Explain what was the main reason for the target data breach

Assignment Help Management Information Sys
Reference no: EM131522668

Cyber Breach at Target

Target shoppers got an unwelcome holiday surprise in December 2013 when the news came out 40 million Target credit cards had been stolen by accessing data on point of sale (POS) systems. CEO of Target, Gregg Steinhafel, said in an interview that "there was malware installed on our point-of-sale registers." With access to the POS system, the attackers would have access to all track data from customer credit and debit cards. That would expose all of the information encoded on the cards' magnetic stripes, giving the attackers full account data customer name, credit card number, CVV number and (if it's a debit card) the PIN.

Target later revised that number to include private data and announced that up to 70-110 million customers' data have been compromised. The breach transpired between November 27 and December 15th 2014. Over 11 GB of data was stolen. Target was made aware of this situation in mid-December when the U.S. Department of Justice informed the company that their system was being attacked. Target had received internal notifications prior to this date, but had failed to act.

The problem that impacted up to 110 million Target customers during the holiday shopping season may have been because of an inexpensive "off-the-shelf" malware known as BlackPOS. At a high level, BlackPOS is a "virus" that manipulates the code on the POS device that allows a "screen scrape" of the data at card swipe. Even with end-to-end encryption, the brief moment in time of swipe to transfer could be captured through the malware code manipulation.

Access to the system came from network credentials that were stolen from an HVAC provider based in Sharpsburg, Penn. Initial speculation was that this vendor was monitoring HVAC systems installed at Target facilities remotely via network connection and that this was the way hackers gained entry into Targets internal network. As it turned out, this was not the case. The compromised data connection was being used for "electronic billing, contract submissions and project management", not monitoring of equipment. The network credentials were, in fact, gathered after the HVAC contractor's employee fell victim to a phishing scheme attack and clicked on a malicious email.

Target was not unprepared for the breach. Earlier that year, the company had installed malware detection software by computer security firm FireEye (high-profile FireEye customers include the CIA and Pentagon). The FireEye team in Bangalore, India monitored Target's system around the clock, and reported the activity to Target's security team based in Minneapolis, Minn.

Exfiltration malware was installed on November 30, 2013 to move the stolen information out of the Target servers. These drop points were first staged around the U.S., then to computers in Russia. It was at this point that the Bangalore team became aware that something was wrong and notified the Target security team in Minneapolis. For reasons that are unclear, Target's Minneapolis team failed to act on the alert, allowing customer information to be compromised.

The initial reports on this story attracted the attention of many in the construction industry. Although, in this case, access to Target's credit card system did not come through HVAC unit, that scenario is not an improbable one. Remote monitoring of HVAC equipment is possible and future security incidents are not unlikely.

Target cyber breach is the second biggest retail hack in U.S. history. In the days prior to Thanksgiving 2013, someone installed malware called BlackPOS in Target's security and payments system designed to steal every credit card used at the company's 1,797 U.S. stores. At the critical moment-when the Christmas gifts had been scanned and bagged and the cashier asked for a swipe-the malware would step in, capture the shopper's credit card number, and store it on a Target server commandeered by the hackers.

After reading this brief information about the Target cyber security breach, please answer the following questions:

In your own words, explain what was the main reason for the Target data breach?

If you will perform an Audit Plan, describe the most critical areas that should be included in the Audit Universe? How you can priorities between them?

What do you think; did Target have good security measures? Recommend THREE internal controls that should be in place to help Target mitigate any possible breaches in the future?

Target had met its responsibilities of abiding by the industrial standards (they comply with the international standards) but this breach still occurred. Explain?

Data center security is of increasing concern, with data breaches and cyber vulnerabilities more and more in the news headlines. Briefly talk about Target's new datacenters?

Assignment Instruction and Guidelines:

1. This assignment should be between 1500 -2000 words.

2. Use APA Format to reference any source of information.

3. References (APA Style) should be placed in the last page of the research paper.

4. Use Time New Roman font, Size 12, double spaced.

Reference no: EM131522668

Questions Cloud

Computing the moles of copper : From (1gC12H22CuO14) / (453.84C12H22CuO14 g/mol) x (1molC12H22CuO14 / 1molC12H22CuO14) x (63.55cu/mol) = 0.14gCu , is the final answer.
The role of shamanism in developed religious traditions : Discuss about The role of shamanism in developed religious traditions and The monastic life in Eastern religions.
Define the digital divide and does the digital divide exist : Write a 3-5 page APA paper addressing: Define the digital divide. Does the digital divide exist? If so, where? Is it diminishing or growing?
Discuss the advantages of having global accounting : [Global accounting standards] Discuss the advantages and disadvantages of having global accounting standards from the perspective of the financial analyst.
Explain what was the main reason for the target data breach : After reading this brief information about the Target cyber security breach, In your own words, explain what was the main reason for the Target data breach
Discuss the importance to inventor of the controversy : Why knowledge of changes in accounting principles is important analysis purposes.
What does the timeline for replacement project cash flows : What does the timeline for the replacement project cash flows for years 0 through 5 look like?
Capital budgeting selection methodologies-npv-payback-irr : analysis of the strengths and weaknesses of the following capital budgeting selection methodologies: NPV, payback, IRR.
How each firm should account for its liability for workers : [Contingencies) Consider two firms that self-insure for workers; compensation losses. Assume that the annual probability of a claim is I an 1.000 for each firm.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd