Poor Security : Internal Revenue Service Breach

1831 Words8 Pages
POOR SECURITY: INTERNAL REVENUE SERVICE BREACH
PONNALA SAI TEJ (1098499)
NEWYORK INSTITUE OF TECHNOLOGY
PROFESSOR: Dr. LEO DE SOUSA
INCS618- Computer Security Risk Management and Legal Issues
October 4th 2015

Contents
Abstract: 3
Introduction 3
Analysis 4
How did it happen? 5
Risk 5
Threat 6
Vulnerability: 6
Confidentiality: 6
Authentication and Identification: 6
Mitigation Techniques: 7
Conclusion 7
References 8

Abstract:
Information security department or administrator is the one to handle security incidents. Only after suffering from the attacks organizations learn how to respond to a security attack. There are clearly direct benefits in responding to security incidents. It helps us in winning business
…show more content…
What happened to it? Why and how did the people get affected? Why is the breach considered to have shocked the US government so much? What is the data lost? These were the questions on mind when I first approached this topic. Below are the research and analysis of the above questions.
IRS is internal revenue service in the USA. IRS tax forms are used for taxpayers and tax-exempt organizations to report financial information to the Internal Revenue Service (IRS) of the United States. They are used to report income, calculate taxes to be paid to the federal, and disclose other information as required by the Internal Revenue Service (IRS). There are over 800 various forms and schedules. IRS Provides a service known as “GET TRANSCRIPT” to tax holders to download their tax forms which contain information about their identity in order to verify details when they claim their tax.
Below we can see how a GET TRANSCRIPT application looks like. (IRS)

• Transcripts arrive in 5 to 10 calendar days at the address we have on file for you
• Transcript Types available by mail
• Frequently asked questions (FAQs)
• Get Transcript by Mail en Español

This application provides records about their income tax returns, reported income and other tax-related information. The GET TRANSCRIPT application helped the hackers to get hold of the documents easily and later at the time of verification they would provide the details correctly. The IRS breach mainly affected
Get Access