Question: SCENARIO: Two encrypted laptops containing Protected Health Information ( PHI ) were stolen from a locked conference room at a client location. These laptops were

SCENARIO:
Two "encrypted" laptops containing Protected Health Information (PHI) were stolen from a
locked conference room at a client location. These laptops were assigned to IT employees
working on a data migration project.
FINDINGS:
A law enforcement investigation determined a security guard responsible for securing the
incident location had stolen the two laptops, one of which was recovered by the company.
After a thorough investigation and analysis of the recovered computer, no evidence was
found indicating unauthorized network intrusion or that PHI was accessed after the computer
was stolen. Computer analysis determined that IT employees had stored PHI on an
unencrypted partition on the local hard drive. The investigation team determined that over a
million members data may have been breached.
ATTACK:
For the given scenario, identify and explain the type of Attack?
IMPACT:
What could be the operational/ financial/ security impact of above attack on the organization.
SECURITY MEASURE/ CONTROLS:
By applying layering approach as shown in figure, how you can help the company to
implement a series of policy, technical and corporate culture changes, coupled with employee
education, to help prevent the risk of future data breaches. (write THREE security control for
each layer)
SCENARIO: Two "encrypted" laptops containing

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Finance Questions!