Office of Personnel Management – 1400 words

Agency facts: The Office of Personnel Management provides human resources support to agencies of the United States federal government.

Leadership: Beth F. Cobert was appointed acting director of OPM in 2015.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Mission/vision: “We’re responsible for keeping the government running smoothly.”

The breach: Cybersecurity breaches in 2015 affected the data of millions of federal government employees, contractors, and some who may have only applied for a background investigation with the government. In April 2015, OPM reported that 4.2 million current and former employees’ information was compromised. Another breach, discovered in June 2005, involved 21.5 million people. In addition, 5.6 million records of fingerprints were exposed. Names, birth dates, addresses, and Social Security numbers were affected. As of early 2016, it was still unclear who was behind the breach. Notifications to those affected began September 30, 2015, and were expected to last 12 weeks.

Sources:

OPM.gov. (2016). Our people and organization. Retrieved from https://www.opm.gov/about-us/our-people-organizati…

OPM.gov. (2016). Our mission, role, and history. Retrieved from https://www.opm.gov/about-us/our-mission-role-hist… https://www.opm.gov/about-us/budget-performance/st…

OPM.gov. (2016). What happened. Cybersecurity Resource Center. Retrieved from https://www.opm.gov/cybersecurity/cybersecurity-in…

Peterson, A. (2015, September 23). OPM says 5.6 million fingerprints stolen in cyberattack, five times as many as previously thought. Washington Post. Retrieved from https://www.washingtonpost.com/news/the-switch/wp/…

Singletary, M. (2015, December 11). What to do if you are affected by the OPM data breach. Washington Post. https://www.washingtonpost.com/business/get-there/…

Here are the subtopics for the paper

  1. Introduction
  2. Background (case)
  3. Attack methodology
  4. Cause and damage
  5. Resolution
  6. Cybersecurity Role (Organization leadership and role)
  7. Prevention/Mitigation after attack
  8. Conclusion
 
"If this is not the paper you were searching for, you can order your 100% plagiarism free, professional written paper now!"

"Do you have an upcoming essay or assignment due?


Get any topic done in as little as 6 hours

If yes Order Similar Paper

All of our assignments are originally produced, unique, and free of plagiarism.