Case study-the marriott data breach

Assignment Help Business Management
Reference no: EM133038003

CASE STUDY: THE MARRIOTT DATA BREACH  

In November 2018, Marriott, the world's largest hotel company, announced that one of its reservation systems had been hacked. With over 7,000 properties and more than 1 million hotel rooms worldwide, Marriott manages a very large and detailed database on the movements of millions of people that is a valuable target of hackers. In what is believed to have been the second-largest data breach in history, an estimated 500 million guest records were downloaded by hackers, including credit cards, addresses, phone numbers, and passport information. Marriott has estimated that credit card information on 327 million individual customers was involved, along with 25 million passports,   million of which were not encrypted. The system involved was the reservation system for Starwood Hotels, which includes the Westin, Sheraton, St. Regis, and W hotels. After purchasing Starwood in 2016, Marriot continued to operate the Starwood system independently because Marriott's own reservation system was not capable of taking on the additional load of Starwood. This turned out to be a major factor in the data breach. How the breach occurred is still not completely understood by Marriott or the authorities. An initial investigation by Marriot found that the Starwood legacy system was likely breached in 2014 but Starwood systems personnel did not detect the malware installed for a period of four years. When Marriott purchased Starwood, it purchased a reservation that was already compromised. To make matters worse, shortly after the acquisition, Marriott laid off many of the Starwood system's staff in an effort to cut costs via consolidation, which often occurs in mergers and acquisitions. Subsequently, several class action law suits have been filed claiming that Marriott did not conduct sufficient due diligence when purchasing Starwood and that management allowed a compromised reservation system to continue operating. Company and government investigators did find a remote access trojan that could send any data it found to external servers, along with MimiKatz, malware for finding the data. MimiKatz is a tool that can search username and password combinations in large databases. How the trojan and MimiKatz got access to the Starwood servers is unknown, but one likely candidate was phishing emails sent to Starwood employees who had legitimate access to its reservation system. The weakest link in systems is at the end point, through users who have legitimate access to it. If the guest information had been properly encrypted, it might have been useless to hackers. Unfortunately, this was not the case. The credit card information was indeed encrypted, but the hackers also likely stole the encryption keys that were stored on the same hacked server. This is a fatal flaw in many corporate systems: best practices call for installing the encryption keys that unlock encrypted data on separate servers which are isolated from main transaction systems in the firm and, ideally, stored on separate secure networks. Encryption alone is not a "bullet proof" guarantee of cyber security but rather a basic first step that can work if it is properly installed and managed. Unfortunately, passport numbers were stored "in the open" and not encrypted at all. Who actually led the hacking effort, and for what purpose, remains a mystery, although there are a few clues. Hacks of large databases with credit card information usually result in that information being sold quickly to other hackers on the dark web or being used to conduct fraudulent credit card purchases. However, this spurt in illegal activity did not occur in the Marriott hack, and none of the stolen information has appeared on the dark web. U.S. government investigators believe this was not a hack done for commercial reasons; instead, they point to Chinese intelligence agencies as the likely source, because the hackers used cloud servers associated with Chinese state hackers, along with other details of the hack that, to date, remain undisclosed. One theory is that the stolen passport numbers may be the most valuable aspect of the hack. Marriott is one of the main providers to U.S. government armed forces and government personnel. The data on government guests could be useful for tracking the movements of military and intelligence employees and building dossiers on individuals. In  congressional testimony in Washington, however, Marriott's CEO denied the Chinese were involved. Marriott announced in 2019 that it had incurred $128 million in expenses due to the breach. It has also been fined $120 million by the U.K.'s Information Commissioner's Office (ICO) for violating U.K. privacy laws, which are derived from the EU's General Data Protection Regulation (GDPR). The ICO claims that Marriott failed to undertake adequate due diligence when it acquired Starwood. Marriott's 2018 revenues were just over $20 billion. Hence, $250 million in fines to Marriott constitute about 1% of its revenues and about 11% of its $2.2 billion in earnings-a substantial loss of earnings but a minor part of its overall revenue. However, loss of reputation and potential loss of customers including government agencies is also a risk for Marriott that could amount to much more than government fines. Marriott responded to the breach by offering guests compensation for costs associated with obtaining a new passport as well as for credit card losses if fraud occurred as a result of the breach. Several class action lawsuits have been filed again Marriott as well as the consulting and service company Accenture, to whom Starwood had outsourced their security. The City of Chicago sued the company in 2019 for failing to protect the personal information of Chicago residents, claiming that Marriott had allowed criminals to copy extensive personal information for over four years and failed to implement reasonable safeguards that could have prevented the data breach. Even worse, so the suit claims, firm managers knew of the security risks for four years. 

(Sources: "Why Encryption Is Failing Us" by Tom Kellermann, Techradar.com; "Marriott Data Breach FAQ: How Did It Happen and What Was the Impact?" by Josh Fruhlinger, CSOonline.com) 

Based on the above case study, answer the following questions. 

a. Analyze security breaches that have occurred in the Marriott database related to intentional threats of e-commerce security.

b. Suggest the best protection strategies that Marriott Hotel should implement to combat data breaches on its reservation systems, considering procedural, technical and physical controls.

c. The security concerns on the online credit card system that involves a wide range of online and mobile payment methods. Propose other online or mobile payment systems that you believe would be appropriate and safe for the Marriott Hotel's needs.

Reference no: EM133038003

Questions Cloud

Define organizational performance : Define organizational performance, and discuss the criteria for classifying organizations as 'high performing' and 'low performing organizations.
Impact of recent health insurance : Assess the individual insurance role in the current US health insurance market. What is the impact of recent health insurance reforms on the individual insuranc
Weaknesses of large vs small firm innovation : 1. Discuss how competitive rivalry (industry structure) and related and support industries can be mutually reinforcing using examples.
How much does sheridan operating income increase : Fixed costs for April were $6000. How much does Sheridan's operating income increase for each $2600 increase in revenue per month
Case study-the marriott data breach : In November 2018, Marriott, the world's largest hotel company, announced that one of its reservation systems had been hacked. With over 7,000 properties and mor
Reducing juvenile delinquents return to crime : Does educational outreach play a role in reducing juvenile delinquents' return to crime in certain Counties ?
What is the amount of the inventory at the end of the year : The firm uses the periodic system, and there are 25 units of the commodity on hand at the end of the year. What is the amount of the inventory at the end
General partnership and limited liability company : Discussing how to form the new business, and have narrowed their choices to a general partnership or a limited liability company (LLC). What would you advise
How will Napoli be taxed on the redemption of her stock : Assuming that Florence corporation has a substantial earning and profits. How will Napoli be taxed on the redemption of her stock

Reviews

Write a Review

Business Management Questions & Answers

  Caselet on michael porter’s value chain management

The assignment in management is a two part assignment dealing 1.Theory of function of management. 2. Operations and Controlling.

  Mountain man brewing company

Mountain Man Brewing, a family owned business where Chris Prangel, the son of the president joins. Due to increase in the preference for light beer drinkers, Chris Prangel wants to introduce light beer version in Mountain Man. An analysis into the la..

  Mountain man brewing company

Mountain Man Brewing, a family owned business where Chris Prangel, the son of the president joins. An analysis into the launch of Mountain Man Light over the present Mountain Man Lager.

  Analysis of the case using the doing ethics technique

Analysis of the case using the Doing Ethics Technique (DET). Analysis of the ethical issue(s) from the perspective of an ICT professional, using the ACS Code of  Conduct and properly relating clauses from the ACS Code of Conduct to the ethical issue.

  Affiliations and partnerships

Affiliations and partnerships are frequently used to reach a larger local audience? Which options stand to avail for the Hotel manager and what problems do these pose.

  Innovation-friendly regulations

What influence (if any) can organizations exercise to encourage ‘innovation-friendly' regulations?

  Effect of regional and corporate cultural issues

Present your findings as a group powerpoint with an audio file. In addition individually write up your own conclusions as to the effects of regional cultural issues on the corporate organisational culture of this multinational company as it conducts ..

  Structure of business plan

This assignment shows a structure of business plan. The task is to write a business plane about a Diet Shop.

  Identify the purposes of different types of organisations

Identify the purposes of different types of organisations.

  Entrepreneur case study for analysis

Entrepreneur Case Study for Analysis. Analyze Robin Wolaner's suitability to be an entrepreneur

  Forecasting and business analysis

This problem requires you to apply your cross-sectional analysis skills to a real cross-sectional data set with the goal of answering a specific research question.

  Educational instructional leadership

Prepare a major handout on the key principles of instructional leadership

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd