123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Security Breach At Institute Of Electrical And Electronics Engineers Compromises Member Data

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Recently, the Institute of Electrical and Electronics Engineers (IEEE), the world's largest and renowned technical professional association notified members of possible data breach. The association identified the unauthorized access to customer database in December. Computer forensic professionals were engaged to investigate the security breach incident. In February, the forensic investigators identified that a file containing customer data was deleted from the computers of IEEE in November last year.

The investigation led to the disclosure of several system vulnerabilities. Information security professionals of the association have mitigated the vulnerabilities. The compromised information was provided by the members, while registering for an IEEE conference. The file contained names, credit card numbers, credit card expiry dates and card identification numbers of around 828 members. The association reported that they are not aware, whether the attackers extracted customer data from the deleted file. The incident is alleged to be a sophisticated network intrusion attack. The association has notified the Federal Bureau ...
... of Investigation (FBI) on the incident and the concerned regulatory authorities.

Attackers scan the networks to identify and exploit security flaws in networks, computer systems and websites. Once they identify a vulnerable network and computer systems, they use sophisticated techniques to bypass security mechanisms and gain access to privileged databases. A successful intrusion attempt may provide access to sensitive customer information. The collected information could be misused for fraudulent activities such as identity theft, misrepresentation and conducting unauthorized transactions. The offenders may also sell the extracted information to their peers in the crime world and corporate rivals of the targeted organization. Organizations must conduct regular security evaluation of the websites. Hiring professionals qualified in computer science degree may help them in streamlining the security of the IT infrastructure.

IEEE has offered to provide one-year free subscription for Identity theft protection policy. Members must notify the credit reporting agencies and request for fraud alert on their accounts. The affected individuals must monitor their credit card statements and report any unauthorized activity to their respective banks and credit institutions.

Organizations must adhere to the regulatory provisions for collection and storage of data. Payment Card Industry Data Security Standard (PCI DSS) establishes security standards to be implemented by merchants, hardware and software developers, financial institutions and professionals. Training sessions, online degree and e-learning programs may help employees in understanding and implementing security standards and practices.

Employees must be aware of the various IT security threats, measures to be initiated in case of a security breach incident, protection of evidence, procedures for reporting security incident procedures and data recovery procedures. IT employees must be encouraged to undertake online university degree courses in computer forensics and incident management. Access to computers containing privileged information must be restricted to few authorized employees.

Total Views: 282Word Count: 455See All articles From Author

Add Comment

Computers Articles

1. Remote Connectivity | Business Broadband Without Fibre India | Viva Digitally
Author: Viva

2. Spark Matrix™: Speech Analytics
Author: Umangp

3. Custom Computer Manufacturer: How To Choose The Right One For Your Needs?
Author: Jack Williams

4. Riding Up: The Surge Of Elevators And Escalators Across Asia Pacific
Author: Pujitha

5. Why Businesses In Mumbai Need Custom Software Development
Author: Aimbeat Insights

6. How A Multi-service App Can Transform Your Business Growth
Author: Swiza Joy

7. Advanced Humidity Monitor And Equipment Temperature Monitoring Solutions For Reliable Healthcare And Business Environments With Tempgenius Expertise
Author: Chris Miller

8. Why You Need Modern Telecom Sales Commission Management Systems To Boost Sales Efficiency
Author: Kevin

9. Why Access Reviews Keep Failing In Regulated, Hybrid Environments
Author: Soham Biswas

10. Building A Modern Real Estate App With Trulia Clone App Script
Author: Swiza Joy

11. Spark Matrix™: Multi-carrier Parcel Management Solutions
Author: Umangp

12. Best Odoo Erp Software Company In Dubai For Business Growth
Author: Mayur Meheshwari

13. Top Challenges Faced By Equipment Rental Companies In The Uae — And How Erp Solves Them
Author: Al murooj solutions

14. Spark Matrix™: Intelligent Virtual Assistants (iva)
Author: Umangp

15. Pos Software Designed For Retail Operations
Author: EPOS Direct

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: