Background of the Organization
A data breach when the security of a system or network is violated to disclose confidential or sensitive data that can be used for malicious purposes. This paper sheds light on the information security system of Microsoft corporation based on the data breach incident of 2020.
The Microsoft corporation is one of the leading technology corporations in America. The company was founded in 1975 by Bill Gates and Paul Allen [1]. The company has created a brand for different utility and productivity software and Microsoft operating systems. The Microsoft operating system called Windows was first introduced in the year 1990 [1]. Soon in 1995, they started utilizing the emerging technology – the internet. The company has expanded its services with the help of various technological innovations. Apart from software, they provide cloud computing, Artificial intelligence services, computer system, and devices. It is a globally recognized brand with millions of users across the globe.
In 2020, a data breach incident exposed the data of 250 million Microsoft users online [2]. This data included the customer service call records and conversations between customers and the Microsoft customer support executive. The exposed data had records from 2005 to the December of 2019 [2]. This data could have compromised information like customer contact details, IP addresses, geographical locations, reports of the customer service and support claims, Microsoft support agent emails, and internal reports that are considered confidential. The response of Microsoft was quick and the response and recovery were started within two days.
The mentioned data breach incident displays vulnerabilities or negligence of the database security system. According to the deliberation of the author in [3], the vulnerabilities of a database can be characterized by poor engineering and architecture along with misconfigurations. The Microsoft data breach incident was the result of access misconfiguration in their customer support database. Vulnerabilities like this can allow unauthorized users to access and misuse the data. Along with that the incident also highlights the efficiency and reliability of the Database Administrator (DBA). Their responsibilities include monitoring the configuration and security of the database. In the paper [4], it is stated that the DBA is accountable for the security of data and the metadata structure as they have access to the complete database. The DBA can also prevent misuse of data access privileges by managing and controlling the user access rights. Apart from preventing abuse of access rights, this measure can help in ensuring any mishaps that can put the database security at risk. Controlling accessibility is part of the prevention measure.
A data breach incident affects the confidentiality, integrity as well the availability of the data [5]. In the mentioned incident, the confidentiality was compromised as the records had personal information as well as information about issues raised by the customers to the company. The integrity of data is said to be compromised when unauthorized changes are made in the database. It could happen accidentally or access control error similar to the mentioned incident. The availability data breach is a possible consequence of unauthorized data access or data leak. The exposed data can be stolen and access to it could be denied after encrypting causing major data loss for the organization. This issue can be prevented by an efficient response plan. Apart from that, in case of a data breach recovery is essential to minimize the damage. In the Microsoft data breach incident, the response from the company was quick and it saved them from adverse damage. The data that was compromised in the incident included information that can be used by spammers to pose as Microsoft customer support representatives and contact customers. A slow and inefficient response plan could put millions of consumers at risk. Communication with customers should also be part of the recovery plan [6]. Information about the breach needs to be shared with the consumer. Transparency about the breach can help in retaining customer trust and their loyalty to the brand. Apart from that, it also protects them from possible scamming attempts that may happen due to the exposure of data. Organizations can send out alerts about the breach along with warning messages about possible fraud attempts and security measures like not sharing any information with a caller posing as the company’s representative.
The Data Breach Incident
Encryption can add another layer of protection to the database by encoding the information present there. In the Microsoft data breach case, one of the main concerns regarding data exposure was the lack of protection available for the data. It was not encrypted or protected with a password or any other authentication tool [7]. This increases the further risk of mis usage after the breach. In paper [8], the author states that organizations that require managing vast data and database systems can ensure security via access control policies and various encryption. Encryption could be at the storage level by encrypting the entire file or directories. The other is Database-Level Encryption (DLE) where records inserted and retrieved are secured through encryption.
In the paper [9], it is stated that for technological business informational security management is very important. It involves the curation of an information security framework according to the needs of the organization. The framework can consist of various components for prevention, detection, response and recovery from security and data breaches. The assets of the business can be protected by applying these. Some of the suggested tools for this are an Intrusion detection System, firewalls, encryption, and a Vulnerability assessment scan. An intrusion system monitors the computer network and system to detect any intrusion. This can help in implementing the response plan at the earliest stage. In addition, it made the recovery process difficult. Employing this system can prevent and reduce the occurrence of similar incidents. Another known factor highlighted in the incident was the higher risk due to the unprotected database in the organization. It can be avoided by adding protection by encrypting sensitive data like the account and payment details of the customers. Apart from that, a Vulnerability Assessment Scan software can be utilized. The software is responsible for examining the system to detect any vulnerabilities and report them to the admin. It can help in eliminating any weaknesses in the system and ensuring a strong IT security system is maintained. Lastly, a strict access control policy can be implemented in the organization to avoid similar incidents in the future.
In my point of view, it is the responsibility of the company to ensure that the sensitive data of consumers are protected. The security and confidentiality of customer information should be part of the service provided by the industry. The company must install an efficient information security management system in all its properties to prevent such incidents from happening. In the mentioned incident, the breach revealed the unprotected and encrypted data stored by the company. This highlights the need for better management as well as a secure database system. Although the organization was prepared for recovery from such an incident. They implemented a quick response plan and worked towards recovery. The NIST Cybersecurity Framework published by the US National Institute of Standards and Technology can assist in designing and improving the security and recovery plan. I also believe that with the emergence of the digital era, the business of companies like Microsoft has significantly increased. Along with utilizing the advanced technological innovations to provide services to the customers, they should also invest in a reliable information technology security system. Apart from that, the employee of the organization should be aware of cyber And IT security practices. Communication of these policies with the guests is also important. Data and Security breach incidents like such can create distrust among consumers. It can be gained back by assuring that the changes made in the organization are reliable and competent to provide security for their information. In my opinion, the incident with Microsoft Corporation can be seen as a learning example for other businesses in the industry. The risk of loss of data and damage to the reputation of the brand can help in understanding the importance of a security system for Information Technology, especially for business that works with large customer database.
Conclusion
From the above discussion, the Microsoft data breach incidence can be considered the result of negligence in information and security management in the organization. The incident highlights the lack of security and protection policies available for information technology infrastructure. The breach revealed the need for encryption tools and improvement in access control policy in the organization. Apart from that, the incident also displays the inefficiency of the existing information and security management system. To prevent and recover from such incidents, some software and tools can be utilized. This includes intrusion detection software, encryption tools, and software for vulnerability assessment scanning. These tools can not only detect attacks at an early stage but also provide an extra layer of protection to the data. The US National Institute of Standards and Technology has published a set of guidelines that can also be utilized while developing plans and policies for cybersecurity.
References
[1]Microsoft. 2022. Facts About Microsoft – Stories. [online] Available at: <https://news.microsoft.com/facts-about-microsoft/> [Accessed 8 April 2022].
[2]D. Winder, “Microsoft Security Shocker As 250 Million Customer Records Exposed Online”, Forbes, 2022 Available: https://www.forbes.com/sites/daveywinder/2020/01/22/microsoft-security-shocker-as-250-million-customer-records-exposed-online/?sh=2db553684d1b. [Accessed: 08- Apr- 2022].
[3]Kothari, H., Suwalka, A. K., & Kumar, D. (2019). Various database attacks, approaches and countermeasures to database security. International Journal of Advance Research in Computer Science and Management, 357-362.
[4]Zygiaris, Sotirios (2018). Database Management Systems (A Business-oriented Approach Using ORACLE, MySQL, and MS Access) || DataBase: Administration and
Suggestion
[5]Zadeh, Jeyaraj and Biros, “Characterizing Cybersecurity Threats to Organizations in Support of Risk Mitigation Decisions”, e-Service Journal, vol. 12, no. 2, p. 1, 2020. Available: 10.2979/eservicej.12.2.01.
[6]Masuch, K., Greve, M., Cyrenius, J., Wimmel, B., & Trang, S. (2020). Do I Get What I Expect? An Experimental Investigation of Different Data Breach Recovery Actions. In ECIS.
[7]”250 million Microsoft customer service & support records exposed”, Comparitech, 2022. Available: https://www.comparitech.com/blog/information-security/microsoft-customer-service-data-leak/. [Accessed: 08- Apr- 2022].
[8]Khalaf, E. F., & Kadi, M. M. (2017). A Survey of Access Control and Data Encryption for Database Security. Journal of King Abdulaziz University, 28(1), 19-30.
[9]Somepalli, S. H., Tangella, S. K. R., & Yalamanchili, S. (2020). Information Security Management. HOLISTICA–Journal of Business and Public Administration, 11(2), 1-16.
[10]Almuhammadi, S., & Alsaleh, M. (2017). Information security maturity model for NIST cyber security framework. Computer Science & Information Technology (CS & IT), 7(3), 51-62.