Question
1.
2.
3.
questions please
ired in asures? ree types i which they live, census data, and highest vided by the broker, you could establish an the list to identify likely purchasers of your dealershint s potential customers. List the advan level of education achieve Using surveillance ould you recommend this means of promotion in this autos and then send emails ts om should be hould such us Cases instance? Why or y r 1. Serious Data Breach at OPM The U.S. Office of Personnel Management (OPM) is an independent agency df ernment that assists other federal agencies in hiring new employees, conducting baied check investigations, and managing pension benefits for retired federal employees and the families. The agency maintains data on millions of federal govermment employees, netrnen contractors, and prospective employees. These data were recently compromised rate but related data breaches at the OPM, raising concerms not only about potential theft and blackmail but also about the possible use of that data in intelligence operations launched against the United States. e the following sures must you tie Protection Act? her and believes sh ked you to helph Early in 2015, OPM discovered that the personnel data (tull name,bith date,home address, and Social Security numbers) of 4.2 milion current and former federal govemmert employees had been stolen. Then, in June 2015, OPM announced that the background invest gation records of 21.5 million current, former, and prospective federal employees and contrac tors h ad been stolen as the result of a second data breach During a hearing in front of the House Oversight and Reform Commite shorty ater surprised to of the firm asking e archive and or her reque owness of h your employer second breach was announced, OPM's edged that the Chief Information Officer Donna Seymour e information compromised in the data breach included SF-86 dala udication information." Current and prospective federal employees and senvice o require a security clearance must complete the SF-86, a 127 -page questionaire asks for information about family members, frien ds, employment histony with foreign nationals, details on alcohol and drug use picies, arrest records, and court actions. The documen also includes infomation from during the previous 10 years. ocal law enforcement where the individual lived, worked, or measurest Adj udication information includes additional pers The information is obtained through peroommatleos about The ions being catio includes additional personal information that s di sidered for initial or continued eligibility for access to with the applicant but also with personal interviews not only w debt gt Adjudication information can include neighbors, references, roommates, significant data to he ads for a divorce, and information about a hsorytual more than aio data that were breached at the OPM also While hn 5.6 million people ven le rsonally identifiable information e rity experts are more the information to run concerned that a nation or even a crimina the operat gence operations against the United States
Explanation / Answer
Ill be answering these questions based upon the images that you have provided and ill also be mentioning the page no's and paragraphs in which i found the answers.Hope this helps.
(from page no 176 first paragraph) (1) U.S Department of Defence and OPM awarded a $133 million contract to identity Theft guard Solutions LLC to provide 10 years of credit monitoring and identity theft protection for 21 million people whose personel information was stolen.
(page no 176 points) (2)Foreign power and/or terrorists could use the stolen data to mount intelligence operations against the United States by neautralising US officials and agents by exploiting their personel weaknesses and/or tagetting their relatives abroad,during the breach they could have tampered the data and granted security clearances to people who might have been recruited in advance to work for the attackers.Likely agents of CIA could be identified as their background checks were not managed by OPM and the employees whose data was not stolen in breach were likely candidates of CIA.
(page 177 last paragraph) (3) OPM has claimed that it achieved significant progress in improving cybersecurity on its systems following the data breaches.It has implemented multifactor authentication,modernized the information technology infrastructure,appointed a new senior cybersecurity adviser,and formed a new organisation responsible for background checks on employess and contractors.That new entity name NBIB,became operational in october 2016,runs on information systems managed by the Pentagon.I think these actions would be effective to control such breaches from happening as the information systems are now monitored and maintained by several high level government organisations such has pentagon which are known to be the USA's headquarters for Defence.