Explain what was the main reason for the target data breach

Assignment Help Management Information Sys
Reference no: EM131522668

Cyber Breach at Target

Target shoppers got an unwelcome holiday surprise in December 2013 when the news came out 40 million Target credit cards had been stolen by accessing data on point of sale (POS) systems. CEO of Target, Gregg Steinhafel, said in an interview that "there was malware installed on our point-of-sale registers." With access to the POS system, the attackers would have access to all track data from customer credit and debit cards. That would expose all of the information encoded on the cards' magnetic stripes, giving the attackers full account data customer name, credit card number, CVV number and (if it's a debit card) the PIN.

Target later revised that number to include private data and announced that up to 70-110 million customers' data have been compromised. The breach transpired between November 27 and December 15th 2014. Over 11 GB of data was stolen. Target was made aware of this situation in mid-December when the U.S. Department of Justice informed the company that their system was being attacked. Target had received internal notifications prior to this date, but had failed to act.

The problem that impacted up to 110 million Target customers during the holiday shopping season may have been because of an inexpensive "off-the-shelf" malware known as BlackPOS. At a high level, BlackPOS is a "virus" that manipulates the code on the POS device that allows a "screen scrape" of the data at card swipe. Even with end-to-end encryption, the brief moment in time of swipe to transfer could be captured through the malware code manipulation.

Access to the system came from network credentials that were stolen from an HVAC provider based in Sharpsburg, Penn. Initial speculation was that this vendor was monitoring HVAC systems installed at Target facilities remotely via network connection and that this was the way hackers gained entry into Targets internal network. As it turned out, this was not the case. The compromised data connection was being used for "electronic billing, contract submissions and project management", not monitoring of equipment. The network credentials were, in fact, gathered after the HVAC contractor's employee fell victim to a phishing scheme attack and clicked on a malicious email.

Target was not unprepared for the breach. Earlier that year, the company had installed malware detection software by computer security firm FireEye (high-profile FireEye customers include the CIA and Pentagon). The FireEye team in Bangalore, India monitored Target's system around the clock, and reported the activity to Target's security team based in Minneapolis, Minn.

Exfiltration malware was installed on November 30, 2013 to move the stolen information out of the Target servers. These drop points were first staged around the U.S., then to computers in Russia. It was at this point that the Bangalore team became aware that something was wrong and notified the Target security team in Minneapolis. For reasons that are unclear, Target's Minneapolis team failed to act on the alert, allowing customer information to be compromised.

The initial reports on this story attracted the attention of many in the construction industry. Although, in this case, access to Target's credit card system did not come through HVAC unit, that scenario is not an improbable one. Remote monitoring of HVAC equipment is possible and future security incidents are not unlikely.

Target cyber breach is the second biggest retail hack in U.S. history. In the days prior to Thanksgiving 2013, someone installed malware called BlackPOS in Target's security and payments system designed to steal every credit card used at the company's 1,797 U.S. stores. At the critical moment-when the Christmas gifts had been scanned and bagged and the cashier asked for a swipe-the malware would step in, capture the shopper's credit card number, and store it on a Target server commandeered by the hackers.

After reading this brief information about the Target cyber security breach, please answer the following questions:

In your own words, explain what was the main reason for the Target data breach?

If you will perform an Audit Plan, describe the most critical areas that should be included in the Audit Universe? How you can priorities between them?

What do you think; did Target have good security measures? Recommend THREE internal controls that should be in place to help Target mitigate any possible breaches in the future?

Target had met its responsibilities of abiding by the industrial standards (they comply with the international standards) but this breach still occurred. Explain?

Data center security is of increasing concern, with data breaches and cyber vulnerabilities more and more in the news headlines. Briefly talk about Target's new datacenters?

Assignment Instruction and Guidelines:

1. This assignment should be between 1500 -2000 words.

2. Use APA Format to reference any source of information.

3. References (APA Style) should be placed in the last page of the research paper.

4. Use Time New Roman font, Size 12, double spaced.

Reference no: EM131522668

Questions Cloud

Computing the moles of copper : From (1gC12H22CuO14) / (453.84C12H22CuO14 g/mol) x (1molC12H22CuO14 / 1molC12H22CuO14) x (63.55cu/mol) = 0.14gCu , is the final answer.
The role of shamanism in developed religious traditions : Discuss about The role of shamanism in developed religious traditions and The monastic life in Eastern religions.
Define the digital divide and does the digital divide exist : Write a 3-5 page APA paper addressing: Define the digital divide. Does the digital divide exist? If so, where? Is it diminishing or growing?
Discuss the advantages of having global accounting : [Global accounting standards] Discuss the advantages and disadvantages of having global accounting standards from the perspective of the financial analyst.
Explain what was the main reason for the target data breach : After reading this brief information about the Target cyber security breach, In your own words, explain what was the main reason for the Target data breach
Discuss the importance to inventor of the controversy : Why knowledge of changes in accounting principles is important analysis purposes.
What does the timeline for replacement project cash flows : What does the timeline for the replacement project cash flows for years 0 through 5 look like?
Capital budgeting selection methodologies-npv-payback-irr : analysis of the strengths and weaknesses of the following capital budgeting selection methodologies: NPV, payback, IRR.
How each firm should account for its liability for workers : [Contingencies) Consider two firms that self-insure for workers; compensation losses. Assume that the annual probability of a claim is I an 1.000 for each firm.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What types of databases are used by companies

What types of databases are used by companies like Google in implementing worldwide search engines

  Explain global data security

Global Data Security - This solution explains the security systems that should be recommended for implementation to secure a company that operates on the global level.

  Charts and time management1 gnatt charts are they usefull

charts and time management1. gnatt charts are they usefull or useless in organizations? please explain2. when

  What is the bullwhip effect

What is the bullwhip effect? Why is it a problem for businesses - what was the catalyst for NIBCO to develop a VMI program, and why was it able to respond?

  Create a new field in the manufacturer table after rlmfgcode

Create a new field in the Manufacturer table after RlMfgCode named Website with the Hyperlink data type. Save the table. Switch to Datasheet view, add the Web site http://www.lenox.com to the Lenox China record (7).

  Which ones are most commonly used in today networks

Complex routing algorithms are used to maintain routing tables. What algorithms are used, and how do they work? What are the advantages and disadvantages of each? Which ones are most commonly used in today's networks

  Would you use a web hosting service or your company hardware

Would you use a web hosting service or your own company hardware and software? Would your company design the website or outsource the development?

  Construct a block diagram of delta sigma modulation system

Construct a block diagram of the delta-sigma modulation system in such a way that it provides an interpretation of the system.

  Use of coordinated information technology

Coordinated information technology and competitive advantage - This discussed the use of coordinated information technology as it applies to delivering a competitive advantage for an organization.

  Identify ten attributes of being an it professional

Identify ten attributes of being an IT professional. List and discuss the key IT leadership traits/skills needed to lead technology innovations in contemporary business today. What issues do IT/IS managers face when tryin..

  Analyze the business requirements

Analyze the business requirements and closely working with business team to get the clarifications addressed.

  Discuss about the disaster recovery planning

summarize the topic discussed in class explaining why. Identification of Assets to protect,Mission Critical Assets,Business Continuity Planning,Business Impact Analysis,Disaster Recovery Planning.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd