SOLUTION: Anthem System Intrusion and Contingency Plan Paper
SOLUTION: Anthem System Intrusion and Contingency Plan Paper.

Attached.
Running head: SYSTEM INTRUSION AND CONTInGENCY PLAN
System intrusion and contingency plan
Student Name
Name of Institution
Course
1
SYSTEM INTRUSION AND CONTInGENCY PLAN
2
Part 1
System intrusion on Anthem firm
Anthem is one of the larges healthy insurers’ company in US. Anthem company
experienced a system intrusion on February 4th in 2015. The hackers were targeting all personal
identifiable data from its servers. The attack affected a great number of its people, where 78.8
million people were affected. The records of the customers of the organization were affected,
such that, the attackers were able to acess over 37.5 million documents that indicated all useful
personal information. In addition, the hackers were able to extend into multiple brands of the
organization that was utilized in marketing all health plans that are formulated, such as the blue
cross and blue shield. The information was stolen for weeks before the hacker was discovered.
The information obtained by the hackers enabled them to obtain money by selling it to
the black market. Research indicated that, foreign government officials employed the hackers in
order to ruin the operations of the organization. In addition, the attack created tension among the
entire nation such that everybody feared that the information could be utilized in other
cybersecurity cases such as identity theft. In addition, the information stolen contained all
personal information such as names, medical IDs, social security identification numbers as well
as street addresses. Additionally, the impact experienced as a result of the attack was about
identity theft for the number of years.
The management of the organization employed a number of skilled workers in order to
investigate the issue. Some of the key participants include the cybersecurity firm crow and the
marshal insurance. The main focused that was layed by the investigation team was on Anthem
pre-breach response. According to the research, the operators of the Anthem company opened a
specific phishing email that contained a number of malicious content. The utilization of the
hacker’s email downloaded several file automatically. As a result, the hacker was able to gain
remote access of the computer as well other systems within the organization. Some of the major
target includes machines, Anthem data…
15 Million Students Helped!
Sign up to view the full answer
SOLUTION: Anthem System Intrusion and Contingency Plan Paper