal Trade Commission checks the impact of the data breach and the impact on the business happened. Based on that, a charge that company has to bear if it is found that they haven’t implemented the law properly on their network. It fine amount could be millions of dollars based upon the impact on the amount of data breached.

f) the WannaCry ransomware has almost hit 150 countries IT companies, where they demanded money to open the files. This ransomware encrypts the file and demanded a payment in Bitcoin in order to decrypt the files. Many US based IT companies were affected by this virus. here also companies negligency towards cyber security cause the virus to affect the business.


Related Solutions

1) Discuss Newton's three laws of motion. Show that the second Law implies the First Law.
    1) Discuss Newton's three laws of motion. Show that the second Law implies the First Law.   2) Usinh Newton's third law of motion ( Action - Reaction law ) explain how a rocketship is propelled.   3) In terms of Newtons's Universal Law of Gravitation, explain why Galileo found that al objects fall on Earth at the same rate, regardless of their mass    
Derive Laws of Black Body Radiation from Wien’s Law: uν = ν3F(ν/T) What is Stephen’s Law?...
Derive Laws of Black Body Radiation from Wien’s Law: uν = ν3F(ν/T) What is Stephen’s Law? Please Prove Stephen’s Law from Wien’s Law Please Prove Wien’s Displacement Law from Wien’s Law
BUSINESS LAW REAL ESTATE LAW What are the requirements for a "deed" (a document to transfer...
BUSINESS LAW REAL ESTATE LAW What are the requirements for a "deed" (a document to transfer title to property) to be valid?
Gas Laws Units in Gas Law Problems One problem associated with gas law problems is unit...
Gas Laws Units in Gas Law Problems One problem associated with gas law problems is unit agreement. It is important that pressure, volume and temperature units match or agree within a problem. Solve 1-4 using the factor-label method. Problems 5 and 6 are done without factor-label. 1. Convert 1.52 atm to kPa 2. Convert 85 kPa to mmHg 3. Convert 156.3 mmHg to atm 4. Convert 950 torr to kPa 5. Convert -250.0 °C to K 6. Convert 253 K...
what are the basic laws in electrical and magnetic circuit? Is faraday law,lenz law and fleming's...
what are the basic laws in electrical and magnetic circuit? Is faraday law,lenz law and fleming's right hand rule considered a law of magnetic circuit?
Under general incorporation laws, ________. Select one: A. incorporation is a legislative privilege as well as...
Under general incorporation laws, ________. Select one: A. incorporation is a legislative privilege as well as a right B. the secretary of state has to issue a certificate of incorporation C. incorporation is a legislative privilege, not a right D. the corporation's shareholders have to make a decision regarding incorporation
Select and describe three sections of the NIST framework which would have an immediate impact on...
Select and describe three sections of the NIST framework which would have an immediate impact on your organization’s security if implemented and justify why.
The relation  is known as Ohm's law Select one: True False
The relation  is known as Ohm's law Select one: True False
You want to transfer a document from one computer to another, and you want the document...
You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination computer is on another network, so you know data has to travel through one or more routers. The network technology on your network is Token and ring, but the technology on the destination network is Wi-Fi. From what you have learned about networking, should this document transfer work? Why or why not? Which layers of the OSI model are...
Choose either EMTALA, Anti-Kickback, or the STARK Law. Discuss why following these laws are necessary and...
Choose either EMTALA, Anti-Kickback, or the STARK Law. Discuss why following these laws are necessary and the challenges health care professionals face in upholding these laws. Provide an example of an organization that violated one of these laws and the consequences they faced.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT