Technology Computer & Networking security

Institute Of Electrical And Electronics Engineers Alerts Members On Security Breach Incident

Recently, the Institute of Electrical and Electronics Engineers (IEEE), the world's largest and renowned technical professional association notified members of possible data breach. The association identified the unauthorized access to customer database in December. Computer forensic professionals were engaged to investigate the security breach incident. In February, the forensic investigators identified that a file containing customer data was deleted from the computers of IEEE in November last year.

The investigation led to the disclosure of several system vulnerabilities. Information security professionals of the association have mitigated the vulnerabilities. The compromised information was provided by the members, while registering for an IEEE conference. The file contained names, credit card numbers, credit card expiry dates and card identification numbers of around 828 members. The association reported that they are not aware, whether the attackers extracted customer data from the deleted file. The incident is alleged to be a sophisticated network intrusion attack. The association has notified the Federal Bureau of Investigation (FBI) on the incident and the concerned regulatory authorities.

Attackers scan the networks to identify and exploit security flaws in networks, computer systems and websites. Once they identify a vulnerable network and computer systems, they use sophisticated techniques to bypass security mechanisms and gain access to privileged databases. A successful intrusion attempt may provide access to sensitive customer information. The collected information could be misused for fraudulent activities such as identity theft, misrepresentation and conducting unauthorized transactions. The offenders may also sell the extracted information to their peers in the crime world and corporate rivals of the targeted organization. Organizations must conduct regular security evaluation of the websites. Hiring professionals qualified in computer science degree may help them in streamlining the security of the IT infrastructure.

IEEE has offered to provide one-year free subscription for Identity theft protection policy. Members must notify the credit reporting agencies and request for fraud alert on their accounts. The affected individuals must monitor their credit card statements and report any unauthorized activity to their respective banks and credit institutions.

Organizations must adhere to the regulatory provisions for collection and storage of data. Payment Card Industry Data Security Standard (PCI DSS) establishes security standards to be implemented by merchants, hardware and software developers, financial institutions and professionals. Training sessions, online degree and e-learning programs may help employees in understanding and implementing security standards and practices.

Employees must be aware of the various IT security threats, measures to be initiated in case of a security breach incident, protection of evidence, procedures for reporting security incident procedures and data recovery procedures. IT employees must be encouraged to undertake online university degree courses in computer forensics and incident management. Access to computers containing privileged information must be restricted to few authorized employees.

SHARE
RELATED POSTS on "Technology"
Use Online Backup to Keep Your Valuable Data Safe
Use Online Backup to Keep Your Valuable Data Safe
'Problem occurred while doing OST sync operation' Error and Recovery
'Problem occurred while doing OST sync operation' Error and Recovery
Data Recovery - Important Factors to Consider
Data Recovery - Important Factors to Consider
Email Spam Protection Quite Essential To Help Cut The Time And Money Due To Manpower Use
Email Spam Protection Quite Essential To Help Cut The Time And Money Due To Manpower Use
Remove Feed Helperbar Redirect Virus From Windows and Mac OS X
Remove Feed Helperbar Redirect Virus From Windows and Mac OS X
Check System And Get Ensure: How To Make Your Windows PC Spyware Free
Check System And Get Ensure: How To Make Your Windows PC Spyware Free
Speed Up XP Software - Download Right Now!
Speed Up XP Software - Download Right Now!
The Right Time To Use A Registry Cleaner Windows XP Optimizer
The Right Time To Use A Registry Cleaner Windows XP Optimizer
Stop Piracy and Use CD Duplication Service for Creating Largest Number of Discs
Stop Piracy and Use CD Duplication Service for Creating Largest Number of Discs
Migrate Contacts From Lotus Notes to Outlook Exchange Server 5.5 or Exchange 2000
Migrate Contacts From Lotus Notes to Outlook Exchange Server 5.5 or Exchange 2000
Guide On How To Make Low Priced But Required Components In Creating Basement Insulation For Any Time
Guide On How To Make Low Priced But Required Components In Creating Basement Insulation For Any Time
Remove Ddos Clean: To Get Rid of Fake Anti Spyware Program
Remove Ddos Clean: To Get Rid of Fake Anti Spyware Program
How to Get Rid of Spyware on My Computer
How to Get Rid of Spyware on My Computer
How to Avoid a Malware Infection?
How to Avoid a Malware Infection?
Outstanding Registry Cleaner
Outstanding Registry Cleaner
Why You Should Be Using Vipre Internet Security?
Why You Should Be Using Vipre Internet Security?
Run Data Recovery Software to Restore Data from RAW USB Hard Drive?
Run Data Recovery Software to Restore Data from RAW USB Hard Drive?
How to Remove Virus Protector Spyware Automatically-Manually
How to Remove Virus Protector Spyware Automatically-Manually
Data Recovery of IBM Drive
Data Recovery of IBM Drive
What Are the Best Registry Cleaners For Windows?
What Are the Best Registry Cleaners For Windows?
Protect Your Laptop and the Data It Holds
Protect Your Laptop and the Data It Holds

Leave Your Reply

*