* Examples of unauthorized disclosures in 2005 Basic principles of information assurance and of security in general move us to establish mechanisms for defending valuable resources, methods for testing our mechanisms and then continuous process improvement to keep the mechanisms under revision to meet changing needs. We also need plan for failures.Business continuity planning and disaster recovery planning cope with longer-range effects of computer security incidents; incident response plans cope with the immediate aftermath of a security breach.Unfortunately, the year 2005 has provided more examples of the need for such response plans than any goodhearted person would wish on the victims. Here are some pointers to cases of unauthorized data disclosure and system penetration. If you don’t have response plans in place, ask your upper managers what your organization would do if something like these disasters happened to you.Unauthorized disclosures In January 2005, Harvard University was discovered to be leaking data through a badly configured Web site. Confidential prescription drug purchase information about employees and students was easily available to strangers in violation of Health Insurance Portability and Availability (HIPAA) regulations.In February, the Australian Web site for Acer computers revealed details of recent orders to other shoppers, including contact and delivery addresses (but not credit-card numbers). Also in February, a vulnerability in the Mailman open source program for e-mail lists was used to steal the password file of the Full Disclosure discussion group.ChoicePoint allowed criminals to buy accounts; the thieves then stole the credit reports of about 145,000 consumers. ChoicePoint officials themselves discovered the fraud by noticing abnormal patterns of searches carried out by the identity thieves. The case came to light in February in part because of California’s stringent new laws requiring data subjects to be informed of possible unauthorized disclosure of their data.Carnegie Mellon University, home of the highly respected Software Engineering Institute and Computer Emergency Response Team Coordination Center, discovered in April that data about 5,000 alumni, current graduate students, applicants and employees had been exposed to unauthorized access.In May, Purdue University, home of the Center for Education and Research in Information Assurance and Security, reported the third security breach of 2005 allowing unauthorized access to confidential records of faculty and students. This time, more than 11,000 people were informed of possible compromise of their personal information, including Social Security numbers.In July, applicants to the University of Southern California discovered that the application data of several hundred thousand other applicants were exposed to view online.Cisco left user passwords exposed on its Web site, but closed the hole the day it was reported in August and reset all the passwords for its users. Spokespeople for the company said no sensitive data were compromised by the breach of security. In December, the _Salem News_ reported that student psychological records, including detailed case reports, were left unprotected on their school’s Web site for at least four months.So what would you do if something like these incidents happened at _your_ site? Are you ready to handle:* The technical issues: identifying the problem, collecting and preserving evidence, measuring the extent of the damage and repairing the breach?* The legal issues: identifying the victims, complying with contractual and other legal obligations to inform and protect them against the possible consequences of unauthorized disclosure of personal data, coping with psychological trauma and damaged morale, and deflecting personal lawsuits? * The public-relations side: having a single spokesperson who has the facts, telling the truth, responding promptly to stakeholder concerns and having public information available in an appropriate way?Next time, I’ll look at some of the highly visible penetration cases that occurred in 2005. Related content news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking news Gartner: Just 12% of IT infrastructure pros outpace CIO expectations Budget constraints, security concerns, and lack of talent can hamstring infrastructure and operations (I&O) professionals. By Denise Dubie Dec 07, 2023 4 mins Network Security Data Center Industry Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe