Federal prison for breaching security

Assignment Help Basic Computer Science
Reference no: EM131038972

In March 2010, 28 year-old Albert Gonzalez was sentenced to 20 years in federal prison for breaching security measures at several well-known retailers and stealing millions of credit card numbers, which he then resold across a variety of shadow "carding" Web sites. Using a fairly simple packet sniffer, Gonzalez was able to steal payment card transaction data in real time, which he then parked on blind servers in places such as Latvia and Ukraine-countries formerly part of the Soviet Union. Gonzalez named his activities "Operation Get Rich or Die Tryin'" and lived a lavish lifestyle by selling stolen credit card information. He was eventually tracked down by the U.S. Secret Service, which was investigating the stolen card ring. Operation Get Rich or Die Tryin' took place for more than two years and cost major retailers, such as TJX, OfficeMax, Barnes & Noble, Heartland, and Hannaford, more than $200 million in losses and recovery costs. It is the largest computer crime case ever prosecuted.

At first glance, Operation Get Rich or Die Tryin' seems to be an open-and-shut case. A hacker commits a series of cybercrimes, is caught, and is successfully prosecuted. Fault and blame are assigned to the cybercriminal, and justice is served for the corporations and the millions of people whose credit card information was compromised.

Unless you ask the shareholders, banking partners, and some customers of TJX, who filed a series of classaction lawsuits against the company claiming that the "high-level deficiencies" in its security practices make it at least partially responsible for the damages caused by Albert Gonzalez and his accomplices. The lawsuits point out, for example, that the packet sniffer Gonzalez attached to the TJX network went unnoticed for more than seven months. Court documents also indicate that TJX failed to notice more than 80 GB of stored data being transferred from its servers using TJX's own high-speed network. Finally, an audit performed by TJX's payment-card processing partners found that it was noncompliant with 9 of the 12 requirements for secure payment card transactions. TJX's core information security policies were found to be so ineffective that the judge presiding over sentencing hearing of Gonzalez reviewed them to determine whether TJX's damages claim against him of $171 million is valid.

Apart from lawsuits, TJX faced a serious backlash from customers and the media when the details of the scope of the breaches trickled out. Customers reacted angrily when they learned that nearly six weeks had passed between the discovery of the breach and its notification to the public. News organizations ran headline stories that painted a picture of TJX as a clueless and uncaring company. Consumer organizations openly warned people not to shop at TJX stores. TJX's reputation and brand image was shattered in the wake of Operation Get Rich or Die Tryin', and only a small portion of the damage was actually Albert Gonzalez's fault.

The real lesson of Operation Get Rich or Die Tryin' may not be the crime itself, but how a lackluster security policy was chiefly responsible for it happening in the first place.

Source: David, K., & Solomon, M. G. (2010). Fundamentals of information systems security (1st ed.).

Sudbury, MA: Jones & Bartlett

Reference no: EM131038972

Questions Cloud

Disadvantages and advantages of each investment method : evaluate the performance of capital projects, and suggest some ways to hold managers accountable for spending overruns. Recommend when capital projects should be abandoned due to subsequent cost overruns. Support your position.
Determining the use of two arrays : Define two arrays x and f, each of size 10, using call-by-reference, to pass an array to a function, named sum. In main: define array, pass arrays, print out the array and the results on screen. In function sum, take arrays from main and sum the a..
Prepare the statement of cash flows of dux company : On November 12, 500 shares of common stock were repurchased as treasury stock at a cost of $8,000. Required
Prepare powerpoint presentation slides on given three assets : Prepare a PowerPoint presentation slides on three assets, Oil for commodity and US dollar for currency and Deutsche bank for financial sector.
Federal prison for breaching security : In March 2010, 28 year-old Albert Gonzalez was sentenced to 20 years in federal prison for breaching security measures at several well-known retailers and stealing millions of credit card numbers, which he then resold across a variety of shadow "c..
When should variances be investigated : If there is any topic that you would like to discuss further, please email me and I will include as one of the discussions.We discussed managerial accounting during week 1. Let's work a refresher exercise E1-1 and see how much you remember
What is the unit conversion cost for may : What is the unit conversion cost for May? (Round unit costs to 2 decimal places, e.g. 2.25.) The unit conversion cost for May $
Create a supplier performance improvement plan : Create a supplier performance improvement plan. Include the steps that need to be taken to identify the root cause, potential containment, and corrective action. You need to include how you will monitor compliance to corrective action and if the c..
Ending inventory using the average periodic method : The following information comes from CROW Inc.'s inventory records: Purchase date Units Cost per unit Sale date Units sold Beginning inventory 40 $12 Jan 2 150 $10 Jan 10 125 Jan 12 100 $8 Jan 15 100 Jan 20 100 $5 Jan 31 50 Required: Determine End..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create statechart to balanced four parentheses

Create Statechart to balanced four parentheses.

  The partial pseudocode below designs a guessing game

1. The partial pseudocode below designs a guessing game where a random number between 1 and 10 is generated and then a player tries to guess the number. The decision structure part of the program is missing. It should display a message indicating whe..

  Role of financial managers within an organization

Describe the forms of business organizations and the role of financial managers within an organization.

  Reference to the normative ethical theories

Part 2 is a new piece of work that should not include material from Part 1. As before, it is a written analysis of a complex ethical problem similar to that which you might encounter in the IT industry.

  Design an application to take and process a pizza order

Design an application to take and process a pizza order. The user should be able to make pizza order choices from listboxes, and the application should display the order price.

  Write a java program that produces a simple formatted report

For this lab you will write a Java program that produces a simple formatted report. The program will prompt the user to enter a file name. This file must contain information in a specific format (detailed below).

  Flying fish specializes in shipping fresh seafood

Flying Fish specializes in shipping fresh seafood up and down the coast. To improve service, the company wants to develop an in-house application called 53 (Super Shipping System). When 53 is operational, ship· pers and consignees will be able to tra..

  Create queue class should have the following methods

create queue class should have the following methods:

  Cool ways to use excel''s conditional formatting feature

Explain what you believe to be the main business purpose of charts in Excel. Next, discuss whether or not you believe Excel would still be a useful tool if the charting features were removed from the application.

  Prepare a proposal to deploy windows server onto an existing

Prepare a proposal to deploy Windows Server onto an existing network, based on a provided scenario. The proposal will include deployment, security policy, application and data provisioning, monitoring, and continuity plans. For a more detailed projec..

  Write the windows cli net commands

Write the Windows CLI NET commands that will turn the Spooler service OFF and then ON.

  Sql queries will produce a correct response

Formulate SQL queries for (a) and (b) with reference to the database specified for homework 2. Ensure that your SQL queries will produce a correct response for every instance of the database. a. List the employeeid and salary of those supervisors who..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd