This website uses cookies to ensure you have the best experience. Learn more

Security Breach Essay

558 words - 3 pages

Cyber Attacks and Security: The Problem and The Solution

Shamika A. Woumnm

BIS/221

February 16, 2015
Gregorio Chavarria

Cyber Attacks and Security: The Problem and The Solution

In December of 2013, Target reported that up to 70 million customers worldwide were affected by a major security breach. It was reported that thieves stole massive amounts of credit and debit card information during the holiday season which also swept up names, addresses and phone numbers of their customers, information that could put victims at greater risk for identity theft.

The Problem
The Target breach is ranked as one of the worst ever. During the peak of the holiday season that year Target said that up to 40 million customers’ credit/debit card information had been stolen from people who shopped in their stores from November 27 to December 15. That following ...view middle of the document...

Although the consumer will not be held accountable for the fraudulent charges, it’s just the headache and the jist of it all that somewhat deters the customer.

The Solution

The last reported updated was reported in January of 2014. Target announced that they were continuing to investigate the major secutiry breach. As a part of Target’s ongoing forensic investigation, it was determined that a certain number of Target consumers information (separate from the payment card data previously disclosed) was also taken from Target.
Much of the data that was stolen was partial in nature. Target attempeted to contact many of their customers that were affected via email. The email was informational and it was an attempt to guard them against consumer scams, which happen often. The froon the Replace the level one heading with the words for your heading. The heading must be in bold font. Headings help your audience track the sub-topics discussed in the body of the essay or report.

Conclusion
In closing, there are a number of ways that you and/or your company can prevent major data security breaches. Management can offer user security awareness training. When employees are trainined properly and often it’s a huge benefit. Only when it changes the culuture of the company to be more security minded will it be effective. By training the employess it helps to eliminate mistakes that could possibly lead to a breach. It will also help the employee notice any and all odd behavior by malicious insiders and/or fraudster criminals.

References
Target corporation; target provides update on data breach and financial performance. (2014). Information Technology Newsweekly, , 505. Retrieved from http://search.proquest.com/docview/1490939802?accountid=458
Stanwick, P. A., & Stanwick, S. D. (2014). A security breach at target: A different type of bulls eye. International Journal of Business and Social Science, 5(12) Retrieved from http://search.proquest.com/docview/1648987164?accountid=458

Other assignments on Security Breach

Cyber Security In Business Essay

1513 words - 7 pages data security. The retailer spent $61 million through February 1st responding to the breach. It set up a customer response operation, and in an effort to regain lost trust, Steinhafel promised that consumers won’t have to pay any fraudulent charges stemming from the breach (Riley et al., 2014). A thorough review of the events that led up to the Target attack reveal what I feel was poor policy or the lack thereof, and the failure to align

Understanding Nist 800‐37  Fisma Requirements  Essay

2451 words - 10 pages  the system should be accredited.  By accrediting an information system, an agency  official accepts responsibility for the security of the system and is fully accountable for any adverse  impacts to the agency if a breach of security occurs.    6        V. How Veracode Can Help  To help address the needs of federal agencies to assess their application security risks for FISMA  compliance, Veracode has designed the first complete

Lab #3: Case Study On Pci Dss Non-Compliance: Cardsystems Solutions

559 words - 3 pages Solutions to be in compliance with PCI DSS requirements? See 6 8. What was the end result of the attack and security breach to CardSystems Solutions and its valuation? The company was bought out by another company 9. What are the possible consequences associated with the data loss? Customers personal data being stolen 10. Who do you think is ultimately responsible for CardSystem Solutions lack of PCI DSS compliance? The company for not

Management Of Information Systems

1747 words - 7 pages hoping to steal information or gaming assets. • Solutions: Deploy an advanced security system to identify threats and reduce hacking attempts. • NetContinuum’s NC-2000 AG firewall and Cenzic’s ClickToSecure service work in tandem to minimize the chance of a security breach. • Demonstrates IT’s role in combating cyber crime. • Illustrates digital technology’s role in achieving security on the Web. [pic] System

Global Finance

3346 words - 14 pages plans to manage in the organization, in case, the internet’s go out. Financial intuitions are vulnerable to attacks, owing to the nature of business. As a result, mitigation measures should be in place for any form of incompliance. Priority should be put in the most vulnerable places, which could harm the organization in short term. Security breach in Global Finance, Inc. might result into losses and loss of customers’ confidence. The diagram

Cyberlaw-Task 1

750 words - 3 pages Heart-Healthy Insurance Information Security Policy Paul Ervin Western Governors University A1. New User Section New Users The REVISED portions of the new user section now stipulates: “(1) New users are assigned access with principle of least privilege. They will have a level of access commensurate with access required to do their job. This level will be predetermined by IT staff according to job title. (2) An administrators account

Aircrafts

2440 words - 10 pages breach in their security infrastructure. There is the potential of business partnerships being lost due to the security policies AS has put in place. The loss of business partnerships will reduce the competitive edge that AS currently has on the market. Recommended Solution - Hardware Virtualization is the creation of a virtual computer system, rather than having actual IT assets. As a recommendation for AS's firewall misconfiguration and overall

Asdf

684 words - 3 pages computing devices such as smartphones and tablet computers. IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems. Information assurance The

Security Awareness

2691 words - 11 pages Information Security - Security Awareness Abstract: 3 Security Awareness 4 Regulatory Requirements for Awareness and Training 7 References 13 Abstract: Information security means protecting information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. A policy can be described as a set of principles intended to manage

Corporation Law

2225 words - 9 pages company breach the contract. Section 140(1)(a) provides that a company’s constitution (if any) and replaceable have effect as a contract between the company and each member, under which each person agrees to observe and perform the constitution and rules as far as they apply to that person. Members can force company to comply with constitutional provisions that affect them in capacity as members.(Hickman v Kent or Romney Marsh Sheep-Breeders

Internet

444 words - 2 pages Another privacy issue is hacking. Because social networks do not offer security measures for their users, many of the computers used by networkers are vulnerable to hackers. Every bit of information on a networker’s computer becomes available to those skilled in this science, often without the knowledge of the networker. Along with the ability to hack is the ability to plant viruses. Many viruses today are passed through social networks

Similar Documents

Target Data Breach Essay

441 words - 2 pages What exactly happen? Over 40 million credit cards and debit cards that were swiped at a US Target store may have been exposed. The stolen data includes customers’ names, credit card debit card numbers, expiration date and the security code. What was the impact from this happening? The Impact from the data breach was customer information was stolen and card numbers. What was the monetary loss? Each cards that was stolen was taken 18-37

Computer Security & Privacy Tjx

620 words - 3 pages Computer Security & Privacy - TJX Case Backgroud: TJX, largest apparel and home fashions retailers in the off-price segment was struck with Security Breach in all of its eight business units in US, Canada and Europe. Intruder had illegally accessed TJX payment system to hack personal and credit/debit card information of an unspecified number of customers. Security breach had affected Customers - pay for the purchases made by the intruders

Jimmer Paper

624 words - 3 pages may not want to control it myself, but being able to visualize its capabilities is essential, and outsourcing the security to a third-party may breach that interest of mine. If there is an individual who has experience with security internal to the company, it may be less expensive to leverage his/her knowledge, that to oursouce the security. Purely in terms of operating costs, utilizing an individual within my business to manage the security

Mis Choice Point Case Essay

1145 words - 5 pages resulted from the breach. Case questions 1. Describe how the information security breach occurred and the business impact of the information security breach at ChoicePoint. Be sure to include both tangible and intangible losses. • The criminals posed as customers by using stolen identities to create and produce the documents needed to appear legitimate and obtained personal data of 145,000 individuals • Tangible business