Compromised and Lost Data - Assignment Example

Comments (0) Cite this document
Nemours is a company, which manages the children’s health systems information data. In 2011, the firm claims to have lost some computer encoded backup tapes, which were been stored in the company’s facility based in Wilmington. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
Compromised and Lost Data
Read TextPreview

Extract of sample "Compromised and Lost Data"

Data compromise and loss affiliation Data compromise and loss Nemours is a company, which manages the children’s health systems information data. In 2011, the firm claims to have lost some computer encoded backup tapes, which were been stored in the company’s facility based in Wilmington. The ultimate consequence was the loss of huge information totalling to around 1.6 million of its patients, vendors, guarantors and employees who have ever worked at the company from the year 1994 to 2004 at its various facilities in Pennsylvania, Delaware, New Jersey and Florida. Those missing encrypted backup tapes comprised of social security numbers, names, bank account information on direct deposit, information on insurance, addresses, medical treatment data and the date of births.
Due to alterations in computer systems in the year 2004 the computer encoded tapes were kept in locked cabinets. Nemours says it lost the computer tapes during the period of remodelling its facility, which took place in August 10, 2004. It could have prevented loss of data by tagging the cabinets and put them in a register containing the name of the person who did the tagging, where they kept the cabinets and at what time, thus this could bring to accountability of the workers who did the tagging process and easy traceability of the cabinets. The cabins could also be moved to one single location in order to avoid tampering by the workers during the renovation process.
In order to prevent data from being compromised and lost, the right security measures should be put in place. In specific, there should be data recovery policy to respond effectively and swiftly to security breach. Moreover, there is need to appoint personnel who will be responsible in ensuring data quality data maintenance. In addition, strong procedures, rules and well-trained staff who are reliable should also be put in place in order to minimize data loss. Lastly, security measures should be organized and designed according to the data’s composition (Liu & Kuhn, 2010).
Due to numerous information loss, there also exists numerous ways of taking precautions to prevent data loss, for example, numerous power circuits with a generator and battery backup can only prevent loss of information emanating from power failures. Likewise, redundant array of independent disks storage and the journal filing system only prevent data loss arising from specific hardware and software failures. Consistent backup of information are a significant asset when trying to recover from loss of data. Nevertheless, they do not curb system failures and user mistakes.
Good approaches to protection of information ensure incidents of data loss are avoided completely. Such approaches includes procedures like sustaining network firewalls and antiviral protection, equally applying all printed system patches and security repairs. However, the most hard and important aspect of avoiding information loss is by educating the users on how to avoid making errors that endanger the security of information making it prone vulnerability. However, when an organizations data is lost or compromised, there exists steps that need to be taken to increase its chances of recovering the lost information. Firstly, whenever a storage media is affected, all operations that tend to alter or create data should be avoided completely. This comprises of activities like booting the system that is linked to the device that is affected. This is because in numerous operating systems booting may generate temporary files which occupy the region of information loss and this can make the retrieval of lost data completely impossible. Equally, also avoid operations like copying, altering and deletion of files whenever there are occurrences of data loss. The best thing to do in such situations is switching off the computer and taking away the drive containing data from the computer and re-attaching it to a lesser computer machine which has a write blocker device and try to recover the lost data to your level best (Hawkins, Yen, & Chou, 2000).
Often data recovery is carried out by experts who have already established effective recovery methods to retrieve data from impaired media. This experts provide specialized services and their charges usually depend on the type of security procedures required to be carried out on the damaged media and also the size of the media also counts a lot.
For successful retrieval of information lost, an operational backup strategy is required. In the absence of this effective strategy the process of recovering data entails reinstalling programs and redeveloping data. The cost of retaining the capability of recovering data lost for long durations should also be considered when formulating an operational backup strategy.
Even with good backup strategies, reinstating a system to its previous state can be an uphill task thus data recovery procedures also consider the time when the loss of information occurred and logically, data loss that occurred long ago tend to be difficult to recover compared to recent information loss. Lastly an operational backup strategy has proportionalities between the amount of effort required and the degree of information loss, for instance it is easier to recover single files that have been lost compared to recovering an entire system (Strunk, Goodson, Scheinholtz, Soules, & Ganger, 2003).
Hawkins, S. M., Yen, D. C., & Chou, D. C. (2000). Disaster recovery planning: a strategy for data security. Information Management & Computer Security. doi:10.1108/09685220010353150
Liu, S., & Kuhn, R. (2010). Data Loss Prevention. IT Professional, 12. doi:10.1109/MITP.2010.52
Strunk, J. D., Goodson, G. R., Scheinholtz, M. L., Soules, C. A. N., & Ganger, G. R. (2003). Self-securing storage: protecting data in compromised systems. Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems]. doi:10.1109/FITS.2003.1264933
 Read More
Cite this document
  • APA
  • MLA
(“Compromised and Lost Data Assignment Example | Topics and Well Written Essays - 750 words”, n.d.)
Compromised and Lost Data Assignment Example | Topics and Well Written Essays - 750 words. Retrieved from
(Compromised and Lost Data Assignment Example | Topics and Well Written Essays - 750 Words)
Compromised and Lost Data Assignment Example | Topics and Well Written Essays - 750 Words.
“Compromised and Lost Data Assignment Example | Topics and Well Written Essays - 750 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Compromised and Lost Data

Paradise Lost

...Module Paradise Lost Christianity teaches that God created ancestors of the human species and put them in a paradise-like Gardenof Eden. They had the freedom to do anything in the garden except eat fruits from one of the trees. Satan used a talking serpent to deceive the first woman (Eve) to eat the fruit. The woman shared the fruit with her husband, which marked the first fallout between God and His most valued creation. This act of disobedience marked the fall of man. After sinning, Adam and Eve did not do what God tells us to do, repent. Instead of repenting, they started engaging in mutual recrimination, which showed the spirit of rebellion in them. Powerful as God is, if they repented, he would have forgiven them...
4 Pages(1000 words)Essay

Jonathan Reed's Lost Generation

...Jonathan Reed begins the poem “ Lost Generation” with a helpless and pessimistic attitude towards the future. He speaks through out the poem about how with each generation things are getting worse. The poem is written in a way that it can be interpreted in two ways. You can read it normally and it has one meaning, the pessimistic view. But you can also read it in the reverse and it is read in a more hopeful and optimistic view. In this poem Jonathan Reeds speaks about how in this generation, everyone puts work before family. A lot of people are now career orientated and not family orientated like they used to be. People are putting their jobs before family. Some people are holding back on starting families because they...
3 Pages(750 words)Essay

Paradise Lost in Context

...?“Paradise Lost in Context” One of the poems written by John Milton, which is considered as an epic, is the Paradise Lost Paradise Paradise Lostrelies mainly on the Book of Genesis. Genesis chapters one to three are the beginning, the creation, and the fall of man. With the given focal point of the poem, the paper aims to explore part of the sameness and difference of Paradise Lost from Genesis chapters one to three. Also, to identify the part of the poem that is with no relevance to Genesis chapters one to three. The paper presented is divided into four parts. The first part is the status of England during the 17th century. The second part is a brief biography and the early works of John...
8 Pages(2000 words)Research Paper

Epic Poem Paradise Lost

... Epic Poem “Paradise Lost” Paradise Lost serves as one of the greatest epic poems ever created not only in the history of English Literature, but also the history of global literature at large. Written by seventeenth century illustrious English poet John Milton, the distinguished epic elucidates the Biblical narrative of the fall of man (Paradise Lost, I: 28-33) from the blissful abode (I: 6) i.e. heaven to the earth in the wake of tasting the fruit of the forbidden tree because of the temptations made by Satan in the form of serpent. The poem endorses the Biblical belief of enmity between humans and Satan, where the latter appears to be determined to seduce the descendants of Adam and...
6 Pages(1500 words)Essay

The compromised Neonate

...? London South Bank Faculty of Health and Social Care Number: Pre-Registration BSc (Hons) Midwifery Cohort: 09/12 (S) Module Name: The Compromised Neonate Module Reference: MWY _6 _009 Assignment Title: Physiological Jaundice in the Neonate Word Count: 3181 Research Article on Neonatal Physiological Jaundice Care Arora, Mohandas, Ridout and Aladangady published an article in 2011 which focuses on the use of a range of thresholds in the treatment of neonatal jaundice by phototherapy and exchange transfusion, as well as in finding out how many number of hours therapy are needed before the bilirubin levels become stabilised and within the tolerable limits of neonates. It was found out that out of the 72 units contacted by...
12 Pages(3000 words)Essay

Sense of Lost Love get the exact data required. It was essential to shoot video footage or take extra photographs during this period, specifically for complex procedures or animations that called for a high degree of realism and accuracy. Storyboard After I was through with the graphics details, my next step was to initiate the storyboarding procedure to establish what the actions of the graphics and how the animation will appear. I used various forms of storyboards, such as detailed drawings and napkin sketches, putting in mind the central visual elements at different points in the animation. In this context, I used the storyboard during the design and production step to generate all the assets and models essential for the animation....
6 Pages(1500 words)Essay

Lost Treasures

...?(your first and (your teacher’s LOST TREASURES History is witness to the many changes that have transpired in this world we call home. From the beginning of time, numerous events caused by man and nature have shaped our world to the place we know it today. Ironically, these same factors are the possible reasons we are now missing many significant contributions to different societies and the world in general. From big things like places and civilizations to small items like books and other artifacts, history has seen these emerge in the world only to be lost to man forever. The ancient groups of people who once roamed the earth are best examples of lost treasures. The Oxus settlement in Turkmenistan is one such society. Discovered... to...
5 Pages(1250 words)Essay

Paradise lost

...PARADISE LOST Literature connection The use of metaphor in paradise lost is excellent with the use of Epic simileparticularly evident in the whole poem. The representation of Satan as a wandering spirit and comparison with the whale in the sea illustrates the metaphorical illustration of the behavior of the whale in the sea. The mind is depicted as hell of heaven and heaven of hell. The use of the mind in the depiction of the different states of the mind illustrates symbolism and metaphor. The use of the mind to depict the concept of the Garden of Eden and fall is created by the use of metaphor making the poem interesting. Knowledge is compared to food and needs no less (Milton, 1905, p. 45). Wisdom to...
2 Pages(500 words)Essay

Weight lost

...GAINING AND LOSING WEIGHT Location Gaining and Losing Weight Introduction Feeding habits in the world have changed a great deal, which has led to many people being obese and developing problems associated with obesity. Ignorance has contributed to this, as many people do not know what to do to avoid such a case. However, precautions are taken it is a situation that can be put under control through the observation of simple routines of diet and exercise. Others with the genetic problem that cause this have the choice of seeking medical attention from the relevant physicians.  Factors that control weight lost Reduction of calories is a major factor in weight loss. Several factors in the human body affect the rate of...
2 Pages(500 words)Essay

Lost Foam Casting

...Lost Foam Casting of the of the Introduction Lost Foam Casting (LFC) is a form of casting which follows the evaporative pattern of casting. This casting process is similar to the traditional investment casting process except for the fact that in the Lost Foam Casting (LFC) technique, foam is used in place of wax for making the patterns for casting and molding. The Lost Foam Casting (LFC) was invented by a Canadian sculptor named Arman Vaillancourt in the early 1950s. The general benefits of this casting technique were publicly recognized through the well-known automobile manufacturing company, General Motors in the year 1988 when the company announced the manufacture of...
5 Pages(1250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Compromised and Lost Data for FREE!

Contact Us