OPM Data Breach
OPM Data Breach
Amanda Shears
Liberty University
HLSC 500
Who is the Office of Personnel
Management (OPM)?
Serves as chief human resources agency and personnel policy manager
for the Federal Government
Directs multiple programs such as:
Human resources and employee management services, administers
retirement benefits, manages healthcare/insurance programs, oversees merit-
based and inclusive hiring into the civil service, and provides a secure
employment process
Responsible for the management of security clearances for the U.S.
Government
About the Breach
MAY 2014 a hacker group (X2) had successfully introduced malware into OPM’s network, IDS did not
notice this incident and therefore could not stop the execution of the malware plan; creating a back
door in the system
JUN 4th, 2015 data breach
OPM reported on the largest cases of the breach in history which was investigated by DHS through
the Einstein system.
This is an (IDS) intrusion detection system that operates by evaluating federal internet for any suspicious
activity that could be a threat to cybersecurity
About the Breach (Cont.)
Over 2.4 million people both current and former employees information
was compromised
Data compromised involved confidential information for former and current
employees, dignified contractors and all the employees connected to the
agency through and queries or forms
Information about applicants into the organization containing their residential
and marital statuses, user names, passwords, fingerprints was stolen and this
constituted to about 1.1 million
Further damage was registered later and information for about 21.5 million
people was stolen
About the Breach (Cont.)
Activities that drive towards reacting to stimuli that and this to mean the
activities that have been executed against the goodness of the people in
the US
Involves impulsive actions drawn to save property, lives and important
information in the nation through the use of various resources,
stockpiles, and command centers and so much more
DHS, through the NCCIC, is responsible for all aspects of response
Uses all gathered information about cyber breaches and causes public
awareness to protect people from any such incidences
Phase of Emergency: Recovery