Information Security Breach Case Study

Great Essays
Information Security Breach these days has been a popular subject in news. Almost every companies have been hacked, if not yet, they should not consider themselves as more secure than others that have already been there. In December 2013, Target was one of the victims with more than 40 million credit cards and debit cards that were stolen by malicious people. Just right before Thanksgiving a malware was installed inside target database. So between November and December 2013, over 11GB of critical information was taken. The sad thing is that the company did not notice, even with the international alert, it still missed to take proper measures to stop the process. Private data for more than million customers was compromised from its data point of sales (POS). This paper will detail the reason why the breach happened, how target would have prevented the threat and mitigate the attack so it cannot happened again (Greenberg, 2014).
What was the cause of this security breach? Apparently, Target did not have proper network segregation which means
…show more content…
Defense in depth is recommended in order to make it difficult for hackers to access the network, and easier for security staff to detect the invasion; since multiple layers of protection would be implemented. For instance, with the defense in depth, data would have not been accessed so easily or without any sort of alert (Vijayan, 2014). By the time the first, second, and third layers were accessed, information security staffs would be notified, and in addition, hackers would have been tired, trying to reach the intended destination. The control must be applied in both the technology and the employees as well; people charged to perform auditing, management of the system and mostly those in charge of incident response are supposed to be involved (Rachidel,

Related Documents

  • Great Essays

    Target Attacker Timeline Date 1: 10/8/2013. (Estimated date) Reconnaissance and scanning: Attackers acquired Fazio Mechanical Firm’s user code and password through a phishing email containing a Trojan called Citadel, a password sniffing bot program. The phished credentials provided access to Target’s payment system network. Extensive reconnaissance and scanning would have been needed in order to identify Fazio Mechanical as a Target vendor, and acquire the emails of employees that possessed the login credentials necessary to access Target’s systems. Date 2: November 11th 2013 (Around 34 days after date 1) Exploitation: Attackers first breach Target’s system.…

    • 591 Words
    • 3 Pages
    Great Essays
  • Decent Essays

    Target received red flags right before the actual attack. Due to common cyber crimes target was already aware of the threats that happen so they installed $1.6 million malware detection tool Fireeye. They also had a team of security specialists in Bangalore and Minneapolis who monitor its computers around the clock. Fire eye did its job and notified them on multiple occasions about the incident that’s going to happen; unfortunately security team appears to have made wrong call. "…

    • 332 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Target Executive Summary

    • 343 Words
    • 2 Pages

    In December 2013, criminals forced their way into systems, gaining access to guest credit and debit card information. It was determined that certain guest information was also taken, for example, the information included names, mailing addresses, email addresses or phone numbers. The massive data breaches at Target were broken into the retailer's network using login credentials stolen from a heating, ventilation and air conditioning company. The hackers first tested the data-stealing malware on a small number of cash registers. The cost of the breach was far reaching to Target, customers, employees and banks.…

    • 343 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Target Executive Summary

    • 1564 Words
    • 7 Pages

    In 2013, in the days prior to Black Friday, hackers stole credit card information for millions of Target customers. The hackers set their traps and planned the data’s escape course. They uploaded exfiltration malware to move stolen credit card numbers. To cover their tracks, they first moved the stolen numbers to staging points spread around the United States. The information was then moved into the hackers’ computers in Russia.…

    • 1564 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Pros And Cons Of Anthem

    • 167 Words
    • 1 Pages

    I found your document informative and well-written. I learned a lot about this situation, which is my first time hearing about it. It’s quite concerning because I used to be insured through Anthem, so it’s likely that the hackers accessed my health personal information. In your document, you mentioned that hackers are becoming more sophisticated as technology advances, so do you believe, through your research or your personal belief, that security breaches would cease to exist even if organizations implement strong security measures?…

    • 167 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    After reading the article what I summarize that Target's Database was hacked. The hackers used the information from the database to steal people’s information and money. This caused Target a problem between the customers and company. Target had to offer $10,000,000 to fix the issue, and paid each customer who were victims would receive up $10,000. This caused Target to close all the of their stores in Canada, and lay off about 34,000 employees.…

    • 180 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Home Depot Fraud Essay

    • 1360 Words
    • 6 Pages

    November 6, 2014, Home Depot Inc., the world’s largest home improvement retailer was hacked by cybercriminals. Hackers gained access to Home Depot Inc., systems by stealing a password from a vendor. The hackers were able to breach Home Depot computer system and steal information for 56 million credit and debit card accounts and 53 million email address of customers. Although, the hackers had only access to the perimeter of Home Depot networks it was a vulnerability in Microsoft Windows which allowed them to fully breach the network. Moreover, the hackers were able to infiltrate the company’s point-of-sale system using high lever permissions, which allowed them to deploy malware on Home Depot self -check out system.…

    • 1360 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Target Security Breach

    • 181 Words
    • 1 Pages

    From a managerial perspective, there were many errors made in handling the December 2013 Target security breach. The first questionable decision for review deals with the effects of poor communication. Chief Executive Gregg Steinhafel hesitates to publicly communicate the breach to consumers (Kinicki & Williams, 2013). The primary law of business is “being responsive to customers” (Kinicki & Williams, 2013, p.12). Furthermore, when the details were communicated, CEO Steinhafel inflated the amount of affected shoppers (Kinicki & Williams, 2013).…

    • 181 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Most people can remember the Target breach, whether they were affected by it or not. Personally, this was the first big data breach that I remember, and I was one of the millions affected by it. While I do not shop at Target often of course I bought one thing from the store during the time of the breach. I was a nervous wreck, my wife was even worse. Luckily the only thing affected was our nerves and not our personal identities.…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Data breaches by way of hacking is gaining popularity. This is evident from the recent cyber-attack on Anthem's information technology system. Hackers…

    • 733 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays